{"id":"https://openalex.org/W1547923012","doi":"https://doi.org/10.1109/syscon.2015.7116817","title":"An example of scenario-based evaluation of military capability areas An impact assessment of alternative systems on operations","display_name":"An example of scenario-based evaluation of military capability areas An impact assessment of alternative systems on operations","publication_year":2015,"publication_date":"2015-04-01","ids":{"openalex":"https://openalex.org/W1547923012","doi":"https://doi.org/10.1109/syscon.2015.7116817","mag":"1547923012"},"language":"en","primary_location":{"id":"doi:10.1109/syscon.2015.7116817","is_oa":false,"landing_page_url":"https://doi.org/10.1109/syscon.2015.7116817","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 Annual IEEE Systems Conference (SysCon) Proceedings","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054499806","display_name":"Marko Suojanen","orcid":null},"institutions":[{"id":"https://openalex.org/I2801260548","display_name":"Finnish Defence Forces","ror":"https://ror.org/04avm2781","country_code":"FI","type":"other","lineage":["https://openalex.org/I2801260548"]},{"id":"https://openalex.org/I4387155790","display_name":"Puolustusvoimien tutkimuslaitos","ror":"https://ror.org/02kpw7e71","country_code":null,"type":"government","lineage":["https://openalex.org/I2801260548","https://openalex.org/I4387155790"]}],"countries":["FI"],"is_corresponding":true,"raw_author_name":"Marko Suojanen","raw_affiliation_strings":["Information Technology Division, Innish Defence Research Agency, Riihim\u00e4ki, Finland","Information Technology Division, Finnish Defence Research Agency, Riihim\u00e4ki, Finland"],"affiliations":[{"raw_affiliation_string":"Information Technology Division, Innish Defence Research Agency, Riihim\u00e4ki, Finland","institution_ids":["https://openalex.org/I4387155790"]},{"raw_affiliation_string":"Information Technology Division, Finnish Defence Research Agency, Riihim\u00e4ki, Finland","institution_ids":["https://openalex.org/I2801260548","https://openalex.org/I4387155790"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014756026","display_name":"Vesa Kuikka","orcid":"https://orcid.org/0000-0002-3677-816X"},"institutions":[{"id":"https://openalex.org/I2801260548","display_name":"Finnish Defence Forces","ror":"https://ror.org/04avm2781","country_code":"FI","type":"other","lineage":["https://openalex.org/I2801260548"]},{"id":"https://openalex.org/I4387155790","display_name":"Puolustusvoimien tutkimuslaitos","ror":"https://ror.org/02kpw7e71","country_code":null,"type":"government","lineage":["https://openalex.org/I2801260548","https://openalex.org/I4387155790"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Vesa Kuikka","raw_affiliation_strings":["Information Technology Division, Innish Defence Research Agency, Riihim\u00e4ki, Finland","Information Technology Division, Finnish Defence Research Agency, Riihim\u00e4ki, Finland"],"affiliations":[{"raw_affiliation_string":"Information Technology Division, Innish Defence Research Agency, Riihim\u00e4ki, Finland","institution_ids":["https://openalex.org/I4387155790"]},{"raw_affiliation_string":"Information Technology Division, Finnish Defence Research Agency, Riihim\u00e4ki, Finland","institution_ids":["https://openalex.org/I2801260548","https://openalex.org/I4387155790"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074554600","display_name":"Juha-Pekka Nikkarila","orcid":null},"institutions":[{"id":"https://openalex.org/I4387155790","display_name":"Puolustusvoimien tutkimuslaitos","ror":"https://ror.org/02kpw7e71","country_code":null,"type":"government","lineage":["https://openalex.org/I2801260548","https://openalex.org/I4387155790"]},{"id":"https://openalex.org/I2801260548","display_name":"Finnish Defence Forces","ror":"https://ror.org/04avm2781","country_code":"FI","type":"other","lineage":["https://openalex.org/I2801260548"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Juha-Pekka Nikkarila","raw_affiliation_strings":["Information Technology Division, Innish Defence Research Agency, Riihim\u00e4ki, Finland","Information Technology Division, Finnish Defence Research Agency, Riihim\u00e4ki, Finland"],"affiliations":[{"raw_affiliation_string":"Information Technology Division, Innish Defence Research Agency, Riihim\u00e4ki, Finland","institution_ids":["https://openalex.org/I4387155790"]},{"raw_affiliation_string":"Information Technology Division, Finnish Defence Research Agency, Riihim\u00e4ki, Finland","institution_ids":["https://openalex.org/I2801260548","https://openalex.org/I4387155790"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035297149","display_name":"Jari Nurmi","orcid":"https://orcid.org/0000-0003-2169-4606"},"institutions":[{"id":"https://openalex.org/I166825849","display_name":"Tampere University","ror":"https://ror.org/033003e23","country_code":"FI","type":"education","lineage":["https://openalex.org/I166825849"]},{"id":"https://openalex.org/I4210133110","display_name":"Tampere University","ror":null,"country_code":"FI","type":null,"lineage":["https://openalex.org/I4210133110"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Jari Nurmi","raw_affiliation_strings":["Department of Electronics and Communications Engineering, Tampere University of Technology, Tampere, Finland","[Department of Electronics and Communications Engineering, Tampere University of Technology, Finland]"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Communications Engineering, Tampere University of Technology, Tampere, Finland","institution_ids":["https://openalex.org/I166825849","https://openalex.org/I4210133110"]},{"raw_affiliation_string":"[Department of Electronics and Communications Engineering, Tampere University of Technology, Finland]","institution_ids":["https://openalex.org/I4210133110"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5054499806"],"corresponding_institution_ids":["https://openalex.org/I2801260548","https://openalex.org/I4387155790"],"apc_list":null,"apc_paid":null,"fwci":1.2248,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.8110486,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"601","last_page":"607"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T14306","display_name":"Technology Assessment and Management","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T14306","display_name":"Technology Assessment and Management","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12000","display_name":"Systems Engineering Methodologies and Applications","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11572","display_name":"Information Technology Governance and Strategy","score":0.9884999990463257,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6143890023231506},{"id":"https://openalex.org/keywords/systems-engineering","display_name":"Systems engineering","score":0.6098489165306091},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.531001091003418},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.49005305767059326},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.4187510013580322},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.4143778085708618},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.3895229697227478},{"id":"https://openalex.org/keywords/engineering-management","display_name":"Engineering management","score":0.35470524430274963},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.2813259959220886},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.19161748886108398},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.08576276898384094}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6143890023231506},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.6098489165306091},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.531001091003418},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.49005305767059326},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.4187510013580322},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.4143778085708618},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.3895229697227478},{"id":"https://openalex.org/C110354214","wikidata":"https://www.wikidata.org/wiki/Q6314146","display_name":"Engineering management","level":1,"score":0.35470524430274963},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.2813259959220886},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.19161748886108398},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.08576276898384094},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/syscon.2015.7116817","is_oa":false,"landing_page_url":"https://doi.org/10.1109/syscon.2015.7116817","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 Annual IEEE Systems Conference (SysCon) Proceedings","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W12171914","https://openalex.org/W211519104","https://openalex.org/W1260840704","https://openalex.org/W1454766219","https://openalex.org/W1584420816","https://openalex.org/W1964962870","https://openalex.org/W2017605236","https://openalex.org/W2064426068","https://openalex.org/W2088260142","https://openalex.org/W2095382147","https://openalex.org/W2116141415","https://openalex.org/W2117964283","https://openalex.org/W2153594735","https://openalex.org/W2188069891","https://openalex.org/W2626366852","https://openalex.org/W2993403074","https://openalex.org/W4240579917","https://openalex.org/W4285719527","https://openalex.org/W6600501551","https://openalex.org/W6628110900","https://openalex.org/W6628435692","https://openalex.org/W6634889975","https://openalex.org/W6687024443","https://openalex.org/W6771138625"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2964604098","https://openalex.org/W2997512100","https://openalex.org/W1527191935","https://openalex.org/W2393933887","https://openalex.org/W2351190957","https://openalex.org/W1555721731","https://openalex.org/W2152018389","https://openalex.org/W228411881","https://openalex.org/W2374725260"],"abstract_inverted_index":{"The":[0,28,66],"concept":[1],"of":[2,11,18,21,40,55,72,108,111,122,132,138],"military":[3,22],"capabilities":[4],"is":[5,76],"often":[6],"used":[7],"in":[8,43,95,105,125],"strategic":[9],"planning":[10],"defense.":[12],"This":[13],"study":[14,29,67],"describes":[15],"an":[16],"example":[17],"scenario-based":[19],"evaluation":[20],"capability":[23,33,144],"areas":[24,127],"using":[25],"alternative":[26],"systems.":[27,114],"concentrates":[30],"on":[31,119,129],"three":[32],"areas:":[34],"protection,":[35,89],"awareness":[36,92],"and":[37,74,91,128],"engagement.":[38],"Evaluations":[39],"new":[41,50,64],"systems":[42,57,62,86],"realistic":[44],"but":[45],"future-oriented":[46],"scenarios":[47],"may":[48,101],"reveal":[49,102],"possibilities":[51],"to":[52,59,82,87,134,142],"utilize":[53],"collaboration":[54],"different":[56],"or":[58,84],"replace":[60],"existing":[61],"with":[63],"ones.":[65],"indicates":[68],"how":[69],"the":[70,77,96,106,109,120,123,130,136,139,143],"combination":[71,110],"UAVs":[73],"satellites":[75],"most":[78],"prominent":[79],"system":[80],"compared":[81],"UAV":[83],"satellite":[85],"enhance":[88],"engagement":[90],"capability,":[93],"especially":[94],"10-year":[97],"span.":[98],"Technology":[99],"development":[100,141],"unexpected":[103],"synergies":[104],"utilization":[107],"these":[112],"two":[113],"Further":[115],"work":[116],"will":[117],"focus":[118],"application":[121],"methodology":[124],"other":[126],"collection":[131],"data":[133],"analyze":[135],"effect":[137],"technology":[140],"areas.":[145]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2015,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
