1,457
Views
10
CrossRef citations to date
0
Altmetric
Original Articles

Mission Command in the Information Age: A Normal Accidents Perspective on Networked Military Operations

&
Pages 445-466 | Published online: 22 Apr 2014
 

Abstract

Theory on the use of information technology in military operations assumes that bringing together units in an information network helps units to work together. Decentralized command systems such as mission command have been proposed for these networks, so that units can adapt to changes in their turbulent working environments. Others have proposed centralized command systems that permit higher organizational levels to closely direct military operations. This article uses Perrow’s (1984, 1999) Normal Accidents Theory to propose that increasing interdependencies between units in information networks places incompatible demands on the design of networked military operations. It is concluded that networked military operations require decentralized command approaches, but only under the condition that interdependencies between modules of networked units are weak rather than tight. This precondition is essential for retaining control over networked military operations.

Notes

1 Bradford Booth, Meyer Kestnbaum, and David R. Segal, ‘Are Post-Cold War Militaries Postmodern?’ Armed Forces & Society 27/3 (Spring 2001), 319–42. Kenton G. Fasana, ‘Using Capabilities to Drive Military Transformation: An Alternative Framework’ Armed Forces and Society 37/1 (Jan. 2011), 141–62. Anders McD. Sookermany, ‘The Embodied Soldier: Towards a New Epistemological Foundation of Soldiering Skills in the (Post) Modernized Norwegian Armed Forces’, Armed Forces and Society 37/3 (July 2010), 469–93.

2 Eitan Shamir, Transforming Command: The Pursuit of Mission Command in the US, UK, and Isaeli Armies (Stanford UP 2011); Stephen Bungay, The Art of Action. How Leaders Close the Gaps between Plans, Actions, and Results (London: Nicholas Brealey Publishing 2011); Ad L. W. Vogelaar and Eric-Hans Kramer, ‘Mission Command in Dutch Peace Support Operations’ Armed Forces and Society 30/3 (Spring 2004), 412.

3 Vogelaar and Kramer, ‘Mission Command’, 409–31.

4 We use the term networked military operations to refer to military operations where IT is used for sharing information and communication. For more information on different approaches to networked military operations see: Theo Farrell and Sten Rynning, ‘NATO's Transformation Gaps: Transatlantic Differences and the War in Afghanistan’, Journal of Strategic Studies 33/5 (Oct. 2010), 673–99.

5 More information about NCW and the value chain can be found in the research report of the NATO RTO Task Group SAS-065, <http://www.dodccrp.org/files/N2C2M2_web_optimized.pdf>. See also David S. Alberts, John J. Garstka, and Frederick P. Stein, Network Centric Warfare (Washington DC: CCRP Publication Series 1999).

6 David S. Alberts and Richard E. Hayes, Power to the Edge: Command and Control in the Information Age (Washington DC: CCRP Publication Series 2003). David S. Alberts and Richard E. Hayes, Understanding Command and Control (Washington DC: CCRP Publication Series 2006).

7 Damon Coletta and Peter D. Feaver, ‘Civilian Monitoring of US Military Operations in the Information Age’, Armed Forces and Society 33/1 (Oct. 2006), 106–26.

8 Eitan Shamir, ‘The Long and Winding Road: The US Army Managerial Approach to Command and The Adoption of Mission Command (Auftragstaktik)’, Journal of Strategic Studies 33/5 (Oct. 2010), 645–72.

9 Thomas S. Sowers, ‘Nanomanagement – Superior Control and Subordinate Authority in Conflict’, Doctoral thesis, London School of Economics (2011), 67–74.

10 Douglas A. Macgregor, Transformation Under Fire – Revolutionizing How America Fights (Westport, CT: Praeger 2006).

11 Robert R. Leonhard, The Principles of War for the Information Age (Novato, CA: Presidio 1998).

12 Sowers, ‘Nanomanagement’, 70.

13 Eliot A. Cohen, ‘Change and Transformation in Military Affairs’, Journal of Strategic Studies 27/3 (Sept. 2004), 395–407. David J. Betz, ‘The More You Know, the Less You Understand: The Problem with Information Warfare’, Journal of Strategic Studies 29/3 (Sept. 2006), 505–33.

14 Stephen Bungay, ‘The Road to Mission Command: The Genesis of a Mission Command Philosophy’, The British Army Review 137 (Summer 2005), 22–9; Bungay, The Art of Action; Keith G. Stewart, ‘The Evolution of Command Approach’, paper presented at the 15th International Command and Control Research and Technology Symposium, Santa Monica, CA, 23 June 2010; Shamir, ‘The Long and Winding Road’, 645–72.

15 Shamir, The Long and Winding Road, 647; Shamir, Transforming Command, 33. New technologies that were used by von Moltke included rail and river transportation, breach-loading artillery, and the telegraph. See Antullio J. Echevarria, After Clausewitz: German Military Thinkers before the Great War (Lawrence: University of Kansas, 2000), 38.

16 Ibid.

17 Keith Spacie, ‘Mission command in Peace Support Operations: Does it Apply?’, in Peter Essens, Ad Vogelaar, Erhan Tanercan, and Donna Winslow (eds), The Human in Command: Peace Support Operations (Amsterdam/Breda: Mets & Schilt/KMA 2001), 205–11.

18 For an overview of differences between US and UK mission command approaches, see Thomas S. Sowers, ‘Nanomanagement’, 67–74.

19 Bungay, The Art of Action, 54–89. Shamir, ‘The Long and Winding Road’, 645–72.

20 Keith G. Stewart, ‘Mission Command: Problem Bounding or Problem Solving?’, Canadian Military Journal 9/4 (2009), 50–9.

21 Vogelaar and Kramer, ‘Mission Command’, 409–31.

22 Alberts and Hayes, Understanding Command and Control, 91–2.

23 Vogelaar and Kramer, ‘Mission Command’, 409–31.

24 Coletta and Feaver, ‘Civilian Monitoring’, 106–26.

25 Eitan Shamir, Transforming Command, 188.

26 Coletta and Feaver, ‘Civilian Monitoring’, 121.

27 Christine van Burken, ‘The Non-neutrality of Technology’, Military Review 93/3 (2013), 39–47.

28 Charles Perrow, ‘A Personal Note on Normal Accidents’, Organization Environment 17/9 (March 2004), 9–14.

29 Charles Perrow, Normal Accidents: Living with High-Risk Technologies (Princeton UP 1999; New York: Basic Books 1984), 72–3.

30 Perrow, Normal Accidents, 333.

31 Ibid.

32 Martin van Creveld, Command in War (Cambridge, MA: Harvard UP 1985).

33 Perrow, Normal Accidents, 92.

34 Van Creveld, Command in War, 269.

35 Macgregor, Transformation Under Fire, 12.

36 Perrow, Normal Accidents, 334.

37 Scott D. Sagan, The Limits of Safety: Organizations, Accidents, and Nuclear Weapons (Princeton UP 1993), 40.

38 Van Creveld, Command in War, 270.

39 James D. Thompson, Organizations in Action: Social Sciences Bases of Administrative Theory (New Brunswick, NJ: Transaction 2003 rev. ed./ New York: McGraw-Hill 1967).

40 Karl E. Weick, Making Sense of the Organization, Volume II: The Impermanent Organization (Southern Gate, Chichester: Wiley 2009), 54.

41 See Charles Perrow; ‘Difficulties with Network Centric Warfare’, in Jacques S. Gansler and Hans Binnendijk (eds), Information Assurance: Trends in Vulnerabilities, Threats, and Technologies (Washington DC: National Defense Univ. 2004), 132–46.

42 Ibid., 143.

43 Ibid., 144.

44 Ibid., 143.

45 Carliss Y. Baldwin and Kim B. Clark, ‘Managing in an Age of Modularity’, Harvard Business Review 75/5 (Oct. 1997), 84–93.

46 Melissa A. Schilling, ‘Toward a General Modular Systems Theory and its Application to Interfirm Product Modularity’, Academy of Management Review 25/2 (April 2000), 312–25.

47 Erik De Waard and Eric-Hans Kramer, ‘Tailored Task Forces: Temporary Organizations and Modularity’, International Journal of Project Management 26/5 (July 2008), 544.

48 See Douglas A. Macgregor, Breaking the Phalanx: A New Design for Landpower in the 21st Century (Westport, CT: Praeger 1997).

49 De Waard and Kramer, ‘Tailored Task Forces’, 544.

50 J.A. Bonin and E. Telford, ‘The Modular Army’, Military Review, March--April (2004), 21–7. Erik De Waard, Engaging Environmental Turbulence, Doctoral thesis, Rotterdam: Erasmus Univ. 2010.

51 See Macgregor, Transformation Under Fire, 119–54. S. Johnson, J. Peters, K. Kitchens, A. Martin, and J. Fischbach, A Review of the Army’s Modular Force Structure (Santa Monica, CA: RAND Corp. 2012).

52 A. Ryan, Putting Your Young Men into the Mud. Land and Warfare Studies Centre, Working Paper No. 124 (Dandroon, Australia: Army Land Warfare Studies Centre 2003).

53 Macgregor, Transformation under Fire, 129.

54 Perrow, ‘Difficulties with Network Centric Warfare’, 139.

55 Ibid.

Additional information

Notes on contributors

Bart Van Bezooijen

Bart van Bezooijen is post-doctoral research fellow at the Department of Industrial Engineering & Innovation Sciences of the Eindhoven University of Technology (Netherlands). He is part of the research program ‘Moral fitness of military personnel in a networked environment’, which is supported by the Netherlands Organization for Scientific Research (NWO) under grant number 313-99-110.

Eric-Hans Kramer

Eric-Hans Kramer is associate professor Human Factors and Systems Safety at the Netherlands Defence Academy.

Log in via your institution

Log in to Taylor & Francis Online

PDF download + Online access

  • 48 hours access to article PDF & online version
  • Article PDF can be downloaded
  • Article PDF can be printed
USD 53.00 Add to cart

Issue Purchase

  • 30 days online access to complete issue
  • Article PDFs can be downloaded
  • Article PDFs can be printed
USD 329.00 Add to cart

* Local tax will be added as applicable

Related Research

People also read lists articles that other readers of this article have read.

Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.

Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.