military and commercial information systems management and

advertisement
MILITARY AND COMMERCIAL INFORMATION SYSTEMS
MANAGEMENT AND STRATEGIC PLANNING.
CAN THEY OFFER MUTUAL BENEFITS?
Vasilios Martzoukos, George Haramis
ABSTRACT
While war is an extreme phenomenon of interaction between two or more competitive
military (usually nation states) which have a struggle of wills, there is another kind of
“war” between business competitors in every day’s life. In both cases the ultimate end
is victory, regardless if that doesn’t mean always the capitulation of the opponent but
rather his cooperation under terms favorable for the winner.
Every kind of war has to shape its doctrine, planning, strategy and tactics, according
to its age. Information is the main characteristic which distinguishes our era from the
past. This characteristic affects the nature of the environment in which competition
takes place and dictates the tools and capabilities of participants.
Contrary to past practices, where military needs promoted technology which in turn
facilitated civilian activities, today the commercial sector demands, causes major
advances in Information Technology which in turn increases competitiveness.
Recently military thinking has adopted similar concepts and shapes accordingly its
doctrine, strategy and technological substructure.
This paper examines in broad terms the recent military changes, driven by
information technology as well as their advantages and limits. At the same time the
information systems management and strategic planning in both military and
commercial sector are examined in order to investigate possible mutual benefits in
gaining competitive advantage and accomplishing their missions successfully.
INTRODUCTION
The Information Age has contributed significantly to globalization since it compresses
time, increasing the complexity and the tempo of our lives, it shrinks distances,
changes ways of creating wealth and alters the distribution of power among and
within societies. Information Technology (IT) is fundamental, between competitors,
for value–creating activities through which the velocity of operations is governed
rather by immediate decisions, instead by time and space. Information affects raw
material, products and the production energy needed. However, the increasing
availability and affordability of information and information technologies, increases
the potential of creating powerful competitors from impotent adversaries.
In business world, winning organizations are those that can be far enough and fast
enough, “information enabled”, through coevolution in interrelated parameters like,
social and economic changes, technological advances, changes in concepts of
operation, organization process, command and control approaches, education, training
1
and people. These organizations achieve domination of their ecosystems by
developing and exploiting information superiority.
In military operations Information Superiority is achieved when a competitive
advantage is derived from the ability to exploit a superior information position gained
from information operations that protect the ability to collect, process and disseminate
an uninterrupted flow of information, while exploiting and/or denying an adversary’s
ability to do the same.
Some argue that commercial sector is not really relevant to military organizations
since business is not warfare. Others support the view that the basic dynamics of the
value–creation process are domain independent. May be the proper approach is not to
mutually copy blindly the lessons learned either from the commercial or the military
sector but to use it as inputs to the each time concepts, developments and processes of
interest.
INFORMATION AGE COMMERCIAL ORGANIZATIONS.
The case studies in creating value which results in competitive advantage, should be
focused mainly in the commercial sector since it prevails in information technology
market (the defense sector represents only a small fraction). A competitive advantage
can be achieved by enhancing the relative value delivered vis-à-vis competitors, that
is increasing attractiveness of a product or service, its reliability, maintainability,
usability, responsiveness as well as reducing time lines and lowering prices.
Information and IT provide valuable means to this end. Networking, for example, in
stock markets has led to a shift from trader-centric system to a network-centric
system. Relative to this is the Metcalfe’s Law which states that as the number of
nodes in a network increases linearly, the potential value of effectiveness of the
network increases exponentially as the square number of nodes in the network. The
interactions between the network’s nodes are information intensive and as information
has the dimensions of relevance, accuracy and timeliness, the ideal aim for an
information age organization should be to achieve the percentage of 100% in those
dimensions.
Information Systems (IS), ensure that information is available to the managers in the
form they want it and when they need it. A Management Information System (MIS),
converts data from internal and external sources into information and communicates
that information in an appropriate form, to managers at all levels (operational, tactical,
strategic) in all functions, to enable them to make timely and effective decisions for
planning, directing and controlling the activities for which they are responsible. MIS
made it easier to store, process and access information than ever before. A Strategic
Information System (SIS), assists in strategic decision making and provides a
competitive advantage by changing competition ways in facing the main competition
forces namely, new competitors, intense of competition, pressure by replacement
products, buyers’ and suppliers’ bargaining force.
2
A usual Strategic Planning Process for Information Management and Technology
(IM&T), for commercial organizations, includes the following general steps:
1. Develop IM&T Strategic Vision.
1.1 Review and define corporate and business unit mission, objectives, goals
and values.
1.2 Review and analyze current technology infrastructure, assess technology
opportunities and set technology goals.
1.3 Define IM&T strategic vision, by consolidating the outcomes of above
steps 1.1 and 1.2
2. Develop IM&T requirements.
2.1 Identify current IM&T situation (strengths, weaknesses, threats,
opportunities e.t.c.)
2.2 Develop business systems requirements
2.3 Develop information management requirements
2.4 Develop information technology requirements
3. Develop IM&T Strategy.
3.1 Identify strategic directions
3.2 Develop project briefs, roadmaps and business cases.
3.3 Identify interdependencies
3.4 Define implementation timeline.
4. Obtain Commitment to IM&T Strategy.
4.1 Refine & draft strategy & obtain approval
4.2 Finalize strategy and obtain commitment
As far as management tools are concerned, strategic planning is very popular and has
been adopted by most large organizations. Some of the usual mistakes in strategic
planning process include skipping rigorous analysis, believing that strategy can be
built in a day, failing to link strategic planning with strategic execution and avoiding
strategy review meetings, in order to keep strategic plans alive.
Regardless of the specific character of distinct companies’ information strategic
planning, the creation and exploitation of information superiority, needs the following
general steps to be considered:
3
* From D. S. Alberts, J. J. Garstka, F. P. Stein “NCW: Developing and Leveraging
Information Superiority”.
The ability to generate an awareness of one’s competitive domain constitutes a basic
enabler to effective decision making at the strategic and operational level, as well as a
key to risk suppression (increased costs and/or reduced value). Virtual
organizations, enabled by networking, bring the necessary resources (people,
processes e.t.c.) together to accomplish an “ad hoc” task, after witch they can be
released for other tasks. A virtual organization can reduce time lines and increase the
tempo of operations. Virtual collaboration enables individuals (even geographically
dispersed) to collaborate in a virtual domain in order to produce faster, products of
better quality and lower price. In the financial services sector, the real-time awareness
and real-time transaction capabilities has changed the competition dynamics.
According to a 2008 research, the UK businesses fail to maximize the value of their
IT investments, potentially wasting $3.5bn a year (consultancy KPMG), due to lack of
alignment between the IT agenda and the overall business agenda. IT becomes a
strategic asset when it makes the entire business adaptive and ready for change by
connecting people, process and information to drive results. The IT benefits are
maximized when IT investment is coupled with investments in organizational
reengineering, restructuring and redesign. In conclusion IT and networking, enable
firms to create a high level of competitive awareness and new types of informationbased relationships with and among organizations.
4
MILITARY OPERATIONS IN INFORMATION AGE.
THE NEW ENVIRONMENT
Information age has changed the nature of defense and security interests (political,
economic and military). Besides the challenging typical warfare, new parameters like
technological evolution, operations other than war (OOTW), infrastructure warfare
and asymmetrical forms of warfare, have to be faced by military organizations.
Information age, has altered mission objectives, limited some erlier options, provided
new options and equiped potential enemies with new capabilities. The word
battlespace is used instead of battlefield, the nature of combatants and weapons is
different, the number of possible enemy targets has been increased and their priority
has been changed while privacy is lost. The improvements in sensors and actors cause
a transfer of intelligence from the weapons or sensors to an information infrastructure
and a corresponding relocation of complexity from the platform to the network.
NETWORK CENTRIC WARFARE
Network Centric Warfare (NCW) concept encompasses everything that can be done
to protect our information systems from being exploited, corrupted or destroyed while
simultaneously exploiting, corrupting or destroying the enemy’s information systems.
NCW is not only about technology, but broadly about human and organizational
behavior as a military response to the Information Age.
Under a high performance infostructure, military forces may now be geographically
dispersed (massing of forces of the past, today present attractive high-value targets).
With effective linking and interacting, these forces (nodes), share awareness (between
sensor, decision and actor nodes), become knowledgeable, self-synchronized, able to
cause massive effects with increased tempo of operations, increased responsiveness
and under lower risks and costs. All players and assets (battle management, planning
and execution) are merged and get into the game at the same time.
Command and Control (C2) is an iterative decision-making process, where the
battlespace is the feedback for new plans and corrective actions. Yesterday’s C2 at the
strategic, operational and tactical level, consist on a series of unfolded steps (e.g.
sensing, fusing, understanding, deciding, conveying the decisions and acting), in time
and space. Today’s political realities and technology, make difficult the clear
separation between strategic, operational and tactical, while space and time have been
compressed. Information age decentralizes C2 by self-synchronization and integrates
planning and execution processes, by collaborative decision making and by greatly
increasing the operating tempo of events, while reducing the “fog” and “friction” of
war. With less uncertainties (acceptable risk), the decision-making process can be
proactive and agile instead of defensive. The necessary condition to materialize all
these innovations is to invest in all the elements witch have to be compatible to the
new concept of operations, such as the organization, its doctrine, the set of systems
able to flow, exchange and utilize available information and the proper education and
training of personnel. May be the traditional command and control structure has to
shift into a sense-and-respond model and logistics.
5
Shared battlespace awareness requires that the information collected by sensors be put
in a form that makes it possible for other battlespace entities (but not necessarily all
others) to fuse appropriate information, place it in context and understand its
implications (Common Operational Picture). Collaborative entitie’s work needs the
link between decision, actor and sensor entities to be direct (raw data) or indirect
(products) and further more to be one-way, two-ways or interactive.
The overlap in requirements of military and commercial information systems is
steadily growing. The use of Commercial-Off-The-Shelf (COTS) IT in military
systems, provides low development and support costs and risks, while it offers
improved interoperability, accelerated deployment and incremental system evolution.
Although commercial technology is broadly used in the military, it does not always
meet the military standards like information security, sustainability, robustness,
capacity, message and signal routing, protocol compatibility e.t.c., since it is focused
to a market of commercial business enterprise. At the same time problems exist in
military acquisition process and the philosophy of doing business with companies
with commercial terms. Given other budget requirements, it makes little sense for the
military to fund the R&D necessary to meet all of its systems development needs.
Commercial R&D investment is huge and new products emerge every 12-18 months,
while the slow military acquisition process cannot capture the commercial IT at a
faster pace.
Just as new theories and doctrines were developed for industrial age warfare, so
strategists have begun to develop new theories and doctrines for information warfare.
Strategy (the ways to harmonize means and ends), today is more challenging since the
ends (national objectives) are less identifiable and means besides manpower,
materiel, money and forces, include knowledge (information warfare). Commercial
and military Information Strategic considerations present many similarities. As an
example the basic steps of the U.S. DoD Information Management & Information
Technology Strategic Plan 2008-2009 are as follows:
1. Vision: Deliver the Power of Information (An agile enterprise empowered by
access to and sharing of timely and trusted information).
2. Mission: Enable Net-Centric Operations (Lead the information age
transformation to enhance effectiveness and efficiency.
3. IM/IT Governing Principles
3.1 Ensure mission effectiveness through the transformation to net-centric
information sharing.
3.2 Ensure IM/IT investments and mandates meet mission needs.
3.3 Identify, leverage and share best practices from industry, government and
academia.
4. IM/IT Goals:
4.1 Net-Centric Transformation (Accelerate net-centric transformation to
facilitate effective and efficient warfighting, intelligence and business
processes and other national security activities)
4.2 Information as a Strategic Asset (Use information sharing to enable
effective and agile decision making through visible, accessible,
understandable and trusted data and services, when and where needed.
4.3 Interoperable Infrastructure (Ensure robust and reliable world-wide
connectivity and infrastructure within DoD and with external mission
partners.
6
4.4 Assured Information Access (Protect and Defend DoD systems, networks
and information to maximize mission assurance)
4.5 Return on Investment (Maximize the contribution of IT investments to
national security and defense outcomes)
4.6 IT Workforce Development (Maintain an agile IT workforce with the
skills to build, extend, exploit and defend a net-centric DoD).
Regardless of the specific information management and information strategic
planning, applied by the armed forces of different countries, according to their distinct
needs, the creation and exploitation of information superiority, needs the following
general steps to be considered:

From D. S. Alberts, J. J. Garstka, F. P. Stein “NCW: Developing and
Leveraging Information Superiority”.
7
COMMON CHALLENGES AND CONCERNS OF MILITARY AND
COMMERCIAL I.S. MANAGEMENT, STRATEGIC PLANNING AND I.T.
The previous brief analysis of the private and military sectors, reveals a significant
portion of common approach and practice in Strategic Planning Processes for
Information Management and Information Technology. Additionally there are almost
identical basic steps to be taken, between the two sectors, in creating and exploiting
information superiority. It is then possible that an extensive and dynamic cooperation
in these areas, could provide mutual benefits since possible weaknesses of one sector
can be complemented by corresponding strengths of the other. For example
innovative technology, procurement and supply processes as well as methods for
saving money, constitute strengths of the private sector, while reliability,
sustainability and safety characterize mainly the military sector. Finally infostructure,
a responsible MIS and the relative change in doctrines, organizations, training,
behavior and practices, is a challenging issue of interest for both sectors.
To achieve the convergence needed between the private and the military sectors, a
dynamic cooperation at organizational level should exist (for example frequent
meetings between armed forces and business R&D representatives). On the other
hand selected suitable civilians with business experience should be employed in
military organizations while ex-military personnel are often suitable for higher
positions, in commercial companies, since they work efficiently under pressure, they
are very good team players, efficient decision makers and strategic planners.
IT is cheap and spreads quickly, causing decentralization of government, military,
corporations and other organizations, despite the current hierarchical command
structures and centralized control. Since a large portion of commercial enterprises
provide military high technology material, acquisition process in the military, should
be centralized, in order to ensure that the policy of employing commercial IT is being
followed to the highest degree practical.
The private sector leads the way in practicing network-centric approaches to meet
business objectives. The military stands to benefit from network-centric operations in
the same way as the corporate sector does. The functional and infrastructure
requirements of military and commercial information systems are steadily growing
closer. For example many businesses use GPS, GIS, encrypted data links, messaging
reliable delivery methods, computer support for confidential planning, e.t.c.. On the
other hand, the military have adopted commercial practices like “just –in-time”
methods (minimized stockpiles of spare parts) for mobilization. These methods are
heavily computer depended and if the computer goes down, everything freezes. One
of the main differences in the development of information technologies between the
industrial and military communities, is the fact that commercial market is driven by
profit and not always by the overall system performance. Additionally, the military
applications demand higher performance at reduced time cycles than do nonmilitary
applications.
8
During the industrial-age warfare, there was a revolutionary rethinking in military
theories and doctrines, like for example, mechanized warfare and strategic bombing.
Today’s information revolution presents a similar situation, since IS are vital to the
military and civilian society. In present and future wars we can expect civilian and
military IS to be hacked, penetrated and infected with computer viruses.
The threat of strategic information war erases the distinction between military and
civilian systems. The strong connection between them complicates the process of
detecting an attack and developing an effective defense. In addition to the threat to
military forces, today one of the most effective ways to attack an opponent is to attack
its civilian information infrastructure like financial data systems, commercial
communications systems and broadcasting networks. How a government can protect
its information infrastructure, which it neither owns nor controls? The growing
dependence on sophisticated information systems brings an increasing vulnerability to
hostile actions which are cheap, easy, virtually undetectable and hard to associate. IS
protection should be a high priority, through close cooperation between commercial
and military sector, as well as through appropriate legislation. It is however
challenging to describe and apply the IW relationship between the military and
civilian society, when it comes to the protection of democratic values, like freedom of
expression, free market and personal privacy.
For the military as well as for business, access to IT is only an enabler, while the real
power comes from timely and innovative exploitation of that technology, by
organizing all the IW (or business competition) elements as a system, then integrating
it into the larger system of warfighting (or businessfighting), in a way that enhances
operations tempo. Such a system requires a high level of dynamic experimentation
and simulation capability.
IS interoperability is a high priority and complicated issue since it involves the
challenge of an effective cooperation between different commercial companies,
private and military sector, different branches of the armed forces, different armed
forces and different generations of IT. At the same time significant investment to IT
and interoperability, out of limited budgets leads to the dilemma of sacrificing needed
platform quantity.
Regardless of the growing reliance on network-centric operations, the users should be
aware of its technical, operational, strategic and cultural limitations. For example, the
need for more and more communications bandwidth and fragile technology (affected
by hacking, jamming, deception or weather conditions e.t.c.), could distort network
effectiveness, while too much information allows senior commanders to micromanage
and forces to be hesitant, indecisive or even paralyzed without it. Additionally the key
to winning strategic information war (or competition), may be lies in network
sovereignty (or autonomy). Finally human aspects of network-centric operations, like
training, doctrine, culture, attitude and leadership, still need to change.
9
CONCLUSION
To enter the Information Age and to adjust to its new realities, is an essence and by no
means optional. Otherwise the business competitive advantage vanishes and military
forces cannot respond to their missions effectively. Without timely and reliable shared
information, modern companies or armed forces are “dead”.
IS Management/Strategic Planning and the relative IT, tie the civilian and military
sectors’ relationship closer than ever in history. For both, value-creation can be
achieved only if they can be far enough and fast enough “information enabled”.
Successful transformation to the demands of 21st century, includes interrelated
parameters like organizational processes and doctrines, as well as behavior, culture,
education and training of people. IT is not a commodity but rather a strategic asset,
when implemented and used appropriately, since it enables an organization and its
people to be reliable, unified, agile, adaptive and responsive. IT has the potential to
affect, silently and without a notice, government, social, business and financial
institutions, as well as C3 systems. Any of these societal attributes may be
contaminated or destroyed without a widespread physical destruction.
Despite different origins and motives, today, commercial and military sectors have
common interests in the domain of IS, MIS and SIS. For issues like value-creation,
competition, survivability, safety, responsiveness, sustainability, reliability,
interoperability, operational pace, IT, infostructure and networking, R&D investment,
organizational transformation, supply methods e.t.c., lessons learned of one sector can
be used as inputs for the other to each time concepts, developments and processes of
interest. To this end a dynamic and extensive cooperation has to be established
between the two sectors.
The edge will belong to those who develop a strategic plan and are willing to make
the investments necessary to always be ahead of the wave and not merely on it.
REFERENCES
1. Alberts D.S., Garstka J.J., Stein F.P. “Network Centric Warfare: Developing
and Leveraging Information Superiority”. 2nd Edition. CCR Publication Series.
February 2000.
2. Berkowitz B. “Warfare in the Information Age”, Issues in Science and
Technology, Fall 1995, pp. 59-66. University of Texas at Dallas.
3. Barrows E. “Four Fatal Flows of Strategic Planning”, Harvard Management
Update. March 13 2009.
4. Chand P., “Network-Centric Warfare: Some Fundamentals”, Air Power
Journal Vol. 2, No. 1, Spring 2005 (Jan-Mar).
5. Clarke R. “The Path of Development of Strategic Information Systems
Theory”. 5 July 2005.
6. Department Of Commerce (DOC), “Information Management and Technology
(IM&T) Strategic Planning Process”. Information Sheet, Issue No 1, First
Published: May 2004.
7. Department of Defense “Information Management & Information Technology
Strategic Plan 2008-2009”.
10
8. Fast W.R., “Knowledge Strategies: Balancing Ends, Ways and Means in the
Information Age”, Institute for National Strategic Studies, October 1, 2002.
9. Finney Russ, “Information Technology Strategic Planning”, itmWEB Site,
Copyright 2006, July 21, 1997.
10. Harizanova Adriana “Management Information System in Tailoring Industry”,
Academic Open Internet Journal, Vol. 9, 2003.
11. Kramer F.D., Cittadino J.C. “Sweden’s Use of Commercial Information
Technology for Military Applications”, Defense Horizons, Center for
Technology and National Security Policy, National Defense University.
October 2005.
12. Lin G.Y., Luby R.E., Wang Ko-Yang, “New Model for Military Operations”,
Operations Research Management Science, OR/MS Today – December 2004.
13. Luddy J. “The Challenge and Promise of Network-Centric Warfare”,
Lexington Institute, February 2005.
14. Rasmus D. W. “Building Strategic Advantage Through IT”. Microsoft
Business Insights. Microsoft Corporation 2008.
15. Thomas T. L., “Deterring Information Warfare; A New Strategic Challenge”,
Foreign Military Studies Office, Fort Leavenworth, KS, Winter 1996-97, pp.
81-91.
11
Download