File:Trust and influence in the information age operational requirements for network centric warfare (IA trustndinfluence109451313).pdf
Original file (1,275 × 1,650 pixels, file size: 726 KB, MIME type: application/pdf, 114 pages)
Captions
Summary[edit]
Trust and influence in the information age operational requirements for network centric warfare ( ) | ||
---|---|---|
Author |
Blatt, Nicole I. |
|
Title |
Trust and influence in the information age operational requirements for network centric warfare |
|
Publisher |
Monterey, California. Naval Postgraduate School |
|
Description |
Military leaders and scholars alike debate the existence of a revolution in military affairs (RMA) based on information technology. This thesis will show that the Information RMA not only exists, but will also reshape how we plan, operate, educate, organize, train, and equip forces for the 21st century. This thesis introduces the Communication Technology (CommTech) Model to explain how communication technologies affect organizations, leadership styles, and decision-making processes. Due to the growth in networking enterprises, leaders will have to relinquish their tight, centralized control over subordinates. Instead, they will have to perfect their use of softer power skills such as influence and trust as they embrace decentralized decision-making. Network Centric Warfare, Self-Synchronization, and Network Enabled Operations are concepts that provide the framework for integrating information technology into the battlespace. The debate that drives centralized versus decentralized control in network operations is analyzed with respect to the CommTech Model. A new term called Operational Trust is introduced and developed, identifying ways to make it easier to build trust among network entities. Finally, the thesis focuses on what leaders need to do to shape network culture for effective operations. Subjects: Netcentric computing; United States; Information technology; Information RMA; Network Centric Warfare; Communications Technology Model; Trust; Network Enabled Operations; Centralized Control, Influence; Self-synchronization; Decision-Making; Leadership; Operational Trust; Decentralized Execution |
|
Language | English | |
Publication date | December 2004 | |
Current location |
IA Collections: navalpostgraduateschoollibrary; fedlink |
|
Accession number |
trustndinfluence109451313 |
|
Source | ||
Permission (Reusing this file) |
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States. |
Licensing[edit]
Public domainPublic domainfalsefalse |
This work is in the public domain in the United States because it is a work prepared by an officer or employee of the United States Government as part of that person’s official duties under the terms of Title 17, Chapter 1, Section 105 of the US Code.
Note: This only applies to original works of the Federal Government and not to the work of any individual U.S. state, territory, commonwealth, county, municipality, or any other subdivision. This template also does not apply to postage stamp designs published by the United States Postal Service since 1978. (See § 313.6(C)(1) of Compendium of U.S. Copyright Office Practices). It also does not apply to certain US coins; see The US Mint Terms of Use.
|
||
This file has been identified as being free of known restrictions under copyright law, including all related and neighboring rights. |
https://creativecommons.org/publicdomain/mark/1.0/PDMCreative Commons Public Domain Mark 1.0falsefalse
File history
Click on a date/time to view the file as it appeared at that time.
Date/Time | Thumbnail | Dimensions | User | Comment | |
---|---|---|---|---|---|
current | 15:09, 25 July 2020 | 1,275 × 1,650, 114 pages (726 KB) | Fæ (talk | contribs) | FEDLINK - United States Federal Collection trustndinfluence109451313 (User talk:Fæ/IA books#Fork8) (batch 1993-2020 #31049) |
You cannot overwrite this file.
File usage on Commons
The following 2 pages use this file:
File usage on other wikis
The following other wikis use this file:
- Usage on ar.wikipedia.org
- Usage on eo.wikipedia.org
- Usage on no.wikipedia.org
- Usage on www.wikidata.org
Metadata
This file contains additional information such as Exif metadata which may have been added by the digital camera, scanner, or software program used to create or digitize it. If the file has been modified from its original state, some details such as the timestamp may not fully reflect those of the original file. The timestamp is only as accurate as the clock in the camera, and it may be completely wrong.
Short title | Trust and influence in the information age operational requirements for network centric warfare |
---|---|
Author | Blatt, Nicole I. |
Software used | Blatt, Nicole I. |
Conversion program | Acrobat Distiller 6.0.1 (Windows) |
Encrypted | no |
Page size | 612 x 792 pts (letter) |
Version of PDF format | 1.4 |