As a guest user you are not logged in or recognized by your IP address. You have
access to the Front Matter, Abstracts, Author Index, Subject Index and the full
text of Open Access publications.
This paper explores the challenges of attaining Command and Control (C2), required for success in military, defense, and humanitarian assistance and disaster relief (HA/DR) operations in current information environment (IE). It presents definitions of C2 and IE followed by a summary of Information age-trends that impact these operations. It then surveys some IE technological tools and how they have been exploited by adversaries. An examination of how the North Atlantic Treaty Organization (NATO) has evolved to adapt its C2 architecture to varying crises ensues. Policy recommendations include: 1) adjustments to existing C2 architectures; 2) harnessing the role of transnational corporations; 3) recognizing a new theoretical paradigm wherein all actors can collaborate, compete, and conflict simultaneously on different topics; 4) developing networks, despite different security priorities; 5) developing a networked, interdisciplinary, information threat sharing center; 6) advocating digital fluency, digital literacy, cyber hygiene, and IE-awareness; 7) encouraging definitions and thresholds at national, regional, and NATO levels; 8) utilizing social network analysis cautiously to prevent data biases; 9) encouraging training and exercising at local, national, and international levels; and 10) applying other national and regional solutions.
This website uses cookies
We use cookies to provide you with the best possible experience. They also allow us to analyze user behavior in order to constantly improve the website for you. Info about the privacy policy of IOS Press.
This website uses cookies
We use cookies to provide you with the best possible experience. They also allow us to analyze user behavior in order to constantly improve the website for you. Info about the privacy policy of IOS Press.