RELATIONAL RISK ASSESSMENT IN THE DESIGN OF CURRENT MILITARY OPERATIONS
Abstract
Abstract: The aim of this article is to analyze the risk assessment process of designing the current military operations from the perspective of the scientific argumentation of the Military Risk Assessment Matrix (MRAM) methodology. The use of this matrix is an efficient and expedient practice that is heavily used by the political and military decision makers, senior or junior leaders, throughout the all levels. In this respect, the matrix structure, the quantitative and qualitative classification of the data and, finally, the graphical representation of the results are not solely based on merely empirical arguments. On the
contrary, their relevance is supported by a refined mathematical apparatus that explores and processes consistent data sets using the distributions of mathematical statistics. This article represents a partial dissemination of the results obtained in the Report no. 3 of the doctoral program at the Doctoral School of “Carol I” National Defense University to support the thesis entitled “The relational determinations specific to the modern war based on the complexity theory”.
Keywords: management; risk; matrix; military; operations; complexity.
References
Johnson, C.W., Military Risk Assessment:From Conventional Warfare to Counter Insurgency Operations, University of Glasgow Press, Glasgow, Scotland, 2012, ISBN 978-0-85261-933-9. U.S. Joint Chiefs of Staffs, Joint Publication 3-0 – Joint Operations, issued:17 January 2017, accessed on 07.12.2017, https://fas.org/irp/doddir/dod/jp3_0.pdf
ISO 31000:2009(E) –„Risk management — Principles and guidelines”, accessed on 27.02.2018, https://www.inxsoftware.com/media/transfer/doc/as_nzs_iso_31000_2009_risk_management_principles_and_guidelines_rtf.pdf
Manic, Ivana, Mathematical Models for Estimation of Operational Risk and Risk Management, master thesis, University of Mathematics Prirodno din Novi Sad, Serbia, 2007, accessed on 17.02. 2018, http://people.
dmi.uns.ac.rs/~natasa/ivana.pdf
Miller, T. David, Defense 2045 – Assessingthe Future Security Environment and Implications for Defense Policymakers,
Center for Strategic and International Studies, 1616 Rhode Island Avenue, NW Washington, DC 20036, November 2015, ISBN: 978-1-
-5888-4 (pb).
North Atlantic Treaty Organization, Allied Joint Publication -01– Allied Joint Doctrine,Edition E Version 1, issued: February 2017, accessed 07.12.2017, https://www.gov.uk/government/uploads/system/uploads/
attachment_data/file/602225/doctrine_nato_allied_joint_doctrine_ajp_01.pdf
North Atlantic Treaty Organization, Supreme Allied Commander Transformation, Supreme Allied Commander Europe, Framework for
Future Alliance Operations, issued: August 2015, accessed on 18.12.2017, http://www.act.nato.int/images/stories/media/doclibrary/
ffao-2015.pdf
Pamlin, Dennis and Dr Armstrong, Stuart,Global Challenges 12 Risks that threaten human civilization, (Stockholm: Global Challenges Foundation, 2015), accessed on 07.12.2017, https://api.globalchallenges.org/
static/wp-content/uploads/12-Risks-withinfinite-impact.pdf
U.S. Army War College, Department of Military Strategy, Planning, and Operations, Campaign Planning Handbook, Issued 2016, accessed on 12.01.2018, https://ssi.armywarcollege.edu/PDFfiles/PCorner/
CampaignPlanningHandbook.pdf
US Chairman of the Joint Chiefs of Staff Manual, „Joint Risk Analysis – CJCSM 3105.01”, October 2016, accessed on 22.02.2018, http://www.jcs.mil/Portals/36/Documents/Library/Manuals/CJCSM%20
01%C2%A0.pdf?ver=2017-02-15-105309-907
US Headquarters Department of the Army, FM 5-19 Composite Risk Management, august 2006, accessed on 22.02.2018, http://
cdm16635.contentdm.oclc.org/cdm/ref/collection/p16635coll8/id/55440
Downloads
Published
How to Cite
Issue
Section
License
The published articles are subject to copyright law. All rights are reserved to the “Carol I” National Defense University, regardless of whether all or part of the material are considered, especially the rights to translation, reprinting, re-use of illustrations, quotations, broadcasting through the media, reproduction on microfilms or any other way and storage in data banks. Any replicas without the associated fees are authorized provided the source is acknowledged.