1992
DOI: 10.21236/ada250036
|View full text |Cite
|
Sign up to set email alerts
|

A Taxonomy for the Vulnerability/Lethality Analysis Process

Abstract: The findings of this report are not to be construed as an official Department of the Army position, unless so designated by other authorized documents.The use of trade names or manufacturers' names in this report does not constitute indorsement of any "commercial pioduct.Ptibih 'eoo,nO bu4dfl to, this coIeclOt, Of fornation %t estn'atr to a.C'aqe I,~a iour oe sor ~ ri'ciu.ding the t."te tor , ew nst uctitttons. %errin "q Cst'fl data sources gathering and mnamflrinq the data need. and compietrio and e ,rk-ng th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

1998
1998
2016
2016

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…Based on the aforementioned principles, we can now begin to develop an abstraction to better conceptualize the mission-means connection. To do this, we start with the Vulnerability/Lethality (V/L) Taxonomy, which was first formalized in the mid-1980s to construct the direct-fire vulnerability model SQuASH in support of the Army Abrams Live-Fire program [Deitz and Ozolins, 1989;Deitz et al, 1990;Klopcic et al, 1992;Deitz, 1996;Deitz and Starks, 1999;Klopcic, 1999] and was later revised and adapted to generate a new vulnerability environment for ground and air targets [Hanes et al, 1991;Juarascio et al, 1998;Juarascio and Keithley, 2000;Mergler and Steelman, 1999], to improve estimation of personnel casualties and operational effectiveness [Frew and Killion, 1996], and to form the foundation for the V/L portion of the Tri-Service Advanced Joint Effectiveness Model (AJEM) [Wasmund, 2000;AJEM Development Team, 2001]. …”
Section: 1mentioning
confidence: 99%
“…Based on the aforementioned principles, we can now begin to develop an abstraction to better conceptualize the mission-means connection. To do this, we start with the Vulnerability/Lethality (V/L) Taxonomy, which was first formalized in the mid-1980s to construct the direct-fire vulnerability model SQuASH in support of the Army Abrams Live-Fire program [Deitz and Ozolins, 1989;Deitz et al, 1990;Klopcic et al, 1992;Deitz, 1996;Deitz and Starks, 1999;Klopcic, 1999] and was later revised and adapted to generate a new vulnerability environment for ground and air targets [Hanes et al, 1991;Juarascio et al, 1998;Juarascio and Keithley, 2000;Mergler and Steelman, 1999], to improve estimation of personnel casualties and operational effectiveness [Frew and Killion, 1996], and to form the foundation for the V/L portion of the Tri-Service Advanced Joint Effectiveness Model (AJEM) [Wasmund, 2000;AJEM Development Team, 2001]. …”
Section: 1mentioning
confidence: 99%
“…The vulnerability/lethality (V/L) process was envisioned to be a series of mappings and spaces (Deitz and Ozolins 1989). Klopcic, Starks, and Walbert (1992) formalized this process, discussing the scientific process behind V/L analysis and introducing the V/L taxonomy shown in Figure 1. Walbert (1994) addressed the concept of granularity within the V/L analysis process.…”
Section: Introductionmentioning
confidence: 99%