A Taxonomy and Holistic Approach to Risk Assessment of Network-Centric Systems

The need for information superiority and the capability to immediately and appropriately respond when necessary has been driving the military and commercial market domains towards more sustainable, interoperable, and pervasive collections of network-centric systems. In this paper we will review essential aspects of a network centric system (NCS) and propose a risk taxonomy applicable during the operational phase of an NCS. This paper is unique in that the taxonomy proposed herein can be used as a framework for modeling, analysis, and assessment of operational risks associated with network centric systems.

[1]  T. Bass,et al.  Defense-in-depth revisited: qualitative risk analysis methodology for complex network-centric operations , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).

[2]  B. Boehm Software risk management: principles and practices , 1991, IEEE Software.

[3]  Yacov Y. Haimes,et al.  Risk associated with software development: a holistic framework for assessment and management , 1993, IEEE Trans. Syst. Man Cybern..

[4]  C. Macklin,et al.  Campaign assessment visualisation techniques for command teams , 2001 .

[5]  Susan A. Sherer,et al.  The three dimensions of software risk: technical, organizational, and environmental , 1995, Proceedings of the Twenty-Eighth Annual Hawaii International Conference on System Sciences.

[6]  Yacov Y. Haimes,et al.  Are we forgetting the risks of information technology? , 2000, Computer.