Search results
1 – 10 of over 51000Dorothy G. Dologite, Robert J. Mockler and Marc E. Gartenfeld
This article describes a research project answering the question "Can advanced information systems, such as expert knowledge-based systems help in business strategy formulation?"
Imoh Antai and Roland Hellberg
Management and risk techniques within industries have been studied from various disciplines in nondefense-affiliated industries. Given the assumption that these techniques…
Abstract
Purpose
Management and risk techniques within industries have been studied from various disciplines in nondefense-affiliated industries. Given the assumption that these techniques, strategies and mitigations used in one industry apply to other similar industries, this paper examines the defense industry for risk assessment. We characterize interactions for onward application to risk identification in the defense industry.
Design/methodology/approach
This research employs a systems theory approach to the characterization of industry interactions, using three dimensions including environment, boundaries and relationships. It develops a framework for identifying relationship types within system-of-systems (SoS) environments by analyzing the features of interactions that occur in such environments.
Findings
The study’s findings show that different systems environments within the defense industry SoS exhibit different interaction characteristics and hence display different relationship patterns, which can indicate potential vulnerabilities.
Research limitations/implications
By employing interaction as a means for evaluating potential risks, this research emphasizes the role played by relationship factors in reducing perceived risks and simultaneously increasing trust.
Originality/value
This paper intends to develop an initial snapshot of the relationship status of the Swedish defense industry in light of the global consolidation in this industry, which is a relevant contextual contribution.
Details
Keywords
This paper presents a survey of research into interactive robotic systems for the purpose of identifying the state of the art capabilities as well as the extant gaps in this…
Abstract
Purpose
This paper presents a survey of research into interactive robotic systems for the purpose of identifying the state of the art capabilities as well as the extant gaps in this emerging field. Communication is multimodal. Multimodality is a representation of many modes chosen from rhetorical aspects for its communication potentials. The author seeks to define the available automation capabilities in communication using multimodalities that will support a proposed Interactive Robot System (IRS) as an AI mounted robotic platform to advance the speed and quality of military operational and tactical decision making.
Design/methodology/approach
This review will begin by presenting key developments in the robotic interaction field with the objective of identifying essential technological developments that set conditions for robotic platforms to function autonomously. After surveying the key aspects in Human Robot Interaction (HRI), Unmanned Autonomous System (UAS), visualization, Virtual Environment (VE) and prediction, the paper then proceeds to describe the gaps in the application areas that will require extension and integration to enable the prototyping of the IRS. A brief examination of other work in HRI-related fields concludes with a recapitulation of the IRS challenge that will set conditions for future success.
Findings
Using insights from a balanced cross section of sources from the government, academic, and commercial entities that contribute to HRI a multimodal IRS in military communication is introduced. Multimodal IRS (MIRS) in military communication has yet to be deployed.
Research limitations/implications
Multimodal robotic interface for the MIRS is an interdisciplinary endeavour. This is not realistic that one can comprehend all expert and related knowledge and skills to design and develop such multimodal interactive robotic interface. In this brief preliminary survey, the author has discussed extant AI, robotics, NLP, CV, VDM, and VE applications that is directly related to multimodal interaction. Each mode of this multimodal communication is an active research area. Multimodal human/military robot communication is the ultimate goal of this research.
Practical implications
A multimodal autonomous robot in military communication using speech, images, gestures, VST and VE has yet to be deployed. Autonomous multimodal communication is expected to open wider possibilities for all armed forces. Given the density of the land domain, the army is in a position to exploit the opportunities for human–machine teaming (HMT) exposure. Naval and air forces will adopt platform specific suites for specially selected operators to integrate with and leverage this emerging technology. The possession of a flexible communications means that readily adapts to virtual training will enhance planning and mission rehearsals tremendously.
Social implications
Interaction, perception, cognition and visualization based multimodal communication system is yet missing. Options to communicate, express and convey information in HMT setting with multiple options, suggestions and recommendations will certainly enhance military communication, strength, engagement, security, cognition, perception as well as the ability to act confidently for a successful mission.
Originality/value
The objective is to develop a multimodal autonomous interactive robot for military communications. This survey reports the state of the art, what exists and what is missing, what can be done and possibilities of extension that support the military in maintaining effective communication using multimodalities. There are some separate ongoing progresses, such as in machine-enabled speech, image recognition, tracking, visualizations for situational awareness, and virtual environments. At this time, there is no integrated approach for multimodal human robot interaction that proposes a flexible and agile communication. The report briefly introduces the research proposal about multimodal interactive robot in military communication.
Details
Keywords
Tommie L. Ellis, Robert A. Nicholson, Antoinette Y. Briggs, Scott A. Hunter, James E. Harbison, Paul S. Saladna, Michael W. Garris, Robert K. Ohnemus, John E. O’Connor and Steven B. Reynolds
Rising operational costs and software sustainment concerns have driven the Air Force to move to newer technology to ensure that the Air Force Standard Base Supply System (SBSS…
Abstract
Purpose
Rising operational costs and software sustainment concerns have driven the Air Force to move to newer technology to ensure that the Air Force Standard Base Supply System (SBSS) can continue to provide affordable and sustainable mission support in the years to come. This paper aims to summarize the successful software modernization effort the Air Force undertook to achieve that objective.
Design/methodology/approach
The paper describes the preliminary system updates that were required to isolate the SBSS software from all internal and external system and user interfaces in preparation for the subsequent successful code roll effort. Once the legacy SBSS component was fully isolated, the SBSS software modernization objective was achieved via a “code roll” conversion of the SBSS software from legacy COBOL to Java code, and movement of the integrated logistics system-supply application from a proprietary information technology (IT) platform to an open IT operating environment.
Findings
The SBSS system modernization yielded immediate and significant IT operational cost reductions and provided an important foundation for achieving Air Force logistics system consolidation and cloud computing objectives going forward.
Originality/value
The SBSS modernization experience should be useful in assisting similar data system software modernization efforts.
Details
Keywords
Lee Evans and Ki-Hwan Bae
The paper aims to estimates the limitations of a forced distribution performance appraisal system in identifying the highest performing individuals within an organization…
Abstract
Purpose
The paper aims to estimates the limitations of a forced distribution performance appraisal system in identifying the highest performing individuals within an organization. Traditionally, manpower modeling allows organizations to develop plans that meet future human resource requirements by modeling the flow of personnel within an organization. The aim is to quantify the limitations of a performance appraisal system in identifying the best-qualified individuals to fill future requirements.
Design/methodology/approach
This paper describes an exploratory study using discrete event simulation based on the assignment, evaluation and promotion history of over 2,500 officers in the US Army. The obtained data provide a basis for estimating simulation inputs that include system structure, system dynamics, human behavior and policy constraints. The simulation approach facilitates modeling officers who receive evaluations as they move throughout the system over time.
Findings
The paper provides insights into the effect of system structure and system dynamics on the evaluation outcome of employees. It suggests that decreasing the number of a rater’s subordinates has a significant effect on the accuracy of performance appraisals. However, increasing the amount of time individuals spend on each assignment has little effect on system accuracy.
Practical implications
This research allows an organization’s leadership to evaluate the possible consequences associated with evaluation policy prior to policy implementation.
Originality/value
This work advances a framework in assessing the effect of system dynamics and structure, and the extent to which they limit or enhance the accuracy of an organization’s forced distribution performance appraisal system.
Details
Keywords
Joe Garcia, Russell Shannon, Aaron Jacobson, William Mosca, Michael Burger and Roberto Maldonado
This paper aims to describe an effort to provide for a robust and secure software development paradigm intended to support DevSecOps in a naval aviation enterprise (NAE) software…
Abstract
Purpose
This paper aims to describe an effort to provide for a robust and secure software development paradigm intended to support DevSecOps in a naval aviation enterprise (NAE) software support activity (SSA), with said paradigm supporting strong traceability and provability concerning the SSA’s output product, known as an operational flight program (OFP). Through a secure development environment (SDE), each critical software development function performed on said OFP during its development has a corresponding record represented on a blockchain.
Design/methodology/approach
An SDE is implemented as a virtual machine or container incorporating software development tools that are modified to support blockchain transactions. Each critical software development function, e.g. editing, compiling, linking, generates a blockchain transaction message with associated information embedded in the output of a said function that, together, can be used to prove integrity and support traceability. An attestation process is used to provide proof that the toolchain containing SDE is not subject to unauthorized modification at the time said critical function is performed.
Findings
Blockchain methods are shown to be a viable approach for supporting exhaustive traceability and strong provability of development system integrity for mission-critical software produced by an NAE SSA for NAE embedded systems software.
Practical implications
A blockchain-based authentication approach that could be implemented at the OFP point-of-load would provide for fine-grain authentication of all OFP software components, with each component or module having its own proof-of-integrity (including the integrity of the used development tools) over its entire development history.
Originality/value
Many SSAs have established control procedures for development such as check-out/check-in. This does not prove the SSA output software is secure. For one thing, a build system does not necessarily enforce procedures in a way that is determinable from the output. Furthermore, the SSA toolchain itself could be attacked. The approach described in this paper enforces security policy and embeds information into the output of every development function that can be cross-referenced to blockchain transaction records for provability and traceability that only trusted tools, free from unauthorized modifications, are used in software development. A key original concept of this approach is that it treats assigned developer time as a transferable digital currency.
Details
Keywords
- Software development
- Blockchain
- Cybersecurity
- Operational flight program
- Secure development environment
- Secure virtual machine
- Zero trust
- Embedded systems
- Mission-critical systems
- OFP
- DevOps
- DevSecOps
- Software support activity
- SSA
- SDE
- Permissioned blockchain
- Cryptocurrency
- Time-limited authorization for developer action
- TADA
- Code signing
- Trusted software guard
- SGX
- Trusted eXecution technology
- TXT
- Trusted platform module
- Self-hosting
- Controlled access blockchain
- CABlock
- Role-based access control
- RBAC
This paper aims to raise awareness of a potential planning pitfall and provide recommendations on how to assess and improve upon current practices. In potential conflict areas…
Abstract
Purpose
This paper aims to raise awareness of a potential planning pitfall and provide recommendations on how to assess and improve upon current practices. In potential conflict areas, such as the Korean Theater of Operations (KTO), military forces are required to store a portion of their ammunition combat load within depots and ammunition supply points under the control of a servicing ammunition company. This necessitates a lengthy retrieval process, as the ammunition company does not have enough resources to serve all customers simultaneously.
Design/methodology/approach
The stored combat load (SCL) retrieval process is modeled as a parallel machine scheduling problem and simulated using synthetic requirements. The current system of retrieval is contrasted against a proposed alternate system through a series of simulations scaled across three factors: number of ammunition company Soldiers, number of customer units and number of magazines.
Findings
The proposed alternate system demonstrates a significant potential for reducing the makespan of the SCL retrieval process when more than half of the magazines store SCL for multiple customers and there are more than five customers per Soldier.
Originality/value
Transitioning military units from a peacetime standing to full combat readiness as quickly as possible is of immense value within the KTO and other hostile areas with established troops not actively engaged in combat.
Details
Keywords
The purpose of this research is to assess the current level of systems literacy of air force logisticians in Nigeria.
Abstract
Purpose
The purpose of this research is to assess the current level of systems literacy of air force logisticians in Nigeria.
Design/methodology/approach
This research undertook an assessment of the knowledge of air force logistics officers on systems thinking with the aid of a qualitative questionnaire. The questionnaire featured questions on the level of literacy and application of systems thinking by air force logisticians in Nigeria.
Findings
The research finds that the majority of the air force logistics officers have very low levels of knowledge and training in systems thinking.
Originality/value
The research is a unique effort to ascertain the level of systems thinking literacy and training in air force logistics in Nigeria. The study presents a baseline and justification for intervention through an improvement of the logistics curricula used in air force training institutions in Nigeria.
Details
Keywords
Joan Mileski, Christopher Clott and Cassia Bomer Galvao
The maritime industry is increasingly impacted by the Internet of things (IoT) through the automation of ships and port activities. This increased automation creates new security…
Abstract
Purpose
The maritime industry is increasingly impacted by the Internet of things (IoT) through the automation of ships and port activities. This increased automation creates new security vulnerabilities for the maritime industry in cyberspace. Any obstruction in the global supply chain due to a cyberattack can cause catastrophic problems in the global economy. This paper aims to review automatic identification systems (AISs) aboard ships for cyber issues and weaknesses.
Design/methodology/approach
The authors do so by comparing the results of two receiver systems of the AIS in the Port of Houston; the JAMSS system aboard the Space Station and the “Harborlights” system for traffic control in the Port.
Findings
The authors find that inconsistent information is presented on the location of same ships at the same time in the Port. Upon further investigation with pilots, the authors find that these inconsistencies may be the result of the strength of power with which an AIS is transmitted. It appears the power may be reduced to the AIS in port but that it varies within port and varies by pilot operators. This practice may open the AIS system for tampering.
Originality/value
Further, this inconsistency may require further policy regulation to properly address cyber information in a port.
Details
Keywords
Shih-Liang Chao and Ya-Lan Lin
This study has two purposes. The first is to identify the determinants influencing the selection of a container number recognition system via a quantitative method to thereby…
Abstract
Purpose
This study has two purposes. The first is to identify the determinants influencing the selection of a container number recognition system via a quantitative method to thereby establish an evaluation structure. The second purpose is to conduct an empirical study to determine the weights of the criteria and alternatives.
Design/methodology/approach
The exploratory factor analysis (EFA) and fuzzy analytic hierarchy process (AHP) were applied to determine the evaluation structure and weights of the criteria and alternatives, respectively.
Findings
An empirical study based on a dedicated terminal at Keelung Port is conducted. The result demonstrates that the radio-frequency identification (RFID) system is a suitable system for the terminal under consideration in this study.
Originality/value
The value of this study is twofold. First, EFA was applied to extract common factors from a wide questionnaire survey, thereby establishing a hierarchical analysis structure. This method and comprehensive evaluation structure are useful references for both practitioners and researchers to deal with problems of gate automation. Second, fuzzy AHP was used to decide the weights of the hierarchical structure. The weights obtained by this method are more objective and rational as the imprecision expressions in returned samples have been considered and dealt with.
Details