Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "C4ISR" wg kryterium: Temat


Wyświetlanie 1-7 z 7
Tytuł:
Evolution of military information management
Autorzy:
Mattila, J.
Parkinson, S.
Powiązania:
https://bibliotekanauki.pl/articles/119329.pdf
Data publikacji:
2016
Wydawca:
Akademia Sztuki Wojennej
Tematy:
information science
information management
enterprise architecture
military transformation
C4ISR
enterprise resource management
Opis:
The paper focuses on information dimension in the structure of Information and Communication Technology architecture and searches for better models to describe the structure of blue force information, especially from Enterprise Architecture (EA) approach. Enterprise Architecture has been developed better to communicate the complex structures of military capabilities. Major EA frameworks (TOGAF, DODAF, NAF) recognize the layer of information between business and technology. Nevertheless, in practice, the focus tends to turn more to the technology as has happened in several Command, Control, Communications, Computing, Information, Surveillance, and Reconnaissance (C4ISR) or Enterprise Resource Management (ERM) programs. The paper develops a tool for architects to use in measuring the maturity of information management in the current military organization and in defining the possible paths of evolution in information management available for military. The outcome is a roadmap that describes the evolution of past and probable future for military information management and explains different drivers and constraints on roads. The roadmap is tested against experiences gained from several C4ISR, and ERM focused military transformations. The overall research approach is following the hypothetico-deductive model, and the roadmap part is applying the theory of evolution in sociotechnical systems. Since information is essential for cognitive level sense making, decision making, and learning, Enterprise Architects should include information maturity in their roadmaps of technical and business process development. The roadmap for military information management is to help the analysing of the current situation and provide possible paths towards future stages aligned through business, information, and technical layers.
Źródło:
Zeszyty Naukowe AON; 2016, 4(105); 188-207
0867-2245
Pojawia się w:
Zeszyty Naukowe AON
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Evolution of military information management. The transformation of military organisation often neglects the culture and maturity of its information management
Autorzy:
Mattila, Juha
Parkinson, Simon
Powiązania:
https://bibliotekanauki.pl/articles/576467.pdf
Data publikacji:
2016-09-23
Wydawca:
Akademia Sztuki Wojennej
Tematy:
Information Science
Information Management
Enterprise Architecture
Military Transformation
C4ISR
Enterprise Resource Management
Opis:
Information and Communications Technology (ICT) has made major advances in linking physical dimension through information to cognitive dimension as described by John Perry et al. (2004) in their model for Information Superiority. The information technology linkage between the physical and cognitive dimensions has created new ways of effect both for the red and blue force. The paper focuses on the information dimension and searches for better models to describe the structure of blue force information, especially from the Enterprise Architecture (EA) approach. Enterprise Architecture has been developed to better communicate the complex structures of military capabilities. Major EA frameworks (TOGAF, DODAF) recognise the layer of information between business and technology, but in practice, the focus turns more to the technology as has happened in several Command, Control, Communications, Computing, Information, Surveillance, and Reconnaissance (C4ISR) and Enterprise Resource Management (ERM) programmes. The paper develops a tool for architects to use in measuring the maturity of information management in the current military organisation and in defining the possible paths of evolution in information management available for the military. The outcome of this paper is a roadmap picturing the evolution of military information management. Enterprise Architects may use the roadmap in analysing and developing both C4ISR and ERM capabilities in military organisations. The primary research question for this paper is: What may cause so many failures in defining Enterprise Architecture at information management level and then in implementing C4ISR and ERM tools? The paper first defines six stages for management of unstructured information from various former studies and information architecture models (Cook, 1996). The basic stages of evolution of unstructured information are defined as print, file, page, social media content, semantic content, and intelligent content. These six stages and a generic military structure are processed through an evolutionary model derived from evolutionary theory for technical development described by Joel Mokyr (1998). The Mokyr model helps to recognise the paths of evolution, the forces that may influence the development and the ways that have been taken in achieving goals. The outcome is a roadmap that describes the evolution of past and possible future for military information management and explains different drivers and constraints on roads. The roadmap is aligned with other similar roadmap tools Enterprise Architects are using. The roadmap is further tested against experiences gained from several C4ISR and ERM focused military transformations. The overall research approach follows the hypothetico- deductive model (Brody, 1993) and the roadmap part applies the theory of evolution in sociotechnical systems (Bertalanffy, 1969). Military organisations have followed the general evolutionary path (print – file – page – social media content – semantic – intelligent content) in developing their management of unstructured information. The general path includes two definite leaps that require more effort: 1) from files to pages, and 2) from unstructured content to more structured content. There have also been more discrete shortcuts together with downgrades defined by cultural and doctrinal powers of the force. Meanwhile, it is possible to accelerate evolution by taking shortcuts. A consistent effort to change technology, processes, and people at the same time is needed when, for example, taking force from publish-pull pages to semantic information management. It might be easier to start with structured information and then, gradually, include unstructured information. Strong forces may also pull back already achieved development if the change has not been made to stick properly. Losing the thin trust for shared information management early in implementation may prevent individuals from sharing for a long time. Not providing the expected level of availability of the service for the knowledge base may lose the confidence of process owners. Since information is essential for cognitive level sense making, decision making, and learning, Enterprise Architects should include information maturity in their roadmaps of technical and business process development. The roadmap for military information management is to help analysis of the current situation and provide possible paths towards future stages aligned through business, information, and technical layers. The research in this paper only covers the approach of evolution. The systems and business strategy approached are studied in other papers. This article does not illustrate the integrated roadmap of business, information, and technology, which can be found in further papers by the writers. The research is based mainly on qualitative data in proving the roadmap. There is room for further assurance when the information sharing cultures of the military are enabling it.
Źródło:
Security and Defence Quarterly; 2016, 12, 3; 46-73
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Kocncepcja wykorzytania informacj i rozpoznawczej w systemach C4ISR na okręcie
Concepts of using reconnaissance information in the C4ISR systems on the ship
Autorzy:
Scheffs, Waldemar
Powiązania:
https://bibliotekanauki.pl/articles/2053210.pdf
Data publikacji:
2021
Wydawca:
Akademia Marynarki Wojennej. Wydział Dowodzenia i Operacji Morskich
Tematy:
System C4ISR
system rozpoznania okrętu
zautomatyzowany system rozpoznawczy okrętu
morskie środowisko sieciocentryczne
C4ISR system
ship reconnaissance system
automated reconnaissance system ship
marine network-centric environment
Opis:
Okręty wojenne jako jednostki autonomiczne do realizacji zadań, posiadają systemy rozpoznania, kierowania i rażenia. Powinny one być w zautomatyzowane w jeden system dowodzenia okrętu. Nie każda jednostka jest do tego przystosowania i nie każda ma takie możliwości. W ocenie ekspertów wojskowych środowisko przetwarzania danych na okręcie jest niewydolne w stosunku do potrzeb z uwagi na stopień skomplikowania sytuacji morskiej. Dlatego, aby efektywnie używać okręty należy stworzyć „mega” system wykorzystujący wszystkie okręty powiązane z systemami lotniczymi i lądowymi rodzajów sił zbrojnych. Artykuł prezentuje techniczno-organizacyjne założenia systemu rozpoznania C4ISR1 dla okrętu działającego w morskim środowisku sieciocentrycznym. Bazując na wnioskach i doświadczeniach Polskiego Kontyngentu Wojskowego w Iraku i Afganistanie oraz na założeniach teoretycznych specjalistów Marynarki Wojennej dotyczących działań okrętów na morzach i strefie przybrzeżnej można postawić tezę, że granice między operacjami wojskowymi i niewojskowymi coraz bardziej się zacierają. Rosnące zagrożenia niemilitarne kształtują przyszłe wykorzystanie systemów C4ISR okrętu. Można domniemywać, że systemy C4ISR okrętu będę wykorzystywane w operacjach niemilitarnych. Użycie okrętu to nadal domena operacji morskich, ale jednocześnie należy przypuszczać, iż sama ich obecność może zażegnywać sytuacje kryzysowe. W tym kontekście okręt może realizować zadania monitorowania sytuacji radioelektronicznej w obszarze mu wyznaczonym. Dla takich działań system gromadzenia, przetwarzania i dystrybucji informacji nabiera szczególnego znaczenia.
Warships, as autonomous units in carrying out their tasks, have systems of recognition, control, and destruction. They should be automated into one ship's command system. Not every individual is adapted to this and not everyone has such possibilities. According to military experts, the data processing environment on the ship is insufficient in relation to the needs due to the complexity of the maritime situation. Therefore, in order to use ships effectively, one should create a "mega" system that uses all ships associated with the air and land systems of the armed forces. The article presents the technical and organizational assumptions of the C4ISR reconnaissance system for a ship operating in a maritime network-centric environment. Based on the conclusions and experiences of the Polish Military Contingent in Iraq and Afghanistan, and on the theoretical assumptions of Navy specialists regarding the activities of ships in the seas and in the coastal zone, it can be argued that the boundaries between military and non-military operations are becoming increasingly blurred. Growing non-military threats shape the future use of the ship's C4ISR systems. It can be presumed that the ship's C4ISR systems will be used in nonmilitary operations. The use of the ship is still the domain of naval operations, but at the same time it should be assumed that their mere presence may avert crisis situations. In this context, the ship may perform the tasks of monitoring the electronic situation in the area assigned to it. For such activities, the information gathering system becomes of particular importance.
Źródło:
Rocznik Bezpieczeństwa Morskiego; 2021, R. XV; 71-96
1898-3189
Pojawia się w:
Rocznik Bezpieczeństwa Morskiego
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Technology solutions for coalition operations
Autorzy:
Wiemer, D.
Powiązania:
https://bibliotekanauki.pl/articles/308310.pdf
Data publikacji:
2004
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
C4ISR
coalition
CCIS
command and control
information technology
military
defence
telecommunications
operations
SBC
session border controller
content inspection
MPLS
multi-protocol label switching (MPLS)
pattern matching
trusted downgrade
explicit route
Opis:
As computer technology has advanced, information processing in command, control, communications, computers, intelligence, surveillance and reconnaissance (C4ISR) systems has become highly complex. The information processed by these systems is usually of a very highly sensitive nature and is entered into specific systems that are physically isolated from each other. The physical isolation of these systems makes it cumbersome to exchange information between systems. The result is inefficient sharing of sensitive information in situations where timeliness of exchange could be a life or death reality. Since the mid 1990's, increasing efforts have been placed on improving coalition operations. Many systems have been created with the goal to improve the sharing of information and collaborative planning across coalition boundaries. The usability of these systems have had mixed levels of success and improvements will always be necessary. This paper will briefly describe three advances in telecommunications technology that could be leveraged to significantly improve coalition operations. These technologies are; the session border controller (SBC), advances in pattern matching technology, and multi-protocol label switching (MPLS).
Źródło:
Journal of Telecommunications and Information Technology; 2004, 4; 31-38
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-7 z 7

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies