Realizing the Potential of C4I

Realizing the Potential of C4I
Author: National Research Council
Publisher: National Academies Press
Total Pages: 299
Release: 1999-06-17
Genre: Technology & Engineering
ISBN: 0309064856

Rapid progress in information and communications technologies is dramatically enhancing the strategic role of information, positioning effective exploitation of these technology advances as a critical success factor in military affairs. These technology advances are drivers and enablers for the "nervous system" of the militaryâ€"its command, control, communications, computers, and intelligence (C4I) systemsâ€"to more effectively use the "muscle" side of the military. Authored by a committee of experts drawn equally from the military and commercial sectors, Realizing the Potential of C4I identifies three major areas as fundamental challenges to the full Department of Defense (DOD) exploitation of C4I technologyâ€"information systems security, interoperability, and various aspects of DOD process and culture. The book details principles by which to assess DOD efforts in these areas over the long term and provides specific, more immediately actionable recommendations. Although DOD is the focus of this book, the principles and issues presented are also relevant to interoperability, architecture, and security challenges faced by government as a whole and by large, complex public and private enterprises across the economy.

Realizing the Potential of C4I

Realizing the Potential of C4I
Author: Committee to Review DOD C4I Plans and Programs
Publisher: National Academies Press
Total Pages: 299
Release: 1999-05-31
Genre: Political Science
ISBN: 0309518733

Rapid progress in information and communications technologies is dramatically enhancing the strategic role of information, positioning effective exploitation of these technology advances as a critical success factor in military affairs. These technology advances are drivers and enablers for the "nervous system" of the military—its command, control, communications, computers, and intelligence (C4I) systems—to more effectively use the "muscle" side of the military. Authored by a committee of experts drawn equally from the military and commercial sectors, Realizing the Potential of C4I identifies three major areas as fundamental challenges to the full Department of Defense (DOD) exploitation of C4I technology—information systems security, interoperability, and various aspects of DOD process and culture. The book details principles by which to assess DOD efforts in these areas over the long term and provides specific, more immediately actionable recommendations. Although DOD is the focus of this book, the principles and issues presented are also relevant to interoperability, architecture, and security challenges faced by government as a whole and by large, complex public and private enterprises across the economy.

Cybersecurity Today and Tomorrow

Cybersecurity Today and Tomorrow
Author: National Research Council
Publisher: National Academies Press
Total Pages: 50
Release: 2002-04-12
Genre: Computers
ISBN: 0309083125

This report reviews past NRC studies that have examined various dimensions of computer and network security and vulnerability and brings the results forward into the context of the current environment of security and vulnerability. The review includes work done since 1991, such as Computers at Risk (1991), Cryptography's Role in Securing the Information Society (1996), For the Record: Protecting Electronic Health Information (1997), Trust in Cyberspace (1999), Continued Review of the Tax Systems Modernization of the Internal Revenue Service (1996), Realizing the Potential of C4I (1999), and Embedded, Everywhere (2001).

A Review of the FBI's Trilogy Information Technology Modernization Program

A Review of the FBI's Trilogy Information Technology Modernization Program
Author: National Research Council
Publisher: National Academies Press
Total Pages: 78
Release: 2004-06-10
Genre: Computers
ISBN: 0309092248

The Federal Bureau of Investigation (FBI) is in the process of developing a modern information technology (IT) systemâ€"the Trilogy programâ€" that is designed to provide a high-speed network, modern workstations and software, and an applicationâ€"the Virtual Case File (VCF)â€"to enhance the ability of agents to organize, access, and analyze information. Implementation of this system has encountered substantial difficulties, however, and has been the subject of much investigation and congressional concern. To help address these problems, the FBI asked the National Research Council (NRC) to undertake a quick review of the program and the progress that has been made to date. This report presents that review. The current status of four major aspects of the programâ€"the enterprise architecture, system design, program management, and human resourcesâ€"are discussed, and recommendations are presented to address the problems.

Trillions for Military Technology

Trillions for Military Technology
Author: J. Alic
Publisher: Springer
Total Pages: 270
Release: 2007-09-03
Genre: History
ISBN: 0230606873

Trillions for Military Technology explains why the weapons purchased by the U.S. Department of Defense cost so much, why it takes decades to get them into production even as innovation in the civilian economy becomes ever more frenetic, and why some of those weapons don't work very well despite expenditures of many billions of dollars. It also explains what do about these problems. The author argues that the internal politics of the armed services make weapons acquisition almost unmanageable. Solutions require empowering civilian officials and reforms that will bring choice of weapons "into the sunshine" of public debate.

Crisis Management: Concepts, Methodologies, Tools, and Applications

Crisis Management: Concepts, Methodologies, Tools, and Applications
Author: Management Association, Information Resources
Publisher: IGI Global
Total Pages: 1792
Release: 2013-11-30
Genre: Technology & Engineering
ISBN: 1466647086

"This book explores the latest empirical research and best real-world practices for preventing, weathering, and recovering from disasters such as earthquakes or tsunamis to nuclear disasters and cyber terrorism"--Provided by publisher.

Preparing the U.S. Army for Homeland Security

Preparing the U.S. Army for Homeland Security
Author: Eric V. Larson
Publisher: Rand Corporation
Total Pages: 345
Release: 2001-03-26
Genre: Political Science
ISBN: 0833032496

Homeland security encompasses five distinct missions: domestic preparednessand civil support in case of attacks on civilians, continuity of government, continuity ofmilitary operations, border and coastal defense, and national missile defense. This reportextensively details four of those mission areas (national missile defense having beencovered in great detail elsewhere). The authors define homeland security and its missionareas, provide a methodology for assessing homeland security response options, and reviewrelevant trend data for each mission area. They also assess the adequacy of the doctrine,organizations, training, leadership, materiel, and soldier systems and provide illustrativescenarios to help clarify Army planning priorities. The report concludes with options andrecommendations for developing more cost-effective programs and recommends a planningframework that can facilitate planning to meet homeland security needs.

Information Technology for Counterterrorism

Information Technology for Counterterrorism
Author: National Research Council
Publisher: National Academies Press
Total Pages: 145
Release: 2003-04-07
Genre: Computers
ISBN: 0309087368

Information technology (IT) is essential to virtually all of the nation's critical infrastructures making them vulnerable by a terrorist attack on their IT system. An attack could be on the system itself or use the IT system to launch or exacerbate another type of attack. IT can also be used as a counterterrorism tool. The report concludes that the most devastating consequences of a terrorist attack would occur if it were on or used IT as part of a broader attack. The report presents two recommendations on what can be done in the short term to protect the nation's communications and information systems and several recommendations about what can be done over the longer term. The report also notes the importance of considering how an IT system will be deployed to maximize protection against and usefulness in responding to attacks.

Experimental Games

Experimental Games
Author: Patrick Jagoda
Publisher: University of Chicago Press
Total Pages: 403
Release: 2020-12-07
Genre: Social Science
ISBN: 022663003X

In our unprecedentedly networked world, games have come to occupy an important space in many of our everyday lives. Digital games alone engage an estimated 2.5 billion people worldwide as of 2020, and other forms of gaming, such as board games, role playing, escape rooms, and puzzles, command an ever-expanding audience. At the same time, “gamification”—the application of game mechanics to traditionally nongame spheres, such as personal health and fitness, shopping, habit tracking, and more—has imposed unprecedented levels of competition, repetition, and quantification on daily life. Drawing from his own experience as a game designer, Patrick Jagoda argues that games need not be synonymous with gamification. He studies experimental games that intervene in the neoliberal project from the inside out, examining a broad variety of mainstream and independent games, including StarCraft, Candy Crush Saga, Stardew Valley, Dys4ia, Braid, and Undertale. Beyond a diagnosis of gamification, Jagoda imagines ways that games can be experimental—not only in the sense of problem solving, but also the more nuanced notion of problem making that embraces the complexities of our digital present. The result is a game-changing book on the sociopolitical potential of this form of mass entertainment.

State Voter Registration Databases

State Voter Registration Databases
Author: National Research Council
Publisher: National Academies Press
Total Pages: 74
Release: 2008-05-17
Genre: Political Science
ISBN: 0309118786

The Help America Vote Act of 2002 requires the states to develop a single, computerized voter registration data base (VRD) that is defined, maintained, and administered at the state level. To help the states with this task, the U.S. Election Assistance Commission asked the NRC to organize a series of workshops and prepare an interim report addressing the challenges in implementing and maintaining state VRDs. The EAC also asked the NRC to advise the states on how to evolve and maintain the databases so that they can share information with each other. This report provides an examination of various challenges to the deployment of state VRDs and describes potential solutions to these challenges. This interim report's primary focus is on shorter-term recommendations although a number of long-range recommendations are presented. The final report will elaborate on the long-range questions and address considerations about interstate interoperability of the VRDs.