Communication Visualization – An Aid to Military Command and Control Evaluation

Author(s):  
Pär-Anders Albinsson ◽  
Johan Fransson
1995 ◽  
Author(s):  
Richard E. Hayes ◽  
Richard L. Layton ◽  
William A. Ross

Author(s):  
Alma Schaafstal ◽  
Raegan M. Hoeft ◽  
Martin van Schaik

The process of training teams increasingly occurs in synthetic environments. However, it is often still modeled after live team training, including the disadvantages of live training, for example, the fact that all teammates must be available. This paper explores overcoming the disadvantages of human teammates in training teams in synthetic environments, while keeping the advantages of learning in a collaborative and cooperative fashion. Simulated teammates are a promising alternative because they are always available, may be modeled after experienced training personnel, and may be more cost effective in the long run. This paper details a research approach towards the definition of requirements for simulated teammates. In our approach, we carry out a set of experiments using confederates as simulated teammates, in a well-controlled simulation of a military command-and-control task The results of a first experiment show slightly better teamwork skills for those teams trained with simulated teammates.


2015 ◽  
pp. 1231-1245
Author(s):  
Madjid Tavana ◽  
Dawn A. Trevisani ◽  
Dennis T. Kennedy

The increasing complexity in Military Command and Control (C2) systems has led to greater vulnerability due to system availability and integrity caused by internal vulnerabilities and external threats. Several studies have proposed measures of availability and integrity for the assets in the C2 systems using precise and certain measures (i.e., the exact number of attacks on the availability and the integrity, the number of countermeasures for the availability and integrity attacks, the effectiveness of the availability and integrity countermeasure in eliminating the threats, and the financial impact of each attack on the availability and integrity of the assets). However, these measures are often uncertain in real-world problems. The source of uncertainty can be vagueness or ambiguity. Fuzzy logic and fuzzy sets can represent vagueness and ambiguity by formalizing inaccuracies inherent in human decision-making. In this paper, the authors extend the risk assessment literature by including fuzzy measures for the number of attacks on the availability and the integrity, the number of countermeasures for the availability and integrity attacks, and the effectiveness of the availability and integrity countermeasure in eliminating these threats. They analyze the financial impact of each attack on the availability and integrity of the assets and propose a comprehensive cyber-risk assessment system for the Military C2 in the fuzzy environment.


Sign in / Sign up

Export Citation Format

Share Document