Main Article Content

Abstract

This study attempts to describe the management of Indonesian Air Force (TNI-AU) personnel in preparing for the implementation of Network Centric Warfare (NCW). Globally, the military’s Information and Communication Technology (ICT) is growing. The war in this digital era makes every country need to prepare itself for the attacks of the digital world. In Indonesia itself, the Indonesian National Army (TNI) has included NCW as one of its programs to deal with possible disturbances in state security stability through the digital world. In addition, NCW is needed by the TNI as a form of a centralized and fast command communication strategy. This study uses a case study strategy involving five informants and written data to complete the integrity of the data. In personnel training management, the TNI-AU has prepared integrated infrastructure development, modeling and simulation, cyber defense management, and personnel management to be specially prepared to occupy crucial positions in the implementation of NCW. This personnel training concentrates on strengthening protection from foreign attacks in the digital world and the technology of unmanned warfare vehicles.

Keywords

Cyber Defense Network Centric Warfare Personnel Training

Article Details

How to Cite
Sudarya, A. (2022). Personnel Management of The Indonesian National Army Air Force (TNI-AU) In Preparing To Implement Network Centric Warfare. Atestasi : Jurnal Ilmiah Akuntansi, 5(2), 693–709. https://doi.org/10.57178/atestasi.v5i2.781

References

  1. Alberts, D. S., Garstka, J. J., & Stein, F. P. (2000). Network Centric Warfare: Developing and Leveraging Information Superiority (2nd ed.). Washington DC: CCRP Publication Series.
  2. Arifin, M. A., & Tajudeen, F. P. (2020). Impact of human resources information systems in the military environment. Asia Pacific Management Review, 25(4), 198–206. https://doi.org/10.1016/j.apmrv.2020.02.001
  3. Baškarada, S. (2014). Qualitative Case Study Guidelines. The Qualitative Report. https://doi.org/10.46743/2160-3715/2014.1008
  4. Beer, M., Spector, B., Lawrence, P. R., Mills, D. Q., & Walton, R. E. (1984). Managing Human Assets: The Ground Breaking Harvard Business School Program. New York: Free Press.
  5. Choshin, M., & Ghaffari, A. (2017). An investigation of the impact of effective factors on the success of e-commerce in small- and medium-sized companies. Computers in Human Behavior, 66, 67–74. https://doi.org/10.1016/j.chb.2016.09.026
  6. Dwivedi, Y. K., Rana, N. P., Jeyaraj, A., Clement, M., & Williams, M. D. (2019). Re-examining the Unified Theory of Acceptance and Use of Technology (UTAUT): Towards a Revised Theoretical Model. Information Systems Frontiers, 21(3), 719–734. https://doi.org/10.1007/s10796-017-9774-y
  7. Fernandez, D., Zainol, Z., & Ahmad, H. (2017). The impacts of ERP systems on public sector organizations. Procedia Computer Science, 111, 31–36. https://doi.org/10.1016/j.procs.2017.06.006
  8. Fombrun, C. J., Tichy, N. M., & Devanna, M. A. (1984). Strategic Human Resource Management. New York: John Wiley and Sons, Inc.
  9. Garstka, J. J. (2003, May). Network-Centric Warfare Offers Warfighting Advantage. SIGNAL. Retrieved from https://www.afcea.org/content/network-centric-warfare-offers-warfighting- advantage/
  10. Gooderham, P. N., Morley, M. J., Parry, E., & Stavrou, E. (2015). National and firm-level drivers of the devolution of HRM decision making to line managers. Journal of International Business Studies, 46(6), 715–723. https://doi.org/10.1057/jibs.2015.5
  11. Grobler, M., Gaire, R., & Nepal, S. (2021). User, Usage and Usability: Redefining Human Centric Cyber Security. Frontiers in Big Data, 4. https://doi.org/10.3389/fdata.2021.583723
  12. Guha, M. (2021). Technical ecstasy: Network-centric warfare redux. Security Dialogue, 1–17. https://doi.org/10.1177/0967010621990309
  13. Hall, A. O., & Fu, M. C. (2015). Optimal Army officer force profiles. Optimization Letters, 9(8), 1769–1785. https://doi.org/10.1007/s11590-015-0947-7
  14. Herring, M. J., & Willett, K. D. (2014). A Vision for Real-Time Cyber Defense. Journal of Information Warfare, 13(2), 46–55. Retrieved from https://www.jstor.org/stable/26487121
  15. Ibrahim, H., Mohd Shamsudin, F., Mohd Zin, M. L., & Subramaniam, C. (2018). Understanding User Characteristics as Antecedents of Technostress towards HRMIS: A Mixed-Method Study. Jurnal Pengurusan, 53, 37–47. https://doi.org/10.17576/pengurusan-2018-53-04
  16. Intra, G., Alteri, A., Corti, L., Rabellotti, E., Papaleo, E., Restelli, L., et al. (2016). Application of failure mode and effect analysis in an assisted reproduction technology laboratory.
  17. Reproductive BioMedicine Online, 33(2), 132–139. https://doi.org/10.1016/j.rbmo.2016.05.008
  18. Jnitova, V., Elsawah, S., & Ryan, M. (2017). Review of simulation models in military workforce planning and management context. The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology, 14(4), 447–463. https://doi.org/10.1177/1548512917704525
  19. Kang, B. G., Seo, K.-M., & Kim, T. G. (2018). Communication Analysis of Network-Centric Warfare via Transformation of System of Systems Model into Integrated System Model Using Neural Network. Complexity, 2018, 1–16. https://doi.org/10.1155/2018/6201356
  20. Kaufman, B. E. (2015). Evolution of Strategic HRM as Seen Through Two Founding Books: A 30th Anniversary Perspective on Development of the Field. Human Resource Management, 54(3), 389–407. https://doi.org/10.1002/hrm.21720
  21. Kioumourtzis, G., Bouras, C., & Gkamas, A. (2012). Performance evaluation of ad hoc routing protocols for military communications. International Journal of Network Management, 22(3), 216–234. https://doi.org/10.1002/nem.802
  22. Kumar, S. (2021). The missing piece in human-centric approaches to cybernorms implementation: the role of civil society. Journal of Cyber Policy, 1–19. https://doi.org/10.1080/23738871.2021.1909090
  23. Lu, T., Chen, K., Zhang, Y., & Deng, Q. (2021). Research on Dynamic Evolution Model and Method of Communication Network Based on Real War Game. Entropy, 23(4), 487. https://doi.org/10.3390/e23040487
  24. Mayrhofer, W., Gooderham, P. N., & Brewster, C. (2019). Context and HRM: Theory, Evidence, and Proposals. International Studies of Management & Organization, 49(4), 355–371. https://doi.org/10.1080/00208825.2019.1646486
  25. Mazari Abdessameud, O., Van Utterbeeck, F., & Guerry, M.-A. (2021). Military Human Resource Planning through Flow Network Modeling. Engineering Management Journal, 1–12. https://doi.org/10.1080/10429247.2021.1900660
  26. McKenna, S., Richardson, J., & Manroop, L. (2011). Alternative paradigms and the study and practice of performance management and evaluation. Human Resource Management Review, 21(2), 148–157. https://doi.org/10.1016/j.hrmr.2010.09.002
  27. Metcalfe, B. (2013). Metcalfe’s Law after 40 Years of Ethernet. Computer, 46(12), 26–31. https://doi.org/10.1109/MC.2013.374
  28. van Mierlo, J., Bondarouk, T., & Sanders, K. (2018). The dynamic nature of HRM implementation: a structuration perspective. The International Journal of Human Resource Management, 29(22), 3026–3045. https://doi.org/10.1080/09585192.2018.1443957
  29. Misselhorn, C. (2009). Empathy with Inanimate Objects and the Uncanny Valley. Minds and Machines, 19(3), 345–359. https://doi.org/10.1007/s11023-009-9158-2
  30. Mohd Yusof, M., & Abd Aziz, K. (2015). Evaluation of Organizational Readiness in Information Systems Adoption: A Case Study. Asia-Pacific Journal of Information Technology and Multimedia, 04(02), 69–86. https://doi.org/10.17576/apjitm-2015-0402-06
  31. Nielsen, C. B., Larsen, P. G., Fitzgerald, J., Woodcock, J., & Peleska, J. (2015). Systems of Systems Engineering. ACM Computing Surveys, 48(2), 1–41. https://doi.org/10.1145/2794381
  32. Oros, C. L., & Nissen, M. E. (2010). Designing Complex Organizations Computationally. In M. Wang & Z. Sun (Eds.), Handbook of Research on Complex Dynamic Process Management: Techniques for Adaptability in Turbulent Environments (pp. 573–598). New York: Business Science Reference.
  33. PUSPEN Markas Besar Tentara Nasional Indonesia. (2021). Kasum TNI : Network Centric Warfare Perlu Diawaki Personel Yang Andal. Retrieved from https://tni.mil.id/view- 195172-kasum-tni-network-centric-warfare-perlu-diawaki-personel-yang-andal.html
  34. Rashid, Y., Rashid, A., Warraich, M. A., Sabir, S. S., & Waseem, A. (2019). Case Study Method: A Step-by-Step Guide for Business Researchers. International Journal of Qualitative Methods, 18, 160940691986242. https://doi.org/10.1177/1609406919862424
  35. Rumata, V. M., & Sakinah, A. M. (2020). The Impact of Internet Information and Communication Literacy and Overload, as Well as Social Influence, on ICT Adoption by Rural Communities. Asia-Pacific Journal of Rural Development, 30(1–2), 155–174. https://doi.org/10.1177/1018529120977250
  36. Savoldelli, A., Codagnone, C., & Misuraca, G. (2014). Understanding the e-government paradox: Learning from literature and practice on barriers to adoption. Government Information Quarterly, 31, S63–S71. https://doi.org/10.1016/j.giq.2014.01.008
  37. Schuler, R. S., & Jackson, S. E. (2005). A Quarter-Century Review of Human Resource Management in the U.S.: The Growth in Importance of the International Perspective. Management Revu, 16(1), 11–35. https://doi.org/10.5771/0935-9915-2005-1-11
  38. Silfverskiöld, S., Andersson, K., & Lundmark, M. (2021). Does the method for Military Utility Assessment of Future Technologies provide utility? Technology in Society, 67, 101736. https://doi.org/10.1016/j.techsoc.2021.101736
  39. Stair, R. M., & Reynolds, G. W. (2018). Principles of Information Systems. Massachusetts: Cengage Learning.
  40. Suryohadiprojo, S. (2008). Pengantar Ilmu Perang. Jakarta: Pustaka Intermasa.
  41. Tajudeen, F. P., Jaafar, N. I., & Ainin, S. (2018). Understanding the impact of social media usage among organizations. Information & Management, 55(3), 308–321. https://doi.org/10.1016/j.im.2017.08.004
  42. Vernon, G., & Brewster, C. (2013). Structural spoilers or structural supports? Unions and the strategic integration of HR functions. The International Journal of Human Resource Management, 24(6), 1113–1129. https://doi.org/10.1080/09585192.2012.703416
  43. Waechter, H. (1996). Book Reviews : Paul R. Sparrow and Jean-M. Hiltrop: European Human Resource Management in Transition. Organization Studies, 17(2), 343–345. https://doi.org/10.1177/017084069601700211
  44. Yeh, C.-C., & Chen, Y.-F. (2018). Critical success factors for adoption of 3D printing.
  45. Technological Forecasting and Social Change, 132, 209–216. https://doi.org/10.1016/j.techfore.2018.02.003
  46. Zais, M., & Zhang, D. (2016). A Markov chain model of military personnel dynamics.
  47. International Journal of Production Research, 54(6), 1863–1885. https://doi.org/10.1080/00207543.2015.1108533