Preface | p. iii |
Figures | p. xi |
Tables | p. xv |
Acknowledgments | p. xvii |
Abbreviations | p. xix |
Introduction | p. 1 |
From Old Challenges to New | p. 2 |
How This Volume Is Organized | p. 6 |
New Challenges for Defense | |
Introduction to Part I | p. 10 |
Decisionmaking for Defense | p. 13 |
Deciding What Decisions Must Be Made | p. 14 |
Deciding Who Makes the Decisions | p. 15 |
Deciding How to Allocate Resources | p. 19 |
Deciding What Investments to Make | p. 22 |
Alternative Approaches to Decisionmaking | p. 27 |
Alternative Decisionmaking Styles | p. 29 |
Looking to the Future | p. 31 |
Responding to Asymmetric Threats | p. 33 |
From the Cold War to the Present | p. 34 |
Examples of Asymmetric Threats | p. 39 |
How Would Adversaries Shape Asymmetric Threats? | p. 40 |
The Importance of Surprise and Anonymity | p. 43 |
Challenge and Response Cycles | p. 45 |
The Challenge of Weapons of Mass Destruction | p. 47 |
A Framework for Responding to Asymmetric Threats | p. 49 |
Institutionalization Through Protection | p. 50 |
Institutionalization Through Threat Management | p. 56 |
Internationalization | p. 63 |
Conclusions | p. 66 |
What Information Architecture for Defense? | p. 67 |
What Is Architecture? | p. 68 |
The Global Information Grid | p. 70 |
Need There Be Architecture? | p. 72 |
Architecture Follows Culture? | p. 73 |
DoD as an Institution in Its Own League | p. 74 |
Elements of Architecture | p. 78 |
Collection | p. 78 |
Access | p. 80 |
Presentation | p. 82 |
Networking | p. 84 |
Knowledge Maintenance and Management | p. 86 |
Security | p. 89 |
Interoperability | p. 90 |
Integration | p. 93 |
The Need to Think Now | p. 94 |
Coping with Uncertainty | |
Introduction to Part II | p. 98 |
Incorporating Information Technology in Defense Planning | p. 103 |
Modest Propositions About the Future | p. 103 |
Real Revolutions on the Physical Battlefield | p. 107 |
Hitting What Can Be Seen | p. 107 |
From Contingency to Necessity | p. 112 |
The Coming Architecture of Military Organization | p. 114 |
Conventional War, Hyperwar, and Mud Warfare | p. 117 |
False Revolutions on the Virtual Battlefield | p. 119 |
What Is Information Warfare? | p. 119 |
Antisensor Operations | p. 121 |
Electronic Warfare | p. 123 |
Command-and-Control Warfare | p. 124 |
Psychological Operations | p. 125 |
The Ghost in the Machine | p. 126 |
The Lesson of September 11 | p. 128 |
Uncertainty-Sensitive Planning | p. 131 |
Why So Many Surprises? | p. 132 |
Conceptual Strategic Planning | p. 134 |
Uncertainty-Sensitive Strategic Planning | p. 134 |
Operationalizing Strategic Planning in Portfolio-Management Terms | p. 138 |
Capabilities-Based Planning | p. 141 |
Key Features | p. 142 |
Information Technology and Mission-System Analysis | p. 144 |
Multiple Objectives and Measures | p. 145 |
The Concept of a Scenario Space (an Assumptions Space) | p. 146 |
Choices and Resource Allocation | p. 151 |
Planning the Future Military Workforce | p. 157 |
Military Human Capital | p. 159 |
Historical Size, Source, and Composition of the Active Force | p. 159 |
Ongoing Revolutions: Composition, Characteristics, and Attributes | p. 165 |
Looking to the Future | p. 169 |
Manpower and Personnel Analysis | p. 172 |
The Process | p. 172 |
Choosing Among Alternatives, an Example | p. 174 |
The Soldier of the 21st Century | p. 181 |
Visions of the Future | p. 182 |
Cyber Soldier | p. 182 |
Information Warrior | p. 183 |
Peace Operations | p. 184 |
Rapid Response Force | p. 184 |
Low-Manning Vessels | p. 184 |
Evolutionary Change | p. 185 |
Experience of the All-Volunteer Force | p. 186 |
Versatility and Leadership | p. 187 |
Attracting Quality Personnel | p. 189 |
Economic Theories of Compensation | p. 199 |
Issues for the Future | p. 207 |
Adapting Best Commercial Practices to Defense | p. 211 |
What Is a Best Commercial Practice? | p. 213 |
Examples | p. 213 |
Commercial Practice: Neither Monolithic nor Easy to Define | p. 214 |
Why DoD Should Care | p. 215 |
A BCP That DoD Uses Today: Lean Production | p. 217 |
What About Best Government Practice? | p. 218 |
Operational Total Quality Management and BCPs | p. 219 |
Key Benefits of TQM: Links Between Customers and Processes, and Continuous Improvement of Resulting System | p. 219 |
TQM Viewed with Great Suspicion by Many in DoD | p. 222 |
Identifying BCPs | p. 223 |
Adapting BCPs for Use in DoD | p. 224 |
Structural Differences Between DoD and Most Best Commercial Firms | p. 227 |
An Illustrative Example: Strategic Sourcing as a Basket of BCPs | p. 231 |
BCPs Relevant to DoD's Strategic Goals | p. 233 |
Key Barriers to DoD's Adaptation of Sourcing BCPs | p. 239 |
Insights from Commercial Experience on Overcoming Key Barriers | p. 242 |
New Tools for Defense Decisionmaking | |
Introduction to Part III | p. 248 |
Exploratory Analysis and Implications for Modeling | p. 255 |
Introduction | p. 255 |
Exploratory Analysis | p. 256 |
Definition | p. 256 |
Types of Uncertainty in Modeling | p. 258 |
Types of Exploratory Analysis | p. 259 |
Enabling Exploratory Analysis | p. 265 |
Using Occam's Razor | p. 269 |
Multiresolution, Multiperspective Modeling and Model Families | p. 270 |
Lessons from Recent Experience | p. 278 |
Reflecting Uncertainty with Parameters, an Example | p. 282 |
Using Exploratory Modeling | p. 285 |
The Need for Exploratory Modeling | p. 285 |
The Joint Integrated Contingency Model | p. 286 |
Sensitivity Analysis and Exploratory Modeling | p. 288 |
Doing Exploratory Modeling | p. 290 |
The Value of Exploratory Modeling | p. 297 |
Assessing Military Information Systems | p. 299 |
Historical Perspective | p. 300 |
Context for Assessing Military Information Systems in the 21st Century | p. 304 |
Additional Complicating and Supporting Factors | p. 307 |
NATO Code of Best Practice | p. 309 |
Advances over the Past 25 Years | p. 319 |
Residual Challenges: A New Agenda | p. 320 |
The "Day After" Methodology and National Security Analysis | p. 323 |
The Methodology in Brief | p. 324 |
Applications and Exercise Development | p. 326 |
Strategic Information Warfare | p. 327 |
Cyberpayments and Money Laundering | p. 330 |
Comparison of the Two Implementations of the Methodology | p. 333 |
The Day After and Analytic Independence | p. 335 |
The Value of the Day After | p. 337 |
Using Electronic Meeting Systems to Aid Defense Decisions | p. 339 |
Electronic Meeting Systems | p. 340 |
Prioritizing Naval Programs: An Example of an EMS in Use | p. 342 |
The Challenge | p. 342 |
Overview of Methodology | p. 344 |
Other Possible Uses | p. 358 |
Afterword | p. 361 |
Index | p. 363 |
About the Authors | p. 389 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.