{"id":"https://openalex.org/W2115325785","doi":"https://doi.org/10.1109/sysose.2011.5966620","title":"System of System case study - why the network centric command and control system needed to change: Lessons from army command and control in Operation Iraqi Freedom","display_name":"System of System case study - why the network centric command and control system needed to change: Lessons from army command and control in Operation Iraqi Freedom","publication_year":2011,"publication_date":"2011-06-01","ids":{"openalex":"https://openalex.org/W2115325785","doi":"https://doi.org/10.1109/sysose.2011.5966620","mag":"2115325785"},"language":"en","primary_location":{"id":"doi:10.1109/sysose.2011.5966620","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sysose.2011.5966620","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 6th International Conference on System of Systems Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070260175","display_name":"Rob Pitsko","orcid":null},"institutions":[{"id":"https://openalex.org/I108468826","display_name":"Stevens Institute of Technology","ror":"https://ror.org/02z43xh36","country_code":"US","type":"education","lineage":["https://openalex.org/I108468826"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Rob Pitsko","raw_affiliation_strings":["Stevens Institute of Technology, Hoboken, NJ, USA","Stevens Institute of Technology, Castle Point on Hudson, Hoboken, NJ 07030 USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Stevens Institute of Technology, Hoboken, NJ, USA","institution_ids":["https://openalex.org/I108468826"]},{"raw_affiliation_string":"Stevens Institute of Technology, Castle Point on Hudson, Hoboken, NJ 07030 USA#TAB#","institution_ids":["https://openalex.org/I108468826"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101786979","display_name":"Dinesh Verma","orcid":"https://orcid.org/0009-0009-3531-0280"},"institutions":[{"id":"https://openalex.org/I108468826","display_name":"Stevens Institute of Technology","ror":"https://ror.org/02z43xh36","country_code":"US","type":"education","lineage":["https://openalex.org/I108468826"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dinesh Verma","raw_affiliation_strings":["Stevens Institute of Technology, Hoboken, NJ, USA","Stevens Inst. of Technol. Castle Point on Hudson, Hoboken, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Stevens Institute of Technology, Hoboken, NJ, USA","institution_ids":["https://openalex.org/I108468826"]},{"raw_affiliation_string":"Stevens Inst. of Technol. Castle Point on Hudson, Hoboken, NJ, USA","institution_ids":["https://openalex.org/I108468826"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5070260175"],"corresponding_institution_ids":["https://openalex.org/I108468826"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.14299539,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"33","issue":null,"first_page":"335","last_page":"340"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12888","display_name":"Military Strategy and Technology","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12888","display_name":"Military Strategy and Technology","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14270","display_name":"Simulation and Modeling Applications","score":0.9884999990463257,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12490","display_name":"Software Engineering and Design Patterns","score":0.9663000106811523,"subfield":{"id":"https://openalex.org/subfields/3303","display_name":"Development"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.7975351810455322},{"id":"https://openalex.org/keywords/asynchronous-communication","display_name":"Asynchronous communication","score":0.7145521640777588},{"id":"https://openalex.org/keywords/command-and-control","display_name":"Command and control","score":0.6407265067100525},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.5283079147338867},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.469348281621933},{"id":"https://openalex.org/keywords/systems-engineering","display_name":"Systems engineering","score":0.4555644989013672},{"id":"https://openalex.org/keywords/control-system","display_name":"Control system","score":0.4305548667907715},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.4120996594429016},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4107840061187744},{"id":"https://openalex.org/keywords/operations-research","display_name":"Operations research","score":0.3604976236820221},{"id":"https://openalex.org/keywords/reliability-engineering","display_name":"Reliability engineering","score":0.3464545011520386},{"id":"https://openalex.org/keywords/aeronautics","display_name":"Aeronautics","score":0.3396066427230835},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.187391459941864},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.1745401918888092}],"concepts":[{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.7975351810455322},{"id":"https://openalex.org/C151319957","wikidata":"https://www.wikidata.org/wiki/Q752739","display_name":"Asynchronous communication","level":2,"score":0.7145521640777588},{"id":"https://openalex.org/C506615639","wikidata":"https://www.wikidata.org/wiki/Q21662260","display_name":"Command and control","level":2,"score":0.6407265067100525},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.5283079147338867},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.469348281621933},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.4555644989013672},{"id":"https://openalex.org/C17500928","wikidata":"https://www.wikidata.org/wiki/Q959968","display_name":"Control system","level":2,"score":0.4305548667907715},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.4120996594429016},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4107840061187744},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.3604976236820221},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.3464545011520386},{"id":"https://openalex.org/C178802073","wikidata":"https://www.wikidata.org/wiki/Q8421","display_name":"Aeronautics","level":1,"score":0.3396066427230835},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.187391459941864},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.1745401918888092},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/sysose.2011.5966620","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sysose.2011.5966620","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 6th International Conference on System of Systems Engineering","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W164987544","https://openalex.org/W291204165","https://openalex.org/W2101536363","https://openalex.org/W2141778785","https://openalex.org/W4250105043"],"related_works":["https://openalex.org/W2770234245","https://openalex.org/W96612179","https://openalex.org/W4229499248","https://openalex.org/W2566006169","https://openalex.org/W1567818861","https://openalex.org/W2987774938","https://openalex.org/W4256492088","https://openalex.org/W632915154","https://openalex.org/W2350380656","https://openalex.org/W4323797318"],"abstract_inverted_index":{"This":[0,106],"case":[1],"study":[2,66],"investigates":[3,67],"the":[4,20,60,75,89,92],"United":[5],"States":[6],"Netcentric":[7,27,70,77],"Command":[8],"and":[9,18,34,44,50,83],"Control":[10],"(C2)":[11,28],"System":[12],"of":[13,23,62,91],"Systems":[14],"(SoS)":[15],"before,":[16],"during,":[17],"after":[19],"initial":[21],"phases":[22],"Operation":[24],"Iraqi":[25],"Freedom.":[26],"systems":[29],"are":[30],"complex,":[31],"large-scale,":[32],"socio-technical,":[33],"highly":[35],"interconnected.":[36],"They":[37],"require":[38],"large":[39],"capital":[40],"investments,":[41],"asynchronous":[42,55],"design":[43],"test":[45],"periods":[46],"for":[47,113],"different":[48,63],"elements,":[49],"long":[51],"deployment":[52],"lifecycles":[53],"with":[54,59],"clock":[56],"speeds":[57],"associated":[58],"longevity":[61],"elements.":[64],"The":[65],"what":[68],"a":[69,99],"C2":[71,78],"SoS":[72,79],"is,":[73],"why":[74],"designed":[76],"needed":[80],"to":[81,87],"change,":[82],"how":[84],"it":[85],"changed":[86],"meet":[88],"needs":[90],"Army":[93],"during":[94],"selected":[95],"operational":[96],"deployments":[97],"over":[98],"ten":[100],"year":[101],"period":[102],"(2000":[103],"-":[104],"2010).":[105],"report":[107],"closes":[108],"by":[109],"offering":[110],"related":[111],"questions":[112],"further":[114],"research.":[115]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
