Abstract
The need for information superiority and the capability to immediately and appropriately respond when necessary has been driving the military and commercial market domains towards more sustainable, interoperable, and pervasive collections of network-centric systems. In this paper we will review essential aspects of a network centric system (NCS) and propose a risk taxonomy applicable during the operational phase of an NCS. This paper is unique in that the taxonomy proposed herein can be used as a framework for modeling, analysis, and assessment of operational risks associated with network centric systems.
Similar content being viewed by others
References
Barabasi, A. L.; Linked. New York: Penguin Group (USA) Inc., 2003.
Baran, P.; Rand Memoranda on Distributed Communication. Available at: http://www.rand.org/publications/RM/baran.list.html, 1964.
Bass, T. and Robichaux, R.; Defense-in-depth revisited: qualitative risk analysis methodology for complex network-centric operations, Military Communications Conference, 2001. MILCOM 2001. Communications for Network-Centric Operations: Creating the Information Force. IEEE, Volume: 1, 28–31 Oct. 2001, Page(s): 64–70 vol.1.
Boehm, B.W.; Software risk management: principles and practices, Software, IEEE, Volume: 8 Issue: 1, Jan. 1991, Page(s): 32–41.
Computer Security Institute, CIA/FBI Computer Crime and Security Survey, Eighth Annual Survey, Hawyard, CA, 2003.
Department of Defense; “Network Centric Warfare: Department of Defense Report to Congress,” Washington, D.C., 27 July, 2001.
Driscoll, D. et al; A State-of-the-art Environment for Research, Design, Evaluation, Prototyping, and Integration of Dual-Use Advanced Networking and Net-Centric Information Technologies, Military Communications Conference Proceedings, 1999. MILCOM 1999, IEEE, Volume 1, 31 Oct.–3 Nov. 1999, Page(s): 376–380.
Haimes, Y.Y. and Chittister, C.; Risk associated with software development: a holistic framework for assessment and management, Systems, Man and Cybernetics, IEEE Transactions on, Volume: 23 Issue: 3, May–June 1993, Page(s): 710–723
Longstaff, T.A.; Chittister, C.; Pethia, R.; Haimes, Y.Y.; Are we Forgetting the Risks of Information Technology? IEEE Journal: Computer, Volume: 33 Issue: 12, Dec. 2000 Pages: 43–51
Hulme, G. V.; Merrill Lynch Hands Off Network Security To VeriSign, Wall Street and Technology, May 22, 2003
Macklin, C.; Dudfield, H.; Campaign assessment visualization techniques for command teams, Human Interfaces in Control Rooms, Cockpits and Command Centres, 2001. People in Control. The Second International Conference on IEE Conf. Publ. No. 481, 19–21 June 2001 Page(s): 73–78
Sage, A.P.; Systems Engineering, New York, John Wiley and Sons, 1992.
Sherer, S.A.; The three dimensions of software risk: technical, organizational, and environmental, System Sciences, 1995. Vol. III. Proceedings of the Twenty-Eighth Hawaii International Conference on, Volume: 3, 3–6 Jan. 1995, Page(s): 369–378 vol.3.
Sisti, F. J. and Joseph, S. “Software Risk Evaluation Method Version 1.0,” Carnegie Mellon University, Pittsburgh CMU/SEI-94-TR-19, December 1994.
Smith, E. A., “From Network Centric to Effects-based Operations,” presented at Fourth Annual Conference on Network Centric Warfare, London, 2002.
West, P., “Dynamic Risk Management of Network Centric Systems,” PhD Dissertation, Stevens Institute of Technology, Hoboken, NJ, 2003.
Welsh, J., Chadha, B., and Stavash, J. Distributed Collaborative Design Approach to Address Total Ownership Costs, Mission Critical Enterprise Systems Symposium, 1996, http://www.atl.external.lmco.com/overview/papers/963-9937.pdf, accessed July 23, 2003.
West, P., Verma, D., Farr, J., Buede, D., and Merino, D.; Reliability Taxonomy for Network-Centric Systems, Twenty Fourth Annual American Society of Engineering Management Conference, St. Louis, MO, October, 2003.
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Jain, R., Verma, D. & Farr, J.V. A Taxonomy and Holistic Approach to Risk Assessment of Network-Centric Systems. OPSEARCH 42, 83–97 (2005). https://doi.org/10.1007/BF03398718
Published:
Issue Date:
DOI: https://doi.org/10.1007/BF03398718