Browse > Article
http://dx.doi.org/10.9708/jksci.2011.16.2.257

Analysis of Network Influence Factor considering Social Network Analysis and C2 Time  

Jeon, Jin-Tae (Dept. of Defense info. Defense Management Graduate School, Korea National Defense Univ.)
Park, Gun-Woo (Dept. of Defense info. Defense Management Graduate School, Korea National Defense Univ.)
Lee, Sang-Hoon (Dept. of Defense info. Defense Management Graduate School, Korea National Defense Univ.)
Abstract
Over the society the trial for several systems to be connected with Network has been continued to share information and to make it various. In accordance with such a change, the concept of military warfare conduction has been changing form platform centric warfare in separate combat system based on network centric warfare in network based. We have continuously made an effort that we try to get the goal with efficient system which is linked up with network, but such a study on that one in military system analysis is still slower than the study out of military until now. So this study is searching network influence factor by using military network with application of social network analysis method which is used broadly in the society and the science as well. At this time we search co-relationships between social network and the thing that we can analyse C2 time by effectiveness measurement means. By this study it has value of network influence factor identification for the growing network composition.
Keywords
Social Network Analysis; Command and Control System; Command and Control Time; Centrality; Degree centrality; Closeness centrality; Betweenness centrality;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Loet Leydesdorff, "Betweenness Centrality as an indicator of the interdisciplinarity of scientific Journals," 2006.
2 Baran, Paul. Introduction to Distributed Communication Networks. Santa Monica : RAID Corporation
3 Dong-Won Son, "Social Network Theory," pp. 7, 2005.
4 Berno Buechel and Vincent Buskens, "The Dynamics of Closeness and Betweenness," 2008.
5 By Dr. Paul W. Phister, Jr. and Mr. Igor G. Plonisch "Information and Knowledge Centric Warfare: The Next Steps in the Evolution of Warfare," pp. 1-4, 2009.
6 Kratke, Stefan Network Analysis of Production Clusters : The Postdam / Babelsberg Film Industry as an Example. European Planning Studies, pp. 10, 2002
7 Alberts, David S, Garstka, John J., and Stein, Frederick p., "network centric warfare : developing and leveraging information Superiority," pp.9 4, 2002
8 Jong-il Lee, "Understanding of Network Management ", pp. 337, 2005.
9 Peter Essens "agile networking in command and control," c2 journal, pp.188, 2007
10 Lambert Review of Business-University Collaboration, London : HMSO. 2003
11 Bjorklund, Raymond C., "The Dollars and Sense of Command and Control," National Denfense University Press, Washington D. C. 1995
12 J.P. Scott, "Soical Network Analysis : A Handbook," SAGE Publications, london 2000.
13 Yong-Hak Kim, "Social Network Theory Revison," Pakyoungsa, pp. 241-269, 2007
14 L. Jonathan Dowell "Optimal Configurating of a Command and Control Network : Balancing Performance and Reconfiguration Constraints," pp. 1, 2000
15 Valdis Krebs, "Power in Networks," 2004.
16 Tae-Gong Lee, "NCW Theory and Application", hongpub, pp. 21, 2008.
17 Wasserman, S.,and K.Faust. Social Network Analysis : Methods and Applications. Cambridge University Press, pp. 270-316, 1994.