[Home ] [Archive]   [ فارسی ]  
:: Main :: Archive :: About :: Search :: Submit :: Contact ::
Main Menu
Home::
Journal Information::
Articles archive::
For Authors::
For Reviewers::
Registration::
Contact us::
Site Facilities::
::
Search in website

Advanced Search
..
Receive site information
Enter your Email in the following box to receive the site news and information.
..
:: Volume 2, Issue 1 (1-2019) ::
C4I Journal 2019, 2(1): 109-132 Back to browse issues page
A Evaluation Model of Vulnerabilities US Network Centric Warfare Based on Hierarchical Analysis Process
Abstract:   (3563 Views)
The prediction of a hard fight between the United States and the Islamic Republic of Iran is a discussion topic that has been discussed for decades between insider theorists and the enemy. As the military option is now repeatedly expressed. According to theorists, the battle scene of such a war is complex, non-linear, dynamic, and in an uncertainty environment, while based on the theory of complexity and chaos of minor problems and damage, it can have destructive effects and consequences in this complex environment (Butterfly Effect). In this research, in addition to investigating and categorizing vulnerabilities, based on the viewpoint of operational, intelligence and logistics experts, the criteria for vulnerability assessment; time, cost, effectiveness and feasibility have been identified. Then, based on the hierarchical analysis process technique, we present a model for evaluating and rating these vulnerabilities. According to the model presented and the opinion of military experts, with regard to the criteria, the vulnerabilities of electronic warfare, technology and command were the most highly ranked. From the point of view of time, vulnerabilities such as electronic warfare, technology, and manpower are ranked highest. In terms of the cost index, exploitation of vulnerabilities such as network and communications, technology and electronic warfare have the highest rank and command vulnerabilities, such as erosion of the war and increased information overload, with the lowest cost ranking. The most serious vulnerability of science progress includes complexity, chaos and system theories that lead to behavioral modeling of the network centric warfare. It also deception of information from the next levels, and the least effective vulnerability is due to technological damage. In terms of possibility, Potential Effects on Command, information risks also ranked highest which is accessible through psychological and cognitive operations. Information deception and science development were the lowest. The sensitivity analysis of each of the criteria has also been evaluated. The inconsistency coefficient is 0.07 which is the correctness of the research.
 
Keywords: Network Centric Warfare/Operation, vulnerabilities, multi-criteria decision, hierarchical analysis process (AHP)
Full-Text [PDF 1651 kb]   (2068 Downloads)    
Type of Study: Applicable | Subject: Special
Received: 2017/10/11 | Accepted: 2018/06/15 | Published: 2019/01/14
Add your comments about this article
Your username or Email:

CAPTCHA


XML   Persian Abstract   Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

A Evaluation Model of Vulnerabilities US Network Centric Warfare Based on Hierarchical Analysis Process. C4I Journal 2019; 2 (1) :109-132
URL: http://ic4i-journal.ir/article-1-21-en.html


Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Volume 2, Issue 1 (1-2019) Back to browse issues page
فصلنامه علمی-پژوهشی فرماندهی و کنترل C4I Journal

 
Persian site map - English site map - Created in 0.05 seconds with 37 queries by YEKTAWEB 4645