박사

Net-Centric 환경에서의 지휘통제 개념참조모델 개발에 관한 실증분석

박병진 2015년
논문상세정보
' Net-Centric 환경에서의 지휘통제 개념참조모델 개발에 관한 실증분석' 의 주제별 논문영향력
논문영향력 선정 방법
논문영향력 요약
주제
  • 개념참조 모델 개발
  • 민첨성
  • 상호협업
  • 실증분석
  • 지휘통제
  • 지휘통제 공통절차
동일주제 총논문수 논문피인용 총횟수 주제별 논문영향력의 평균
133 0

0.0%

' Net-Centric 환경에서의 지휘통제 개념참조모델 개발에 관한 실증분석' 의 참고문헌

  • 합동참고교범10-2,합동 연합작전 군사용어사전
    합동참모본부,pp.444 ∼ 446 [2010]
  • 지휘통제 이해
    박병진 인쇄의 창,서울,pp.13∼37,53∼56,61 ∼63,77∼98,101∼118,121∼134,135∼139,149∼157,2013.4. [2013]
  • 전쟁과 반전쟁
    앨빈토플러 청림출판사,서울,pp.78∼109,122∼136, 138∼147,270∼290,318∼331,376∼402,568∼576,2011.9. [2011]
  • 실증연구방법
    이형석 한경사,서울,pp.13∼36,pp.92∼93,pp.103∼ 150,pp.153∼227 [2014]
  • 박철,“기술수용모델(Technology AcceptanceModel)연구에 대 한 종합적 고찰”
    유재현 EntrueJournalofInformation Technology,9권 2호, pp.31∼50 [2010]
  • 민첩성 기반 지휘통제 참조모델 연구
    박병진 이태공 임병윤 한국방 위산업학회지 제21-1호,pp.92∼122 [2014]
  • 데이터솔루션,『SPSS AMOS 매뉴얼』,데이터솔루션(주)
    서울,pp.7 ∼24,293∼324,466∼491,659∼689 [2013]
  • 『케뮤니케이션 통계방법론』
    류성진 커뮤니케이션북스,서울,pp.21 ∼33,pp.45∼60 [2011]
  • 『인지심리학과 그 응용:CognitivePsychology and Its Implication』
    이영애 이화여자대학교 출판부,서울,pp.15∼48,pp.251∼296, pp.297∼328,pp.362∼388,pp.474∼505,2014.8. [2014]
  • 『인간행동의 이해』
  • 『인간행동과 사회환경』
    정인숙 서울,동문사,pp.67∼ 89,2014.2. [2014]
  • 『사회조사 방법론』
    전상규 시대고시기획,서울,pp.15∼30,67∼83 [2010]
  • 『네트워크중심전장기술』
    이태공 홍릉과학출판사,서울, pp.6∼21,pp.26∼40,pp.119∼207,pp.219∼241, 2013.12. [2013]
  • 『NCW 이론 및 응용』
    이태공 홍릉과학출판사,서울,pp.135∼154, pp.525∼549 [2007]
  • ───. 『전쟁법 해설서』
    국방부 법무관리관실 [2013]
  • “Net-Centric환경에서 상호운용성 기반 합동전투작전능력 평 가모델 연구,”
    임병윤 아주대학교 대학원 NCW학과 박사학위 논문,pp,2∼ 10 [2014]
  • “NCEI레이어 모델에 관한 연구,”
    손현식 이태공 한국통신학회논문 지,‘12-04,Vol.37B,No.04,pp.269∼276 [2012]
  • W.W.Powell,K.W.Koput& LaurelSmith-Doer,“Interorganizational CollaborationandtheLocusofInnovation:NetworksofLearningin Biotechnology”,AdministrativeScienceQuarterlyVol.41,No.1,pp. 116∼145,Mar1996.
  • Val rie Lavigne,R gine Lecocq, tienne Martineau,Marielle Mokhtari, “Closer to Agility through Sense?Making”,19th InternationalCommand & ControlResearch & Technology Symposium,pp.2∼9,17∼18, Jun2014.
  • V.Venkatesh,M.G.Morris, G.B.Davis,& F.D.Davis, “Useracceptance of information technology: Toward a unified view.”, Information Management,27(3),pp.425∼478,Sep2003.
  • V.Venkatesh,H.Bala,“Technologyacceptancemodel3andaresearch agenda on interventions.”, Decision Sciences,39(2),pp.273∼315, May2008.
  • V.Venkatesh,F.D.Davis,M.G.Morris,“Deadoralive?Thedevelopment, trajectory and future of technology adoption research.” Journal of the AssociationforInformationSystems,8(4),pp.267∼286,Sep2007.
  • United States.Department of Defense,“Network-Centric Warfare: CreatingaDecisiveWarfightingAdvantage”,ByDonaldH.Rumsfeld. WashingtonD.C.:DoD, pp.1∼2,Winter2003.
  • United States. Department of Defense. “Net-Centric Environment JointFunctionalConceptVersion1.0.”WashingtonD.C.,pp.1∼19,21 ∼33,D-1∼D-7,April2005.
  • U.S.JFCOM,“Commander’s Handbook for Attack the Network”, JointWarfightingCenter,2011.
  • U.S.JCS,JointPublication 5-0,JointOperationsPlanning,pp.52∼ 77,pp.96∼110,May2011.
  • U.S.JCS,JointPublication 3-13.1"JointDoctrineforCommandand controlwarfare(C2W)",1996.
  • U.S.JCS,CJCSI3100.01B,JointStrategicPlanning System (JSPS), 2008.
  • U.S.JCS JC2JIC:JointCommand and ControlIntegration Concept, USJFCOM,Virginia,pp.25∼33.April2006.
  • U.S.DoD,QuadrennialDefenseReview Report,pp.5∼11,73∼80,2010.
  • U.S.DoD,QuadrennialDefenseReview Report,pp.1∼16,19∼23,2001.
  • U.S.DoD,QuadrennialDefenseReview Report,pp.1∼15,19∼35,2006.
  • U.S.DoD,JointCommandandControlFunctionalConcept,pp.23∼ 26,2004.
  • U.S.DoD Directive(DoDD)7045.14,ThePlanning,Programming,Budgeting, andExecution(PPBE)Process,pp.5∼11,January25,2013.
  • U.S.CJCSI3170.01H,“JointCapabilitiesIntegrationandDevelopment System”, Page?http://www.dtic.mil/cjcs_directives., A-1∼A-13,10 January2012.
  • T.Kuwabara,K.Yamaguchi,“An Introduction to the Sociological Perspective ofSymbolic Interactionism.”,The JointJournalofthe NationalUniversitiesinKyushu,EducationandHumanities,1(1),pp. 1∼11,2013.
  • SPSS 20.0 매뉴얼
    이학식 집현재,서울,pp.78∼109, 122∼136,138∼147,270∼290,318∼331,376∼402,568∼576 [2013]
  • SACT,PO(2009)0042‘OutlineModelforaNATO DefencePlanning Process’,02Apr2009.
  • S.R.Atkinson,J.Moffat,“TheAgileOrganizationfrom InformalNetworks toComplexEffectsandAgility”,CCRP,pp.4∼15,Jun2007.
  • S.P.Robbins,T.A.Judge,“OrganizationalBehavior”,11th ed.Pearson Education,Inc.,pp.25∼48,2005.
  • S.P.Robbins,T.A.Judge,“OrganizationalBehavior”, 15th ed.ISBN -13:978-0-13-283487-2,Pearson Education,Inc.,pp.166∼195,201∼ 232,2013.
  • S.M.Halpin,“TheArmyCommandandControlEvaluationSystem”, Evidence Based Research,US.Army Research Institute for the BehavioralandSocialSciences,pp.11∼26,Jun1996.
  • R.S.Deakin,“BattlespaceTechnologies:Network-EnabledInformation Dominance”,Artech House,pp.12∼17,pp.34∼40,67∼72,80∼83, 90∼94,120∼138,2010.
  • R.P.Bogozzi,Y.Yi,“OntheEvaluationofStructuralEquationModels,” JournaloftheAcademy ofMarketing Science,Vol.16(Spring),pp. 74∼94,Spring1988.
  • R.Kuusisto,“InformationSharingFrameworkforAgileCommandand Control in Complex Inter-domain Collaboration Environment”, Finnish DefenseForcesTechnicalResearch Center,17th ICCRTS - OperationalizingC2Agility,pp.2∼15,Jun2012.
  • R.K.Huber,Universit atderBundeswehrM unchen,J.Moffat,Dstl PortsdownWest,UnitedKingdom,D.S.Alberts,InstituteforDefense Analyses,Alexandria,Virginia,“Achieving Agile C2 by Adopting HigherLevelsofC2Maturity”,17th ICCRTS:Operationalizing C2 Agility,pp.4∼18,Jun2012.
  • R.K.Huber,J.Moffat,D.S.Alberts,“AchievingAgileC2byAdopting HigherLevelsofC2Maturity”,17th ICCRTS:Operationalizing C2 Agility,pp.3∼13,24∼26,Jun2012.
  • R.J.Vallerand,P.Deshaies and Jean-Pirre Cuerrier,“Ajzen and Fishbein’sTheoryofReasonedActionasAppliedtoMoralBehavior: A Confirmatory Analysis, Journal of Personality and Social Psychology,Vol.62.,No.1,pp98∼109,Jan1992.
  • R.E.Hayes,“Command and ControlAgility”,TheevidenceBased Research.Inc,pp.8∼13,23∼27,80∼92,Jun2010.
  • R.A.Shafer,L.Dyer,“CraftingHumanResourceStrategyToFoster OrganizationalAgility:A Case Study”,CornellUniversityILRSchool, Jun2001.
  • P.W.B.Atkins,R.E.Wood,P.J.Rutgers,“OrganizationalBehavior andHumanDecisionProcesses”,Theeffectsoffeedbackformaton dynamicdecisionmaking.88(2),pp.587∼604.July2002.
  • P.Simon,“From OrganizationalTheory to theNew Communitarium ofAmitaiEtzioni”CanadianJournalofSociology27(1):69.SocINDEX withfulltext.EBSCO.web.13October2009.
  • P.Hew,“Reconciling situation awarenessinhumansversusmachines viamodeawarenessandschemata”,TheoreticalIssuesinErgonomics Science (Oct),pp. 1∼22,http://dx.doi.org/10.1080/ 1463922.614701, 2011.
  • P.G.Peterson,Membersofthe DefenseAdvisory Committee,“A New US Defense Strategy for a New Era:Military Superiority, Agility,andEfficiency”,ThePeterG.PetersonFoundation,pp.76∼ 80,Sep2012.
  • P.Drucker,“A ForerunnerofStrategicAgilityasaDynamicCapability?”, 1stGlobalPeterDruckerForum Vienna,pp.3∼12,Nov2009.
  • O.Mano,“TheDifferencesbetweenBarnard'sandSimon'sConcepts ofOrganization Equilibrium”,Econ.J.ofHokkaido Univ.,Vol.23, pp.13∼28,1994.
  • NATO SAS,Petra Eggenhofer-Rehart,Julius Barath,Philip S.E. Farrell, ReinerK.Huber,JamesMoffat, PaulW.Phister,Jr.,Jens Roemer,“SAS-065,C2 ConceptualReference Model(C2CRM/N2C2M2) V2.0”,pp.34∼43,50∼65,Jun2009.
  • NATO OTAN,DefencePlanningProcess(NDPP),http://www.nato.int/ cps/en/natolive/topics_49202.htm.,29Jul.2014.
  • NATO C3A, “Nato Code of Best Practice for C2 Assessment (SAS-026),DecisionMakerGuide”,9thICCRTS,pp.3∼16,Jun2002.
  • N.Zhong,Y.Wang,On the cognitive process ofhuman problem solving,CognitiveSystemsResearch,11(1),pp.81-92,Aug2008.
  • N.Horney,“OrganizationalAgility ProcessAudit”,Agility Consulting & Training,LLC,pp.12∼19,2013.
  • N.E.Brown,TheGlobalInformationGrid(GIG)2.0ConceptofOperations Version1.1,JointChiefsofStaff,Washington,pp.1∼13, 2009.
  • N.D.Evans,“BusinessAgility:StrategiesforGaining Competitive AdvantagethroughMobileBusinessSolutions”,Prentice-Hall,pp.5 ∼21,Nov2001.
  • M.Witzel,M.Warner,ManagementTheorists,Oxford University Press,New York, pp.134∼153,Feb2013.
  • M.VanCreveld,“CommandinWarCambridge”,MA:HarvardUniversity Press,pp.3∼38,70∼89,110∼136,1985.
  • M.Thornberry,J.Miller,“InformationTechnologyandCyberOperations: Modernization and Policy Issues to Supportthe Future Force,” in Proceeding ofonehundredthirteenthCongress, Washington,pp.1∼ 26,Oct2013.
  • M.Santala,“StrategicAgilityinaSmallKnowledgeIntensiveBusiness Services Company: Case Swot Consulting”, Helsinki School of Economics,pp.56∼99,Sept2009.
  • M.Santala,“StrategicAgilityinaSmallKnowledgeIntensiveBusiness Services Company: Case Swot Consulting”, Helsinki School of Economics,pp.11∼66,Sep2009.
  • M.Manso,“N2C2M2ValidationusingabELICIT:DesignandAnalysis ofELICIT runsusing softwareagents”,17th ICCRTS:Operationalizing C2Agility,pp.24∼33, 50∼55, 60∼67, 80∼89, 120∼135,Jun2012.
  • M.J.Adams,Y.JTenney,R.W.Pew,“Situationawarenessandthe cognitivemanagementofcomplex systems”,Human Factors37,pp. 85∼104,March1995.
  • M.Gran sen,Patrik Lif,Per-AndersOskarsson,PeterKlum,Lars Tyd n,Niklas Hallberg,“Exploring Effects ofC2 Warfare on C2 AbilityinaSimulatedEnvironment”,ICCRTS 16th,p.3,Jun2011.
  • M.Glinska,D.S.Carr,AmyHalliday,“WorkforceAgility:AnExecutive Briefing:”TheUniversity ofVirginia'sDarden SchoolofBusiness, BATTEN Institute,pp.2∼7,Feb2012.
  • M.Glinska,D.S.Carr,AmyHalliday,“WorkforceAgility:AnExecutive Briefing:The University ofVirginia's Darden SchoolofBusiness, BattenInstitute,pp.23∼30,Jan2012.
  • M.E.Nissen,W.D.Place,USNavalPostgraduateSchoolResearchAssociate, “ArchetypicalC2OrganizationDesignforEverIncreasingTechnological Autonomy:AnUnmannedAircraftSystem Illustration”,18th ICCRTS, pp.1∼15,Jun2013.
  • M.B langer,“C2inUnderdeveloped,DegradedandDeniedOperational Environments:The difficulty to documentagility evidences from a C2perspective”,DRDC Valcartier,Canada,18th ICCRTS, pp.1∼7, 13∼15,Jun2013.
  • M.B langer,DRDC Valcartier.Canada,“C2 in Underdeveloped, Degraded and Denied OperationalEnvironments:The difficulty to documentagility evidences from a C2 perspective”,18th ICCRTS, pp.1∼7,13∼15,Jun2013.
  • London BusinessSchool,“Achieving StrategicAgility:Staying one step ahead Strategy”,http://www.academiccourses.com /Achieving- Strategic-Agility/UK/London-Business-School/,Nov2010.
  • L.P.Hansen,F.S.Richard,TheRoleofConditioningInformationin Deducing Testable Restrictions Implied by Dynamic AssetPricing Models,EconometricaVol.55,No.3,pp.587∼613,May1987.
  • L.M.Fenner,M.K.Suzanne,“AgencyStovepipevsStrategicAgility: LessonsWeNeedtoLearnfrom ProvincialReconstructionTeamsin IraqandAfghanistan”,U.S.Committeeon ArmedServicesHouseof Representatives.SubcommitteeonOversight& Investigation,Washington DC:U.S.GovernmentPrintingOffice,pp.11∼50,April2008.
  • L.M.Crumley,M.B.Sherman,“Review ofCommand and Control Modelsand Theory”,UnitedStatesArmy Research Instituteforthe Behavioraland SocialSciences,pp.6∼7,15∼16,19∼21,25∼86, September1990.
  • L.Fredholm,A.L.Goransson, “EmergencyResponseManagementin Today’s Complex Society”, Swedish Civil Contingency Agency, Karlstad,Sweden,pp.109∼121,Dec2010.
  • L.E.Hardin,Problem SolvingConceptsandTheories,EducationalStrategies, JVME 30(3),pp.227∼230,Sep2002.
  • L.D.Saner,C.A.Bolstad, C.Gonzalez,& H.M.Cuevas, “Measuring andpredictingsharedsituationawarenessinteams”, JournalofCognitive EngineeringandDecisionMaking,Fall:pp.280∼308,April2009.
  • L.A.Samovar,R.E Porter,E.R Mcdaniel,InterculturalCommunication, Boston:Wadwsorth,pp.4∼16,Spring2012.
  • K.Nyamekye,“Collaboration,SharedAwareness,andDecisionMaking; Modeling and Simulation; Concepts, Theory, and Policy”, 18th ICCRTS,pp.7∼17,Jun2013.
  • K.F.Lynch,J.G.Drew,R .G Tripp,& D.M Romano,“Improving AirForceCommand andControlThrough EnhancedAgileCombat SupportPlanning,Execution,Monitoring,and ControlProcesses”, Rand’sPublication,pp.5∼28,Jun2014.
  • K.E.Weick,“EducationalOrganizationsasLooselyCoupledSystems”, AdministrativeScienceQuarterlyVol.21,No.1,Mar1976.
  • K.E.Weick,“CollectiveMindinOrganizations:HeedfulInterrelating on FlightDecks”,University ofMichigan,ASQ,pp,357-377,Sep 1993.
  • JointWarfarePublication 3-00,JointOperationsExecution,pp.1-1 ∼1A6,MOD ofU.K.,May2004.
  • JointPublication3-16,MultinationalOperations,JointChiefofStaff, pp.Ⅰ-1∼Ⅰ-9, 2013.
  • JointPublication1-02,DepartmentofDefenseDictionary ofMilitary andAssociatedTerms,JointChiefsofStaff,p.158,p.210,2013.
  • JointPublication 6-0:JointCommunicationsSystem,JointChiefsof Staff,Ⅰ-3∼Ⅰ-17,2010.
  • JointPublication 3-0,JointOperations,JointChiefsofStaff,pp.Ⅰ -1∼Ⅴ-5,2011.
  • JROCM 134-01,“GlobalInformation Grid(GIG),” U.S.Joint Forces Command,Norfolk,pp.8∼16,2001.
  • J.W.Meyer,BrianRowan,“InstitutionalizedOrganizations:FormalStructure as Myth and Ceremony”,American JournalofSociology Vol.83, No.2,pp.340∼363,Sep1977.
  • J.R.Galbraith,“Organizationdesign:AnInformationprocessingview”, Interface,4(3),28∼36.May1974.
  • J.R.Galbraith,Organizationdesign:AnInformationprocessingview. Interface,4(3),pp.28∼36,May1974.
  • J.R.Galbraith,OrganizationDesign:AnInformationProcessingView, Interfaces,SSN:00922102,Vol.4,No.3,May1974.
  • J.R.Anderson,L.M.Reder,K.A.Ericsson,& RobertGlaser,“Radical Constructivism and Cognitive Psychology”, Brookings Papers on EducationPolicy,no.1,pp.227∼278,April1998.
  • J.R.Anderson,L.M,Reder,& H.A Simon, “RadicalConstructivism and Cognitive Psychology”,Brookings Papers on Education Policy, no.1,pp.227∼278,April1998.
  • J.P.Stenbit,L.Wells,D.S.Alberts,“CodeofBestPracticeExperimentation,” InformationAgeTransformationSeries,DoD,pp.10∼17,Jun2002.
  • J.M.Green,“C2AssessmentToolsandMetrics:TowardsaTheoryof Measures ofEffectiveness”,NavalPostgraduateSchool,pp.65∼80, Jun2001.
  • J.Garstka,“NetworkCentricOperationsConceptualFrameworkVersion 1.0,”EvidenceBasedResearchInc,Vienna,pp.14∼52,2003.
  • J.Garstka,EvidenceBasedResearch,Inc,“NetworkCentricOperations ConceptualFrameworkVersion1.0”,pp.9∼27,Nov,2003.
  • J.G.March,“Explorationsin Organizations”,Stanford,CA:Stanford UniversityPress,pp.15∼67,July2008.
  • J.Freeman,S.A.Weil,K.P.Hess,“Measuring,Monitoring,and Managing Knowledge in Command and Control Organizations” RTO-MP-HFM-136NATO,pp.45∼48,2006.
  • J.Donath,“IdentityandDeceptionintheVirtualCommunity”,inM. A.Smith and P.Kollock(eds)Communitiesin Cyberspace,pp.29∼ 59,New York:Routledge,2003.
  • J.C.Anderson, D.W.Gerging,“StructuralEquationModelinginPractice: A Review and Recommended Two-Step Approach,” Psychological Bulletin,Vol.103No.3,pp.411∼423,May1988.
  • J.B.Hukill,AirForceResearchInstitute,“AirForceCommandand Control: The Need for Increased Adaptability”, 17th ICCRTS: OperationalizingC2Agility,pp.3∼8,11∼15,19∼20,Jun2012.
  • H.K.Nancy,J.Reynolds,T.Larry,“HandbookofSymbolicInteractionism”. New York:AltaMira,2003.
  • H.A.Simon,“Organizationsandmarkets”,JournalofEconomicPerspectives, vol.5,no.2,pp.25∼44,Spring1991.
  • H.A.Simon,A.Newell,“HumanProblem Solving:TheStateofthe Theoryin1970”,Carnegie-MellonUniversity,pp.149∼156,Feb1971.
  • GeorgeMasonUniversityC4ICenter(GMU-C4I),“TechnicalSummary forJointBattle ManagementLanguage Phase 1 Project”,Modeling and Simulation Steering Committeeand managed by theUS Army Topographic Engineering Center (TEC) ofthe Engineer Research andDevelopmentCenter(ERDC),pp.56∼60,77∼84,Rev1-19,2007.
  • GeorgeMasonUniversity,“PerformancePredictionofaNetwork-Centric WarfareSystem”,System ArchitecturesLaboratory,pp.43∼49,2000.
  • G.Marshall,“Symbolic interactionism”,A Dictionary ofSociology. Encyclopedia.com.Retrievedon:2011.
  • G.Levchuk,KrishnaPattipati,“Design ofDistributedCommandand ControlforCollaborative Situation Assessment”,Aptima,Inc.,18th ICCRTS,p.8,Jun2013.
  • G.H.Walker,N.A.Stanton,P.M.Salmon & D.P.Jenkins.“An Evolutionary Approach to Network Enabled Capability”, Human Factors Integration Defence Technology Centre (HFI DTC),BIT Lab,BrunelUniversity,Uxbridge,[UK]UB83PH, pp.34∼45,2008.
  • F.Nickols,“TheSpanofControlandtheFormulasofV.A.Graicunas”, pp.2∼5,April2011.
  • F.D.Davis,“Perceivedusefulness,perceivedeaseofuse,anduser acceptance of information technology.”, Management Information SystemsQuarterly,13(3),pp.319∼340,Sep1986.
  • F.D.Davis,R.P.Bagozzi, P.R.Warshaw, “Useracceptanceofcomputer technology: A comparison of two theoretical models.”, Management Science,35(8),pp.982∼1003,Aug1989.
  • DirectorforStrategic Plans and Policy,J5:Strategy Division,Joint Chiefs ofStaff,JointVision 2020,US GovernmentPrinting Office, WashingtonD.C.,pp.15∼36,June2000.
  • Department of Defense Office of the Chief Information Officer, DepartmentofDefenseInformation EnterpriseArchitecture(DoD IEA) Version2.0;Volume1-ManagementOverview oftheDoD IEA,DoD, pp.1∼10,Jan2012.
  • D.Waldo,“OrganizationTheory:RevisitingtheElephant,PublicAdminis trationReview”,Vol.53,No.5,pp.409∼418,Sep1993.
  • D.Waldo,TheAdministrativeState;A StudyofthePoliticalTheory ofAmericanPublicAdministration,TheRonaldPressCompany,New Jersey,pp.6∼11,Nov2007.
  • D.Vogel,“AchievingStrategicAgilityinHypercompetitiveEnvironments”, CaliforniaManagementReview,Feb2012.
  • D.T.Campbell,D.W.Fiske,“ConvergentandDiscriminantValidationby the Multitrait-Multimethod Matrix,” Psychological Bulletin, Vol. 56(March),pp.81∼105,March1959.
  • D.Scheidit,K.Schultz,“CollectiveC2inMultinationalCivil-Military Operationson Optimizing CommandandControlStructures”,Johns Hopkins University Applied Physics Lab, 16th International Command& ControlResearch& TechnologySymposium,pp.1∼5, Jun2011.
  • D.Scheidit,K.Schultz,Johns Hopkins University Applied Physics Lab,“Collective C2 in MultinationalCivil-Military Operations on Optimizing Command and Control Structures”, 16th International Command & ControlResearch & Technology Symposium,pp.1∼5, Jun2011.
  • D.S.Alberts,“TheAgilityAdvantage:A survivalGuideforComplex Enterprises and Endeavors”,The Command and ControlResearch Program,pp.34∼45,2011.
  • D.S.Alberts,“NATO NEC C2MaturityModel”,CCRP,pp.14∼20, 25∼33,Jun2010.
  • D.S.Alberts,“Focus,andConvergence:TheFutureofCommandand Control”,TheInternationalC2Journal,1(1),pp.1∼30,Jun2007.
  • D.S.Alberts,RichardE.Hayes,“PowertotheEdge:Commandand ControlintheInformationAge”,TheCommandandControlResearch Program,pp.7∼12,23∼29,67∼72,95∼110,123∼130,143∼150,167 ∼182,Jun2003.
  • D.S.Alberts,R.E.Hays,UnderstandingCommandandControl,CCRP, pp.64∼66,124∼190,May2006.
  • D.S.Alberts,M.Manso,“Operationalizing and Improving C2Agility: Lessons from Experimentation”,17th ICCRTS - Operationalizing C2 Agility,pp.34∼40,Jun2012.
  • D.M.Paul,“Cultureand Cognition”,AnnualReview ofSociology, Vol.23,pp.263∼287,Nov1997.
  • D.H.Rumsfeld,FacingtheFuture:MeetingtheThreatsandChallenges ofthe21stCentury,pp.11∼15,Feb2005.
  • D.Doran,AmySanchezMcCutcheon,RN,“ImpactoftheManager’s Span ofControlon Leadership and Performance”,Canadian Health ServicesResearchFoundation,pp.14∼18,Sep2004.
  • D.Dick,J.D.Comerford,“C2PolicyEvolutionattheU.S.Department ofDefense:WWMCCS to a Unified Military Command Capability”, 10th InternationalCommand and ControlResearch and Technology Symposium TheFutureofC2,pp.4∼16,Jun2003.
  • D.Cathcart,S E.Miller,MS,RN,“SpanofControlMatters”,JONA Volume34,Number9,pp395∼399,Sep2004.
  • D.A.Whetten,“Whatconstitutes a theoreticalcontribution?”, The AcademyofManagementReview,14(4),pp.490∼495,1989.
  • CatherineDale,The2014QuadrennialDefenseReview ReportandDefense Strategy:IssuesforCongress,U.S.Congress CRS 7-5700,pp.7∼18, 2014.
  • CJCSM 3122.02B,JointOperation Planning and Execution System (JOPES),2001.
  • C.Wilson,“NetworkCentricOperations:BackgroundandOversightIssues for Congress,CongressionalResearch Service,” in Proceeding of CRS ReportforCongress,pp.crs-2∼crs-6,pp.crs-15,2007.
  • C.J.Ancker,U.S.Army,Retired,“TheEvolutionofMissionCommand in U.S.Army Doctrine,1905tothePresent”,Military Review,pp. 42∼52,March2013.
  • C.I.Barnard,“Education forExecutives”,TheJournalofBusiness ofthe University ofChicago, The University ofChicago Press, New York,Vol.18,No.4,pp.175∼182,Oct1945.
  • C.I.Barnard,OrganizationTheoryfrom ChestBarnardtothePresent andBeyond,OxfordUniversityPress,New York, pp.56∼72,116∼ 140,Oct1995.
  • C.H.Builder,S.C.Bankes,R.Nordin,“CommandConcept:A Theory derived from thepracticeofcommand and control”, Rand,NDRI, Washington,pp.17∼20,117∼125,Sep1991.
  • B.Sherehiy,W.Karwowski,J.K.Layer,“A review ofenterpriseagility: Concepts, frameworks, and attributes”, International Journal of IndustrialErgonomics37,www.elsevier.com/locate/ergon, Jun2007.
  • B.Sherehiy,W.Karwowksi,“A review ofenterpriseagility:Concepts, frameworks, and attributes”, International Journal of Industrial Ergonomics,Vol37,Isses5,pp.445∼460,May2007.
  • B.Rowan,“OrganizationalStructureandtheInstitutionalEnvironment: TheCaseofPublicSchools”,AdministrativeScienceQuarterlyVol. 27,No.2,pp.259∼279,June1982.
  • B.Brehmer,“DynamicDecisionMaking:HumanControlofComplex Systems”,ActaPsychologica,81,pp.211∼241,Dec1992.
  • B.Brehmer, “FeedbackDelaysandControlinComplexDynamicSystem, Computer-based managementofComplex Systems”,Proceedings of the 1989 Internationalconference ofthe System Dynamic Society, 99,pp.189∼196,July1989.
  • B.Becker,“StrategicAgility:TheUltimateCompetitiveAdvantage”, DevelopmentAdvantageGroup,LLC,pp.30∼34,2007.
  • A.Medinilla,“AgileManagement:LeadershipinanAgileEnvironment”, Springer,pp.7∼20,2012.
  • A.L.Barabasi,“How EverythingIsConnectedtoEverythingElseand WhatItMeans”,New York,NY:Penguin Group.pp.32∼45,June 2014.
  • A.Kelly,“ObjectiveAgility:WhatdoesittaketobeanAgilecompany?”, http://www.so3warestrategy.co.uk,BusinessAnalysisConferenceEurope, Sep2010.
  • A.Janis,J.Cannon-Bowers,E.Salas,“Team PerformanceandTrainingin Complex Environments :RecentFindings from Applied Research”, CurrentDirections in PsychologicalScience,7(3),pp.83∼87.Jun 1998.
  • A.Gawkowska,“Neutrality,Autonomy and Order:AmitaiEtzioni’s Communitarian Critique ofLiberalism UnderScrutiny”,IWM Junior VisitingFellowsConference,Vol.VIII/4,pp.6∼8,Oct1999.
  • A.Gabor,T.Joseph,Mahoney,“Chester Barnard and the Systems Approach to Nurturing Organizations”, http://business.illinois.edu/ working_papers/papers/10-0102.pdf,pp.1∼11,15∼20,2000.
  • A.Etzion,A ComparativeAnalysisofComplexOrganizations,TheFree Press,New York,pp.3∼40,213∼303,Aug1975.
  • A.Ellis,W.Dryden,The Practice ofRationalEmotive Behavior Therapy Second Edition,SpringerPublishing Company,pp.1∼27, 33∼53,July2007.
  • A.E Griffin,“A FirstLook atCommunication Theory.”,Boston: McGraw-Hill,2006.
  • A.Dillon,M.G.Moris,“UserAcceptanceofInformationTechnology: Theories and Models”,AnnualReview ofInformation Scienceand Technology,Vol.31,MedfordNJ:InformationToday,pp.3∼32,Mar1996.
  • A.Bandura,“InfluenceofModel;sReinforcementContingencieson the Acquisition ofImitative Responses”,JournalofPersonality and SocialPsychology,Vol.1,No.6,pp.589∼595,Jun1965.
  • ?D.S.Alberts,“NetworkCentricWarfare,Understandinginformationage warfareandpowertotheedge”,TheCommandandControlResearch Program,pp.48∼54,Jun2000.