Pub Date : 2023-01-01DOI: 10.1177/15485129221141711
Jeremy Smith, T. Ringrose, S. Barker
Analysis of the literature related to wargaming identifies a requirement for the perception of immersion and engagement in wargaming. The references generally indicate that the computer is less able to facilitate collective engagement than a manual system; however, there is as yet little empirical evidence to support this. There are also suggestions that players perceive manual games differently to a computer wargame. An experiment, derived from the previous analysis, was performed to address the research question: Is there a discernible difference between the levels of players’ engagement in computer wargames versus manual wargames? The experiment provides empirical evidence that there is a difference in players’ engagement with a computer wargame compared to a manual game, in particular with the manual game providing greater engagement with other players. Hence, if engagement between players is to be encouraged and regarded as an important aspect of a wargame for defense applications, then this provides evidence that the manual approach can indeed be better.
{"title":"An experimental intervention to investigate user perceptions of computer versus manual board wargame","authors":"Jeremy Smith, T. Ringrose, S. Barker","doi":"10.1177/15485129221141711","DOIUrl":"https://doi.org/10.1177/15485129221141711","url":null,"abstract":"Analysis of the literature related to wargaming identifies a requirement for the perception of immersion and engagement in wargaming. The references generally indicate that the computer is less able to facilitate collective engagement than a manual system; however, there is as yet little empirical evidence to support this. There are also suggestions that players perceive manual games differently to a computer wargame. An experiment, derived from the previous analysis, was performed to address the research question: Is there a discernible difference between the levels of players’ engagement in computer wargames versus manual wargames? The experiment provides empirical evidence that there is a difference in players’ engagement with a computer wargame compared to a manual game, in particular with the manual game providing greater engagement with other players. Hence, if engagement between players is to be encouraged and regarded as an important aspect of a wargame for defense applications, then this provides evidence that the manual approach can indeed be better.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":"28 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81630027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-05DOI: 10.1177/15485129221141717
Jessica Afara, Victoria Ajila, Hannah Macdonell, P. Dobias
In this paper, we use an agent-based model (ABM) to run (counter)mobility scenarios to explore which characteristics of intermediate force capabilities (IFC) are relevant to these, and how they can affect outcomes in gray zone conflicts. Using an ABM called Map-Aware Non-Uniform Automata (MANA), developed by the New Zealand Defense Technology Agency, we implemented two scenarios where the friendly forces’ mobility was limited by large groups of civilians. Then, we employed data farming and analytics methods to analyze the data and identify key parameters influencing the outcomes. The main parameters appeared to be the IFC Range, Power (a measure of the duration of the effect), and Crowd Density. Future research could include a wide range of mobility scenarios and possibly a more detailed IFC representation.
{"title":"Use of agent-based modeling to model intermediate force capabilities in (counter)mobility crowd scenarios","authors":"Jessica Afara, Victoria Ajila, Hannah Macdonell, P. Dobias","doi":"10.1177/15485129221141717","DOIUrl":"https://doi.org/10.1177/15485129221141717","url":null,"abstract":"In this paper, we use an agent-based model (ABM) to run (counter)mobility scenarios to explore which characteristics of intermediate force capabilities (IFC) are relevant to these, and how they can affect outcomes in gray zone conflicts. Using an ABM called Map-Aware Non-Uniform Automata (MANA), developed by the New Zealand Defense Technology Agency, we implemented two scenarios where the friendly forces’ mobility was limited by large groups of civilians. Then, we employed data farming and analytics methods to analyze the data and identify key parameters influencing the outcomes. The main parameters appeared to be the IFC Range, Power (a measure of the duration of the effect), and Crowd Density. Future research could include a wide range of mobility scenarios and possibly a more detailed IFC representation.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":"55 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2022-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82891525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-21DOI: 10.1177/15485129221134632
Kerryn R. Owen, R. Chakrabortty
Building simulation models that are valid and credible is an enduring challenge in the Australian Defence Organisation (ADO) context. Establishing validity and credibility can be achieved through the rigorous use of appropriate Verification, Validation, and Accreditation (VVA) processes. Such processes are well-known in modeling and simulation (M&S) practice. However, these are generally not applied within the ADO, typically due to resourcing concerns and a lack of authoritative guidance. Even if there are any, due to security concerns and commercial reasons, the application of M&S within ADO is generally not published in open-access platforms. Depending on where in the M&S life-cycle VVA is started, it may also serve a secondary aim of risk reduction, assisting in the early discovery of possible problems or mistakes. This research reviews current VVA practices from academic literature and recommends processes that are appropriate for application to combat simulation tools within the ADO context. A scoping review has been conducted to gather insight into current VVA practice in the M&S community. The results of this review are presented in the form of charting relevant characteristics from selected references. The scoping review shows that executable validation of simulation results against referent data sourced from physical experiments is the most prevalent form of VVA, with referent data from comparative models being a prevalent alternative. Furthermore, there is evident reliance on graphical comparison of data; this could be enhanced with objective data comparators, such as aggregate error measures or statistical techniques. Finally, there is an evident gap in VVA references from Australia, which could be addressed through the propagation and reporting of prevalent VVA practices within the ADO context.
{"title":"Verification, validation, and accreditation for models and simulations in the Australian defence context: a review","authors":"Kerryn R. Owen, R. Chakrabortty","doi":"10.1177/15485129221134632","DOIUrl":"https://doi.org/10.1177/15485129221134632","url":null,"abstract":"Building simulation models that are valid and credible is an enduring challenge in the Australian Defence Organisation (ADO) context. Establishing validity and credibility can be achieved through the rigorous use of appropriate Verification, Validation, and Accreditation (VVA) processes. Such processes are well-known in modeling and simulation (M&S) practice. However, these are generally not applied within the ADO, typically due to resourcing concerns and a lack of authoritative guidance. Even if there are any, due to security concerns and commercial reasons, the application of M&S within ADO is generally not published in open-access platforms. Depending on where in the M&S life-cycle VVA is started, it may also serve a secondary aim of risk reduction, assisting in the early discovery of possible problems or mistakes. This research reviews current VVA practices from academic literature and recommends processes that are appropriate for application to combat simulation tools within the ADO context. A scoping review has been conducted to gather insight into current VVA practice in the M&S community. The results of this review are presented in the form of charting relevant characteristics from selected references. The scoping review shows that executable validation of simulation results against referent data sourced from physical experiments is the most prevalent form of VVA, with referent data from comparative models being a prevalent alternative. Furthermore, there is evident reliance on graphical comparison of data; this could be enhanced with objective data comparators, such as aggregate error measures or statistical techniques. Finally, there is an evident gap in VVA references from Australia, which could be addressed through the propagation and reporting of prevalent VVA practices within the ADO context.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":"19 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2022-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90789557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-21DOI: 10.1177/15485129221134530
Jeffrey A. Appleget
{"title":"Wargaming: a structured conversation","authors":"Jeffrey A. Appleget","doi":"10.1177/15485129221134530","DOIUrl":"https://doi.org/10.1177/15485129221134530","url":null,"abstract":"","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":"36 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2022-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79894214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-14DOI: 10.1177/15485129221134536
Phillip M. LaCasse, L. Champagne, Jonathan M Escamilla
Eligibility for enlistment into the US military is assessed by the United States Military Entrance Processing Command (USMEPCOM), an independent agency that reports to the Office of the Secretary of Defense (OSD) and not to any specific branch of military service. This research develops a discrete-event simulation for applicant processing operations at a Military Entrance Processing Station (MEPS) to investigate the viability of potential alternatives to the current applicant arrival and processing operation. Currently, all applicants arrive to the MEPS at the beginning of the processing day in a single batch. This research models and compares two alternatives with the status quo: split-shift processing, by which applicant arrivals occur in two batches: one at 06:00 and one at 11:00 and appointment-based processing, by which applicants may arrive during one of three, four, six, or eight appointment windows. Express-lane processing is also explored, in which applicants are allowed to bypass select processing stations. Experimental results indicate that split-shift processing is not viable under the current processing model due to an unacceptable decrease in applicant throughput. Results from appointment-based scenarios are mixed, with the critical factors being the time between appointment batches and their associated arrival times.
{"title":"Simulation analysis of applicant scheduling and processing alternatives at a military entrance processing station","authors":"Phillip M. LaCasse, L. Champagne, Jonathan M Escamilla","doi":"10.1177/15485129221134536","DOIUrl":"https://doi.org/10.1177/15485129221134536","url":null,"abstract":"Eligibility for enlistment into the US military is assessed by the United States Military Entrance Processing Command (USMEPCOM), an independent agency that reports to the Office of the Secretary of Defense (OSD) and not to any specific branch of military service. This research develops a discrete-event simulation for applicant processing operations at a Military Entrance Processing Station (MEPS) to investigate the viability of potential alternatives to the current applicant arrival and processing operation. Currently, all applicants arrive to the MEPS at the beginning of the processing day in a single batch. This research models and compares two alternatives with the status quo: split-shift processing, by which applicant arrivals occur in two batches: one at 06:00 and one at 11:00 and appointment-based processing, by which applicants may arrive during one of three, four, six, or eight appointment windows. Express-lane processing is also explored, in which applicants are allowed to bypass select processing stations. Experimental results indicate that split-shift processing is not viable under the current processing model due to an unacceptable decrease in applicant throughput. Results from appointment-based scenarios are mixed, with the critical factors being the time between appointment batches and their associated arrival times.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":"79 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73268539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-11DOI: 10.1177/15485129221131226
R. Bagrodia
The need to secure information and weapon systems against cyber threats is a critical objective for the US Department of Defense and its allied partners. Understanding the end-to-end performance of such systems under realistic operational conditions, including cyber disruptions, is critical for achieving mission goals. Identifying and mitigating shortfalls in operational performance under adverse operational conditions can provide significant value to our defense capabilities and directly save lives. As an illustrative example, we consider the Joint All Domain Command and Control (JADC2) system. JADC2 fundamentally relies on communications and networks to contain, extract, and disseminate time-sensitive, missionrelevant information to win decisively against opposing forces. Future conflicts are likely to involve attempts to disrupt information systems that are critical for JADC2 communication and for assured operation of highly sophisticated weapons systems. Disruption is already a capability of potential adversary forces and will spread to secondary threats allied to them. The complexity of a JADC2 combined cyber and kinetic battlefield requires the training, analysis, test, and evaluation communities to adequately account for potential impacts of degraded network operations and/or exploitation of cyber vulnerabilities on overall mission outcomes. This has motivated a significant amount of ongoing research and development into tools, techniques, and methodologies to assess cyber resiliency of military systems in general, and combat systems in particular. The complexity and interdependencies among combat systems and connections among them complicate current resiliency analysis methods. For example, a risk associated with a single point of failure in a network could be mitigated with redundant components, assuming that the failure is a random hardware failure. However, an unmitigated cyber vulnerability could result in identical failures in redundant components as well. Even if there is no vulnerability in the component itself, an attack that succeeds in interfering with timing of data exchanges, for example by loading a data bus, could result in degraded combat system performance. Similarly, establishing communication links through delayed, intermittently connected, low-bandwidth environments may require the relaying of information using multiple hops, which increases susceptibility to man-in-the-middle attacks. It is also the case that a cyber vulnerability in a weapon system is not necessarily a mission vulnerability, as exploiting that vulnerability may or may not impact the overall system capabilities needed to achieve mission objectives. To assure a mission against cyber threats, cyber resilience of the weapon system must be assessed in a realistic tactical environment, so as to:
{"title":"Using network digital twins to improve cyber resilience of missions","authors":"R. Bagrodia","doi":"10.1177/15485129221131226","DOIUrl":"https://doi.org/10.1177/15485129221131226","url":null,"abstract":"The need to secure information and weapon systems against cyber threats is a critical objective for the US Department of Defense and its allied partners. Understanding the end-to-end performance of such systems under realistic operational conditions, including cyber disruptions, is critical for achieving mission goals. Identifying and mitigating shortfalls in operational performance under adverse operational conditions can provide significant value to our defense capabilities and directly save lives. As an illustrative example, we consider the Joint All Domain Command and Control (JADC2) system. JADC2 fundamentally relies on communications and networks to contain, extract, and disseminate time-sensitive, missionrelevant information to win decisively against opposing forces. Future conflicts are likely to involve attempts to disrupt information systems that are critical for JADC2 communication and for assured operation of highly sophisticated weapons systems. Disruption is already a capability of potential adversary forces and will spread to secondary threats allied to them. The complexity of a JADC2 combined cyber and kinetic battlefield requires the training, analysis, test, and evaluation communities to adequately account for potential impacts of degraded network operations and/or exploitation of cyber vulnerabilities on overall mission outcomes. This has motivated a significant amount of ongoing research and development into tools, techniques, and methodologies to assess cyber resiliency of military systems in general, and combat systems in particular. The complexity and interdependencies among combat systems and connections among them complicate current resiliency analysis methods. For example, a risk associated with a single point of failure in a network could be mitigated with redundant components, assuming that the failure is a random hardware failure. However, an unmitigated cyber vulnerability could result in identical failures in redundant components as well. Even if there is no vulnerability in the component itself, an attack that succeeds in interfering with timing of data exchanges, for example by loading a data bus, could result in degraded combat system performance. Similarly, establishing communication links through delayed, intermittently connected, low-bandwidth environments may require the relaying of information using multiple hops, which increases susceptibility to man-in-the-middle attacks. It is also the case that a cyber vulnerability in a weapon system is not necessarily a mission vulnerability, as exploiting that vulnerability may or may not impact the overall system capabilities needed to achieve mission objectives. To assure a mission against cyber threats, cyber resilience of the weapon system must be assessed in a realistic tactical environment, so as to:","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":"45 1","pages":"97 - 106"},"PeriodicalIF":0.8,"publicationDate":"2022-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74493440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-22DOI: 10.1177/15485129221118094
Z. Korecki, Tomas Hoika, Jiří Ulvr, M. Janošek, Matúš Grega
The paper presents an experiment of air support of ground units at the level of battalion task force in an offensive operation. Statistical techniques were used in this approach to estimate the outcomes of the operation from the data generated by a simulation model. The experiment was conducted with the support of the Masa SWORD simulation technology for different scenarios involving the pilot characteristics, firing distances, range of air defense, and the use of different unit sensor capacities. As part of the different scenarios, we present sensor results for use in different attack scenarios with different enemy capabilities at the tactical level and the impact of air support of the battalion’s task force in destroying a company-sized enemy. The experiment allows evaluation of different pilot training levels, stress levels, and other climatic influences. These factors provide information on when and how (with what desired effect) a strike can be executed, by what means (systems) it is to be executed, and what the constraints are in executing it. The constraints are imposed by electronic warfare (EW), level of camouflage, and air defense. We have determined using the Masa SWORD simulation program that the use of helicopters to support the battalion task group will significantly reduce the loss of life and reduce the time to destroy the enemy.
{"title":"Simulation of the attack helicopter Mil Mi-24 conducting anti-surface air operations in support of a battalion task group","authors":"Z. Korecki, Tomas Hoika, Jiří Ulvr, M. Janošek, Matúš Grega","doi":"10.1177/15485129221118094","DOIUrl":"https://doi.org/10.1177/15485129221118094","url":null,"abstract":"The paper presents an experiment of air support of ground units at the level of battalion task force in an offensive operation. Statistical techniques were used in this approach to estimate the outcomes of the operation from the data generated by a simulation model. The experiment was conducted with the support of the Masa SWORD simulation technology for different scenarios involving the pilot characteristics, firing distances, range of air defense, and the use of different unit sensor capacities. As part of the different scenarios, we present sensor results for use in different attack scenarios with different enemy capabilities at the tactical level and the impact of air support of the battalion’s task force in destroying a company-sized enemy. The experiment allows evaluation of different pilot training levels, stress levels, and other climatic influences. These factors provide information on when and how (with what desired effect) a strike can be executed, by what means (systems) it is to be executed, and what the constraints are in executing it. The constraints are imposed by electronic warfare (EW), level of camouflage, and air defense. We have determined using the Masa SWORD simulation program that the use of helicopters to support the battalion task group will significantly reduce the loss of life and reduce the time to destroy the enemy.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":"32 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89404541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-21DOI: 10.1177/15485129221118937
Perry Comeau, A. Wall, E. Thornhill, S. McTavish, Richard G. Lee
Shipboard helicopter operations are much more challenging and complex than land-based operations due to many factors associated with the presence of the ship. To determine those conditions in which safe operations may occur, a First of Class Flight Trial (FOCFT) is conducted for every new ship–helicopter pair. This trial results in a Ship–Helicopter Operating Limit (SHOL) envelope that is used to document operational limits for regular operations. Conducting a FOCFT is a, expensive, and time-consuming task that requires testing all aspects of operations. Modeling and simulation efforts to support shipboard helicopter operations have been ongoing internationally for many years with the intention of de-risking FOCFT and introducing efficiency into the testing process. Canada will be accepting several new ship classes into its fleet over the next two decades. In support of FOCFT for these new ships, modeling and simulation tools are being developed by the National Research Council (NRC) Canada and Defence Research and Development Canada (DRDC) and significant advancements have occurred in the past decade. As part of this work, NRC and DRDC now use a framework and analysis approach that is intended to standardize SHOL testing with the use of modeling and simulation. This paper introduces that framework and gives details on the modeling and simulation tools that can be used to reduce risk and increase efficiency for Canada’s upcoming FOCFTs.
{"title":"Supporting shipboard helicopter flight testing with simulation and metrics for predicting pilot workload","authors":"Perry Comeau, A. Wall, E. Thornhill, S. McTavish, Richard G. Lee","doi":"10.1177/15485129221118937","DOIUrl":"https://doi.org/10.1177/15485129221118937","url":null,"abstract":"Shipboard helicopter operations are much more challenging and complex than land-based operations due to many factors associated with the presence of the ship. To determine those conditions in which safe operations may occur, a First of Class Flight Trial (FOCFT) is conducted for every new ship–helicopter pair. This trial results in a Ship–Helicopter Operating Limit (SHOL) envelope that is used to document operational limits for regular operations. Conducting a FOCFT is a, expensive, and time-consuming task that requires testing all aspects of operations. Modeling and simulation efforts to support shipboard helicopter operations have been ongoing internationally for many years with the intention of de-risking FOCFT and introducing efficiency into the testing process. Canada will be accepting several new ship classes into its fleet over the next two decades. In support of FOCFT for these new ships, modeling and simulation tools are being developed by the National Research Council (NRC) Canada and Defence Research and Development Canada (DRDC) and significant advancements have occurred in the past decade. As part of this work, NRC and DRDC now use a framework and analysis approach that is intended to standardize SHOL testing with the use of modeling and simulation. This paper introduces that framework and gives details on the modeling and simulation tools that can be used to reduce risk and increase efficiency for Canada’s upcoming FOCFTs.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":"17 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82484328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-13DOI: 10.1177/15485129221114354
Robert Swallow
The Chinese People’s Liberation Army (PLA) intends to wage systems confrontation and system destruction warfare. “System-of-systems thinking drives how the PLA understands and seeks to win modern warfare … and to achieve integrated joint operations and ‘win informationized local wars’.”1 This paper seeks to raise the odds that the PLA overspends in their pursuit and fails to achieve their objectives by increasing the focus on the role cyber analytics plays in winning system-of-systems warfare, what former Deputy Secretary of Defense Robert Work described as algorithmic warfare.2
{"title":"Considering the cost of cyber warfare: advancing cyber warfare analytics to better assess tradeoffs in system destruction warfare","authors":"Robert Swallow","doi":"10.1177/15485129221114354","DOIUrl":"https://doi.org/10.1177/15485129221114354","url":null,"abstract":"The Chinese People’s Liberation Army (PLA) intends to wage systems confrontation and system destruction warfare. “System-of-systems thinking drives how the PLA understands and seeks to win modern warfare … and to achieve integrated joint operations and ‘win informationized local wars’.”1 This paper seeks to raise the odds that the PLA overspends in their pursuit and fails to achieve their objectives by increasing the focus on the role cyber analytics plays in winning system-of-systems warfare, what former Deputy Secretary of Defense Robert Work described as algorithmic warfare.2","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":"22 1","pages":"3 - 37"},"PeriodicalIF":0.8,"publicationDate":"2022-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72552495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}