A Evaluation Model of Vulnerabilities US Network Centric Warfare Based on Hierarchical Analysis Process
|
|
|
|
Abstract: (4062 Views) |
The prediction of a hard fight between the United States and the Islamic Republic of Iran is a discussion topic that has been discussed for decades between insider theorists and the enemy. As the military option is now repeatedly expressed. According to theorists, the battle scene of such a war is complex, non-linear, dynamic, and in an uncertainty environment, while based on the theory of complexity and chaos of minor problems and damage, it can have destructive effects and consequences in this complex environment (Butterfly Effect). In this research, in addition to investigating and categorizing vulnerabilities, based on the viewpoint of operational, intelligence and logistics experts, the criteria for vulnerability assessment; time, cost, effectiveness and feasibility have been identified. Then, based on the hierarchical analysis process technique, we present a model for evaluating and rating these vulnerabilities. According to the model presented and the opinion of military experts, with regard to the criteria, the vulnerabilities of electronic warfare, technology and command were the most highly ranked. From the point of view of time, vulnerabilities such as electronic warfare, technology, and manpower are ranked highest. In terms of the cost index, exploitation of vulnerabilities such as network and communications, technology and electronic warfare have the highest rank and command vulnerabilities, such as erosion of the war and increased information overload, with the lowest cost ranking. The most serious vulnerability of science progress includes complexity, chaos and system theories that lead to behavioral modeling of the network centric warfare. It also deception of information from the next levels, and the least effective vulnerability is due to technological damage. In terms of possibility, Potential Effects on Command, information risks also ranked highest which is accessible through psychological and cognitive operations. Information deception and science development were the lowest. The sensitivity analysis of each of the criteria has also been evaluated. The inconsistency coefficient is 0.07 which is the correctness of the research.
|
|
Keywords: Network Centric Warfare/Operation, vulnerabilities, multi-criteria decision, hierarchical analysis process (AHP) |
|
Full-Text [PDF 1651 kb]
(2474 Downloads)
|
Type of Study: Applicable |
Subject:
Special Received: 2017/10/11 | Accepted: 2018/06/15 | Published: 2019/01/14
|
|
|
|
|
Add your comments about this article |
|
|