Skip to main content
Log in

A Taxonomy and Holistic Approach to Risk Assessment of Network-Centric Systems

  • Published:
OPSEARCH Aims and scope Submit manuscript

Abstract

The need for information superiority and the capability to immediately and appropriately respond when necessary has been driving the military and commercial market domains towards more sustainable, interoperable, and pervasive collections of network-centric systems. In this paper we will review essential aspects of a network centric system (NCS) and propose a risk taxonomy applicable during the operational phase of an NCS. This paper is unique in that the taxonomy proposed herein can be used as a framework for modeling, analysis, and assessment of operational risks associated with network centric systems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Barabasi, A. L.; Linked. New York: Penguin Group (USA) Inc., 2003.

    Google Scholar 

  2. Baran, P.; Rand Memoranda on Distributed Communication. Available at: http://www.rand.org/publications/RM/baran.list.html, 1964.

  3. Bass, T. and Robichaux, R.; Defense-in-depth revisited: qualitative risk analysis methodology for complex network-centric operations, Military Communications Conference, 2001. MILCOM 2001. Communications for Network-Centric Operations: Creating the Information Force. IEEE, Volume: 1, 28–31 Oct. 2001, Page(s): 64–70 vol.1.

    Google Scholar 

  4. Boehm, B.W.; Software risk management: principles and practices, Software, IEEE, Volume: 8 Issue: 1, Jan. 1991, Page(s): 32–41.

    Article  Google Scholar 

  5. Computer Security Institute, CIA/FBI Computer Crime and Security Survey, Eighth Annual Survey, Hawyard, CA, 2003.

    Google Scholar 

  6. Department of Defense; “Network Centric Warfare: Department of Defense Report to Congress,” Washington, D.C., 27 July, 2001.

  7. Driscoll, D. et al; A State-of-the-art Environment for Research, Design, Evaluation, Prototyping, and Integration of Dual-Use Advanced Networking and Net-Centric Information Technologies, Military Communications Conference Proceedings, 1999. MILCOM 1999, IEEE, Volume 1, 31 Oct.–3 Nov. 1999, Page(s): 376–380.

    Google Scholar 

  8. Haimes, Y.Y. and Chittister, C.; Risk associated with software development: a holistic framework for assessment and management, Systems, Man and Cybernetics, IEEE Transactions on, Volume: 23 Issue: 3, May–June 1993, Page(s): 710–723

    Article  Google Scholar 

  9. Longstaff, T.A.; Chittister, C.; Pethia, R.; Haimes, Y.Y.; Are we Forgetting the Risks of Information Technology? IEEE Journal: Computer, Volume: 33 Issue: 12, Dec. 2000 Pages: 43–51

    Google Scholar 

  10. Hulme, G. V.; Merrill Lynch Hands Off Network Security To VeriSign, Wall Street and Technology, May 22, 2003

  11. Macklin, C.; Dudfield, H.; Campaign assessment visualization techniques for command teams, Human Interfaces in Control Rooms, Cockpits and Command Centres, 2001. People in Control. The Second International Conference on IEE Conf. Publ. No. 481, 19–21 June 2001 Page(s): 73–78

  12. Sage, A.P.; Systems Engineering, New York, John Wiley and Sons, 1992.

    Google Scholar 

  13. Sherer, S.A.; The three dimensions of software risk: technical, organizational, and environmental, System Sciences, 1995. Vol. III. Proceedings of the Twenty-Eighth Hawaii International Conference on, Volume: 3, 3–6 Jan. 1995, Page(s): 369–378 vol.3.

    Google Scholar 

  14. Sisti, F. J. and Joseph, S. “Software Risk Evaluation Method Version 1.0,” Carnegie Mellon University, Pittsburgh CMU/SEI-94-TR-19, December 1994.

  15. Smith, E. A., “From Network Centric to Effects-based Operations,” presented at Fourth Annual Conference on Network Centric Warfare, London, 2002.

  16. West, P., “Dynamic Risk Management of Network Centric Systems,” PhD Dissertation, Stevens Institute of Technology, Hoboken, NJ, 2003.

    Google Scholar 

  17. Welsh, J., Chadha, B., and Stavash, J. Distributed Collaborative Design Approach to Address Total Ownership Costs, Mission Critical Enterprise Systems Symposium, 1996, http://www.atl.external.lmco.com/overview/papers/963-9937.pdf, accessed July 23, 2003.

  18. West, P., Verma, D., Farr, J., Buede, D., and Merino, D.; Reliability Taxonomy for Network-Centric Systems, Twenty Fourth Annual American Society of Engineering Management Conference, St. Louis, MO, October, 2003.

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jain, R., Verma, D. & Farr, J.V. A Taxonomy and Holistic Approach to Risk Assessment of Network-Centric Systems. OPSEARCH 42, 83–97 (2005). https://doi.org/10.1007/BF03398718

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF03398718

Key Words

Navigation