U.S.-NATO Command and Control: An AD HOC Relationship

2002 ◽  
Author(s):  
Marshall Denney ◽  
III
2020 ◽  
Vol 14 (3) ◽  
pp. 218-241
Author(s):  
August Capiola ◽  
Holly C. Baxter ◽  
Marc D. Pfahler ◽  
Christopher S. Calhoun ◽  
Philip Bobko

Trust is important for establishing successful relationships and performance outcomes. In some contexts, however, rich information such as knowledge of and experience with a teammate is not available to inform one’s trust. Yet, parties in these contexts are expected to work together toward common goals for a relatively brief and finite period of time. This research investigated the antecedents to quickly-formed trust (often referred to as swift trust) in fast-paced, time-constrained contexts. We conducted a cognitive task analysis (CTA) based on 11 structured interviews of subject-matter experts (SMEs) in Intelligence (Intel)—a heterogeneous job category comprising distributed and co-located personnel within multi-domain command and control (MDC2) environments. Eight antecedents to swift trust emerged from these interviews (i.e., ability, integrity, benevolence, communication, mission-focus, self-awareness, shared perspectives/experiences, and calm), with further analysis implying that swift trust is a relevant and emergent state in MDC2 that facilitates reliance. These findings offer implications for teams operating in high-risk distributed contexts and should be expanded through basic experimental investigations as well as applied initiatives.


IoT ◽  
2021 ◽  
Vol 2 (2) ◽  
pp. 236-248
Author(s):  
Andrew John Poulter ◽  
Simon J. Cox

Internet of Things (IoT) devices are becoming ubiquitous, and may be arranged to form formal or ad hoc Command and Control (C2) networks. Such networks typically do not have a mechanism to facilitate the sharing of either data or control inputs. This paper examines this problem in the context of IoT devices operating within C2 systems which do not have a trusted relationship with each other. We propose a solution which we call syndication, to provide a controlled mechanism to share data between C2 systems of devices without a fully trusted relationship. This paper builds upon previous work which established a lightweight protocol for secure C2 operations within the IoT. Using the proposed approach enables not only sharing of data but also permits the external controller to submit moderated requests for actions to be performed. The paper concludes by examining how this approach could also be adopted to provide secure guest access to connected systems in a domestic or commercial context.


Author(s):  
Jill Harries

This chapter focuses on legal education. It surveys Justinian’s command-and-control model of legal education compared to the unstructured, ad hoc and sociable methods of instruction practised under the Republic by a Servius, or, under the Empire, by a Papinian—or, for philosophy, by a Plotinus. For centuries, Romans had operated in line with what had worked for them. Lawyers in their seminars would not necessarily have taught “to” the order of topics present in Scaevola’s treatise on the Civil Law (or Sabinus’ abbreviated version) or to the Edict, but they would have been aware of them as frameworks for the written outcomes of their oral discussions. As the fashion for teaching from core texts and a set syllabus took hold, discussion of written text became the central, but not exclusive focus, of legal instruction and the way was open for the construction of the definitive legal syllabus by Justinian.


2008 ◽  
Author(s):  
Laura D. Strater ◽  
Haydee M. Cuevas ◽  
Erik S. Connors ◽  
Diane M. Ungvarsky ◽  
Mica R. Endsley

Author(s):  
Laura D. Strater ◽  
Haydee M. Cuevas ◽  
Erik S. Connors ◽  
Diane M. Ungvarsky ◽  
Mica R. Endsley

Sign in / Sign up

Export Citation Format

Share Document