Trust and influence in the information age operational requirements for network centric warfare
Blatt, Nicole I.
MetadataShow full item record
Military leaders and scholars alike debate the existence of a revolution in military affairs (RMA) based on information technology. This thesis will show that the Information RMA not only exists, but will also reshape how we plan, operate, educate, organize, train, and equip forces for the 21st century. This thesis introduces the Communication Technology (CommTech) Model to explain how communication technologies affect organizations, leadership styles, and decision-making processes. Due to the growth in networking enterprises, leaders will have to relinquish their tight, centralized control over subordinates. Instead, they will have to perfect their use of softer power skills such as influence and trust as they embrace decentralized decision-making. Network Centric Warfare, Self-Synchronization, and Network Enabled Operations are concepts that provide the framework for integrating information technology into the battlespace. The debate that drives centralized versus decentralized control in network operations is analyzed with respect to the CommTech Model. A new term called Operational Trust is introduced and developed, identifying ways to make it easier to build trust among network entities. Finally, the thesis focuses on what leaders need to do to shape network culture for effective operations.
RightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Showing items related by title, author, creator and subject.
Bassett, Danielle S.; Alderson, David L.; Carlson, Jean M. (2012);We develop a sequence of models describing information transmission and decision dynamics for a network of individual agents subject to multiple sources of influence. Our general framework is set in the context of an impending ...
Aw, Ee Hong (Monterey, CA; Naval Postgraduate School, 2018-09);While terrorism is not new, today’s terrorist threat is different from that of the past. Terrorism has evolved, and terrorist groups today are more structured and better organized. Modern technology enables terrorists to ...
Adaptive node capability metric to assess the value of networking in a general command and control wireless communication topology Magalhães, Marcelo Vellozo (Monterey, California. Naval Postgraduate School, 2011-09);In order to quantify any node's capacity to support optimal information flow within a distributed command and control network, a novel node capability value calculation is developed from first principles. The expression ...