131
Views
0
CrossRef citations to date
0
Altmetric
Review Article

Cybernetics and battle management system (BMS) in network soldier system application

ORCID Icon, ORCID Icon, ORCID Icon &
Pages 30-52 | Received 04 Nov 2022, Accepted 02 Apr 2023, Published online: 21 Apr 2023

References

  • Adams, Kevin M., Patrick T. Hester, Joseph M. Bradley, Thomas J. Meyers, and Charles. B. Keating. 2014. “Systems Theory as the Foundation for Understanding Systems.” Systems Engineering 17 (1): 112–123. doi:10.1002/sys.21255.
  • Ahmad, Syamil, William J. Doll, and Charles H. Apigian. 2004. “System Performance in Product Development: Measures and Impacts.” European Journal of Innovation Management 7 (3): 205–217. doi:10.1108/14601060410549892.
  • Ashby, Ross W. [1965] 2011. Introduction to Cybernetics. London: Chapman & Hall, Ltd.
  • Bar-Yam, Yaneer. 2004a. Making Things Work: Solving Complex Problems in a Complex World. United Kingdom: NECSI-Knowledge Press.
  • Bar-Yam, Yaneer. 2004b. “Multiscale Variety in Complex Systems.” Complexity 9 (4): 37–45. doi:10.1002/cplx.20014.
  • Beer, Stafford. 1984. “The Viable System Model: Its Provenance, Development, Methodology and Pathology.” The Journal of the Operational Research Society 35 (1): 7–25. doi:10.1057/jors.1984.2.
  • Burbeck, Steve. 2007. “Complexity and the Evolution of Computing.” Biological Principles for Managing Evolving Systems. doi:10.13140/RG.2.1.3021.0722.
  • Burgess, N., and N. Wake. 2012. “The Applicability of the Viable Systems Model as a Diagnostic for Small to Medium Sized Enterprises.” International Journal of Productivity and Performance Management 62 (1): 29–46.
  • Burgess, N., and N. Wake. 2013. “The Applicability of the Viable Systems Model as a Diagnostic for Small to Medium Sized Enterprises.” International Journal of Productivity and Performance Management 62 (1): 29–46. doi:10.1108/17410401311285282.
  • Chen, Xiangyong, Yuanwei Jing, Li Chunji, and Xiaoping Liu. 2011. “Optimal Strategies for Winning in Military Conflicts Based on Lanchester Equation.” Control and Decision 26 (6): 946–950.
  • Chen, C.-C., S. Nagl, and C. Clack. 2007. Specifying, Detecting and Analysing Emergent Behaviours in Multi-Level Agent-Based Simulations. In: edited by G.A. Wainer, Proceedings of the 2007 summer computer simulation conference. Society for Computer Simulation International, San Diego, US, pp. 969–976–976. ISBN 1565553160. 969–976. 10.1145/1357910.1358062.
  • D’Andreamatteo, A., L. Ianni, A. Rangone, F. Paolone, and M. Sargiacomo. 2019. “Institutional Pressures, Isomorphic Changes and Key Agents in the Transfer of Knowledge of Lean in Healthcare.” Business Process Management Journal 25 (1): 164–184. doi:10.1108/BPMJ-06.
  • Dyson, George. 1997. Darwin Among the Machines. Reading, Massachusetts: Perseus Books.
  • Eamonn, O’Toole, Vivek Nallur, and Siobhan Clarke. 2014. “Towards Decentralised Detection of Emergence in Complex Adaptive Systems.” Vol. 2014 IEEE Eighth International Conference on Self-Adaptive and Self-Organizing Systems, 60–69. doi:10.1109/SASO.2014.18.
  • Elbit Systems Australia Pty Ltd. 2020. Copyright approval.
  • Generic Soldier Architecture (GSA). “MODUK – DEF STAN 23–012. 2017 - Generic Soldier Architecture (GSA)”. DEF STAN https://standards.globalspec.com/std/10158433/def-stan-23-012.Vols.23012,RevisionI2.
  • Hildbrand, S., and S. Bodhanya. 2015. “Guidance on Applying the Viable System Model.” Kybernetes 44 (2): 186–201.
  • Holland, Orgal T. 2007. “Taxonomy for the Modeling and Simulation of Emergent Behavior Systems Paper Presented at the.” Spring Simulation Multiconference 2, Norfolk, March, 25–29. doi:10.1145/1404680.1404684.
  • Houbing, Song, A. Fink Glenn, and Sabina Jeschke. 2017. “Legal Considerations of Cyber‐physical Systems and the Internet of Things” Security and Privacy in Cyber-Physical Systems: Foundations, Principles and Applications 93–115. doi:10.1002/9781119226079.ch5.
  • Hyötyniemi, H. 2006. Neocybernetics in Biological Systems. Helsinki University of Technology, Control Engineering Laboratory. Report 151.
  • “IEEE/ISO/IEC 29148-2011 – ISO/IEC/IEEE International Standard – Systems and Software Engineering – Life Cycle Processes—Requirement’s Engineering.” https://standards.ieee.org/standard/29148-2011.html.
  • Jackson, Michael C. 2010. “Reflections on the Development and Contribution of Critical Systems Thinking and Practice.” Systems Research & Behavioral Science 27 (2): 133–139. doi:10.1002/sres.1020.
  • Juli, T. 2011. “The Five Team Leadership Principles for Project Success.“ Paper Presented at PMI® Global Congress 2011—North America, Dallas. Project Management Institute.
  • Kaisler, Stephen H., and Gregory Madey. 2009. “‘Complex Adaptive Systems: Emergence and Self-Organisation.” In Tutorial Presented at HICSS-42”. Big Island USA: HI. Accessed Jan 5, 2009. http://www3.nd.edu/~gmadey/Activities/CAS-Briefing.pdf
  • Katz, Daniel M., and JB. Ruhl. 2015. “Measuring, Monitoring and Managing Legal Complexity.” Iowa Law Review 191. https://scholarship.kentlaw.iit.edu/fac_schol/865.
  • Kopetz, Hermann, Andrea Bondavalli, Francesco Brancati, Bernhard Frömel, Oliver Höftberger, and Sorin Iacob. 2016. “Emergence in Cyber-Physical Systems-Of-Systems (CPSoSs).” Systems of Systems 10099 Lecture Notes in Computer Science 73–96. doi:10.1007/978-3-319-47590-5_3.
  • Lee, Bengee, and James Miller. 2004. “Multi-Project Software Engineering Analysis Using Systems Thinking.” Software Process: Improvement and Practice 9 (3): 173–214. doi:10.1002/spip.204.
  • Lee, Jaeyong, Sunwoo Shin, Moonsung Park, and Chongman Kim. 2018. “Agent-Based Simulation and Its Application to Analyse Combat Effectiveness in Network-Centric Warfare Considering Communication Failure Environments.” Mathematical Problems in Engineering 2018 2018: 1–9. doi:10.1155/2018/2730671.
  • Long, D., and Z. Scott. 2011. Vitech, Corporation Research and Education Council, a Primer for Model-Based System Engineering. 2nd ed.
  • Maier, M. W. 1998. “Architecting Principles for Systems-Of-Systems.” Systems Engineering 1 (4): 267–284. doi:10.1002/(SICI)1520-6858(1998)1:4<267:AID-SYS3>3.0.CO;2-D.
  • Maier, Mark W. 2009. The Art of Systems Architecting. USA: CRC Press.
  • Maier, Mark W. 2013. “Architecting Principles for Systems-Of-Systems.” Systems Engineering: Journal of the International Council on Systems Engineering 1 (4): 267–284. doi:10.1002/%28SICI%291520-6858%281998%291%3A4<267%3A%3AAID-SYS3>3.0.CO%3B2-D.
  • Maier, Mark W. 2014. “The Role of Modeling and Simulation in System of Systems Development.” In Modeling and Simulation Support for System of Systems Engineering Applications, edited by Larry. B. Rainey and A. Tolk, 11–41. John Wiley & Sons.
  • Matiuzzi Stocchero, J., A. Dexheimer Carneiro, I. Zacarias, and E. Pignaton de Freitas. 2023 .“Combining Information Centric and Software Defined Networking to Support Command and Control Agility in Military Mobile Networks”. Peer-to-Peer Netw. Appl. 10.1007/s12083-022-01443-z.
  • McCulloch, Warren S. 1995. “‘Summary of the Points of Agreement Reached in the Previous Nine Conferences on cybernetics.’ Cybernetics: Circular-Causal and Feedback Mechanisms in Biological and Social Systems.” Transactions of the 10th Conference on Cybernetics edited by H. Von Foerster, M. Mead, and H. L. Teuber, New York, 69–80. Josiah Macy Jr. Foundation.
  • Menčík, Jaroslav. 2016. “Reliability of Systems.” In Concise Reliability for Engineers, edited by Jaroslav Mencik. London: IntechOpen. doi:10.5772/62358.
  • Mingers, John, and John Brocklesby. 1997. “Multimethodology: Towards a Framework for Mixing Methodologies.” Omega 25 (5): 489–509. doi:10.1016/S0305-0483(97)00018-2.
  • Mintzberg, H., B. Ahlstrand, and JB. Lampel. 2020. Strategy Safari. UK: Pearson.
  • Mittal, Saurabh, and Larry Rainey. 2015. “Harnessing Emergence: The Control and Design and Emergent Behavior in System of Systems Engineering” In SummerSim: Summer Simulation Multi-Conference, Vol. 2015. Chicago, 26-29 July, 2015.
  • Morris, P. W. G. 2012. “Cleland and King: Project Management and the Systems Approach.” International Journal of Managing Projects in Business 5 (4): 634–642. doi:10.1108/17538371211268951.
  • Najmanovich, D. 2002. “From Paradigms to Figures of Thought.” Emergence 4 (1/2): 85–93.
  • Nweke, Livinus O., Goitom K. Weldehawaryat, and Stephen D. Wolthusen. 2021. “Threat Modelling of Cyber–Physical Systems Using an Applied π-Calculus.” International Journal of Critical Infrastructure Protection 35: 100466. doi:10.1016/j.ijcip.2021.100466.
  • O’Connell, Mary E. 2012. “Cyber Security Without Cyber War.” Journal of Conflict and Security Law 17 (2): 187–209. doi:10.1093/jcsl/krs017.
  • Osipov, Yu S., and V. I. Maksimov. 2018. “Tracking the Solution to a Nonlinear Distributed Differential Equation by Feedback Laws.” Numerical Analysis and Applications 11 (2): 158–169. doi:10.1134/S1995423918020064.
  • Packendorff, J. 1995. “Inquiring into the Temporary Organization: New Directions for Project Management Research.” Scandinavian Journal of Management 11 (4): 319–333.
  • Rainey, Larry B., and Andreas Tolk, eds. 2015. Modeling and Simulation Support for System of Systems Engineering Applications. Hoboken: John Wiley & Sons, Inc.
  • Roger, Miller, and Donald R. Lessard. 2008. “Chap. 8 Evolving Strategy: Risk Management and the Shaping of Mega-Projects.” In Decision-Making on Mega-Projects: Cost–Benefit Analysis, Planning and Innovation, edited by Hugo Priemus, Bent Flyvbjerg, and Burt van Wee, 145–172. Cheltenham: Edward Elgar Publishing Limited.
  • Schwaninger, M. 2009. Intelligent Organizations. Powerful Models for Systemic Management. 2nd ed. Berlin: Springer.
  • SEBoK Editorial Board. 2022. The Guide to the Systems Engineering Body of Knowledge (SEBoK), V. 2.7, edited by R. J. Cloutier, Hoboken, NJ: The Trustees of the Stevens Institute of Technology.
  • Silva, E. Cavalcante, and T. Batista. 2017. Refining Missions to Architectures in Software-Intensive Systems-Of-Systems. In Proceedings of the Joint 5th IEEE/ACM Joint International Workshop on Software Engineering for Systems-of-Systems and 11th Workshop on Distributed Software Development, Software Ecosystems and Systems-of-Systems, IEEE, USA, 2–8. 10.1109/JSOS.2017.12
  • Singh, S., S. Lu, M. M. Kokar, P. A. Kogut, and L. Martin, 2017. “Detection and Classification of Emergent Behaviours Using Multi-Agent Simulation Framework (WIP).” Paper Presented at MSCIAAS 17: Proceedings of the Symposium on Modelling and Simulation of Complexity in Intelligent, Adaptive and Autonomous Systems, Virginia Beach, VA, April 23–26. https://dl.acm.org/doi/abs/10.5555/3108414.3108417.
  • Stephen, Ward, and Chris Chapman. 2011. How to Manage Project Opportunity and Risk: Why Uncertainty Management Can Be a Much Better Approach Than Risk Management. United Kingdom: John Wiley & Sons.
  • Sternberg, Robert J., and Peter A. Frensch, eds. 1991. Complex Problem Solving: Principles and Mechanisms. Hillsdale, NJ: Lawrence Erlbaum.
  • Stocchero, J.M., C.A. Silva, L. d. S. Silva, M. A. Lawisch, J. C. S.d. Anjos, and E. P.d. Freitas. 2022. “Secure Command and Control for Internet of Battle Things Using Novel Network Paradigms.” IEEE Communications Magazine. doi: 10.1109/MCOM.001.2101072.
  • Walsh, Melany 2019. “How to Best Protect Military Industrial Control Systems from Cyberattacks.” https://www.fifthdomain.com/opinion/2019/08/01/how-to-best-protect-military-industrial-control-systems-from-cyberattacks/.
  • Wiener, N. 2013. Cybernetic or Control and Communication in the Animal and the Machine. 2nd ed. MIT Press.
  • Wilensky, U. 1999. NetLogo. http://ccl.northwestern.edu/netlogo/.
  • Yolles, Maurice. 2021. “Metacybernetics: Towards a General Theory of Higher Order Cybernetics.” Systems 9 (2): 34. doi:10.3390/systems9020034.
  • Zio, Enrico, and Giovanni Sansavini. 2011. “Modeling Interdependent Network Systems for Identifying Cascade-Safe Operating Margins.” IEEE Transactions on Reliability 60 (1): 94–101. doi:10.1109/TR.2010.2104211.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.