RELATIONSHIPS BETWEEN COMMAND, MANAGEMENT, AND COMMUNICATIONS. TO CONTINUE IN DIFFERENT DIRECTIONS OR TO REMAIN IN SAME FIELD

2018 ◽  
Vol 28 (6) ◽  
pp. 1887-1891
Author(s):  
Todor Kalinov

Management and Command253 are two different words and terms, but military structures use them as synonyms. Military commanders’ authorities are almost equal in meaning to civilian managers’ privileges and power. Comparison between military command and the civilian management system structure, organization, and way of work shows almost full identity and overlapping. The highest in scale and size military systems are national ministries of defense and multinational military alliances and coalitions. Military systems at this level combine military command structures with civilian political leadership and support elements. Therefore, they incorporate both military command and civilian management organizations without any complications, because their nature originated from same source and have similar framework and content. Management of organizations requires communication in order to plan, coordinate, lead, control, and conduct all routine or extraordinary activities. Immediate long-distance communications originated from telegraphy, which was firstly applied in 19th century. Later, long-distance communications included telephony, aerial transmitting, satellite, and last but not least internet data exchange. They allowed immediate exchange of letters, voice and images, bringing to new capabilities of the managers. Their sophisticated technical base brought to new area of the military command and civilian management structures. These area covered technical and operational parts of communications, and created engineer sub-field of science, that has become one of the most popular educations, worldwide. Communications were excluded from the military command and moved to separate field, named Computers and Communications. A historic overview and analysis of the command and management structures and requirements shows their relationships, common origin, and mission. They have significant differences: management and control are based on humanities, natural and social sciences, while communications are mainly based on engineering and technology. These differences do not create enough conditions for defragmentation of communications from the management structures. They exist together in symbiosis and management structures need communications in order to exist and multiply their effectiveness and efficiency. Future defragmentation between military command and communications will bring risks of worse coordination, need for more human resources, and worse end states. These risks are extremely negative for nations and should be avoided by wide appliance of the education and science among nowadays and future leaders, managers, and commanders.

2015 ◽  
pp. 1231-1245
Author(s):  
Madjid Tavana ◽  
Dawn A. Trevisani ◽  
Dennis T. Kennedy

The increasing complexity in Military Command and Control (C2) systems has led to greater vulnerability due to system availability and integrity caused by internal vulnerabilities and external threats. Several studies have proposed measures of availability and integrity for the assets in the C2 systems using precise and certain measures (i.e., the exact number of attacks on the availability and the integrity, the number of countermeasures for the availability and integrity attacks, the effectiveness of the availability and integrity countermeasure in eliminating the threats, and the financial impact of each attack on the availability and integrity of the assets). However, these measures are often uncertain in real-world problems. The source of uncertainty can be vagueness or ambiguity. Fuzzy logic and fuzzy sets can represent vagueness and ambiguity by formalizing inaccuracies inherent in human decision-making. In this paper, the authors extend the risk assessment literature by including fuzzy measures for the number of attacks on the availability and the integrity, the number of countermeasures for the availability and integrity attacks, and the effectiveness of the availability and integrity countermeasure in eliminating these threats. They analyze the financial impact of each attack on the availability and integrity of the assets and propose a comprehensive cyber-risk assessment system for the Military C2 in the fuzzy environment.


2016 ◽  
Vol 08 (02) ◽  
pp. 68-78
Author(s):  
Lance L P GORE

The overhaul of the People’s Liberation Army will move it away from its Soviet-style command and control structures towards the American model, which is believed to be more adapted to the new security environment and facilitates long distance power projection to protect China’s far-flung national interest abroad. The Communist Party’s organisational presence is reaffirmed to ensure the loyalty of the military as the Party considers it the ultimate source of its power and final defence of its rule.


2012 ◽  
Vol 229-231 ◽  
pp. 2737-2740
Author(s):  
Li Lin ◽  
Lian Fei He

This paper analyzed the composition of the multiple agent system, and combine with the characteristics of simulation in multiple agent. This paper proposed a supply chain system structure based on the coordination center, to achieve communications between any two entities through the coordination center. This paper constructed the agent module chart of coordination center, suppliers, producers and distributors, and expounds the function and task flow of the coordination center, and design the mechanism for data transfer between modules, in order to realize the data exchange between different entities. In this model, the coordination center takes effective measures like effectively plan, coordination, dispatch and control for the logistics, cash flow and information flow of supply chain. So it has a good reference value for the practical application of supply chain model.


2014 ◽  
Vol 1 (3) ◽  
pp. 21-36 ◽  
Author(s):  
Madjid Tavana ◽  
Dawn A. Trevisani ◽  
Dennis T. Kennedy

The increasing complexity in Military Command and Control (C2) systems has led to greater vulnerability due to system availability and integrity caused by internal vulnerabilities and external threats. Several studies have proposed measures of availability and integrity for the assets in the C2 systems using precise and certain measures (i.e., the exact number of attacks on the availability and the integrity, the number of countermeasures for the availability and integrity attacks, the effectiveness of the availability and integrity countermeasure in eliminating the threats, and the financial impact of each attack on the availability and integrity of the assets). However, these measures are often uncertain in real-world problems. The source of uncertainty can be vagueness or ambiguity. Fuzzy logic and fuzzy sets can represent vagueness and ambiguity by formalizing inaccuracies inherent in human decision-making. In this paper, the authors extend the risk assessment literature by including fuzzy measures for the number of attacks on the availability and the integrity, the number of countermeasures for the availability and integrity attacks, and the effectiveness of the availability and integrity countermeasure in eliminating these threats. They analyze the financial impact of each attack on the availability and integrity of the assets and propose a comprehensive cyber-risk assessment system for the Military C2 in the fuzzy environment.


Author(s):  
V. Pryimak

The article contains the rationale for the thesis that the prevention of corruption is now one of the priorities in the activities of military command and control bodies. Obtaining objective, reliable and reliable conclusions, proposals and recommendations on this problem largely depends on the correct choice of methods of scientific research. Despite a large number of scientific studies related to the legal principles of combating corruption in all areas of public administration, the article identifies certain patterns of the methods of scientific knowledge used in them. The article proves that the methodology of scientific research of the legal aspects of preventing corruption offenses in military command and control bodies is a set of techniques and methods produced by legal and other sciences, the application of which allows a comprehensive study of the subject of research. An element of the system of research methodology for the prevention of corruption offenses is a method – a special way of carrying out scientific activities, allows you to obtain information and data on certain legal phenomena or processes. The article proves that the study of the legal aspects of preventing corruption offenses in the military command and control bodies requires the use of two groups of methods: general, which are used in all branches of scientific knowledge, and special, inherent exclusively in legal science. The general methods, the use of which would be advisable in the study of the phenomenon of corruption in the aspect of the problems we are considering, include the methods of analysis and synthesis, deduction and induction borrowed from logic, the system-structural method produced in systems theory, the modeling method, and a number of others. These methods represent the methods of scientific knowledge of the phenomenon of preventing corruption, classic for modern legal research. Certain features of the subject of the study of expediency determine the use of synergetic, praxeological, axiological and other methods. The special methods of scientific knowledge of the laws of preventing corruption offenses in the military command and control bodies include historical-legal and comparative-legal methods, as well as formal dogmatic, technical-legal, legal-semantic and other methods inherent in legal sciences.


Sign in / Sign up

Export Citation Format

Share Document