2015
DOI: 10.1007/978-3-319-15705-4_21
|View full text |Cite
|
Sign up to set email alerts
|

The Qualitative and Quantitative Support Method for Capability Based Planning of Armed Forces Development

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 6 publications
0
5
0
Order By: Relevance
“…The presented method of prioritization of capabilities of the Armed Forces constitutes an original proposal developed during the implementation of the project: "IT system supporting the capabilities development and identification of operational needs of the Armed Forces of the Republic of Poland" [3].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The presented method of prioritization of capabilities of the Armed Forces constitutes an original proposal developed during the implementation of the project: "IT system supporting the capabilities development and identification of operational needs of the Armed Forces of the Republic of Poland" [3].…”
Section: Discussionmentioning
confidence: 99%
“…1 shows the concept of planning and programming the capabilities of the Armed Forces of the Republic of Poland. The current approach to planning and programming of the capabilities development of the Armed Forces of the Republic of Poland is executed on the basis of the socalled operational capabilities [1], [2], [3]. The operational capability is defined as "potential competence, feature of an entity resulting from its characteristics, allowing to undertake actions aimed at producing the desired effects".…”
Section: Introductionmentioning
confidence: 99%
“…The current property of the security system shall be deemed to mean a possibility of activating the set of appropriate security configurations in the Security System of the Organization, while using currently operational and useful technical and/or organizational security measures that remain at the disposal of the team responsible for designing and operating the security mechanisms [7][8][9][10]. While assuming that the transformations , are known, where:…”
Section: Current Property Of the Security Systemmentioning
confidence: 99%
“…Moreover, the proposed solution is based on a closed-loop simulation, and therefore it falls into the family of CAWGs with automated players and umpire. The human element involved in finding capability requirements is missing [ 37 ].…”
Section: Introductionmentioning
confidence: 99%