Business Process Reengineering Note: Our pioneering work, on Business Process Reengineering, is the foundation for the Multi-Threaded Missions and Means Framework Activity-Based Cost Simulation Models (MTMMFABCSM) for collaborative planning and execution models in Net-Centric Supply Chains.

The following reports, from the National Academy of Sciences, provide the technical and scientific knowledge base for understanding the IABSRI ecosystem.

National Academy of Sciences Report on Big Data Analytics (2013).

National Academy of Sciences Report on Network Science (2005). Please note this book provides the technical and scientific foundation for creating Net-Centric Supply Chains.

The National Academy of Sciences Report on Strategy for an Army Center for Network Science, Technology and Experimentation (2007). Please note this report is a complimentary material to the Network Science Report.

The National Academy of Sciences Report on National Earthquake Resilience, Research, Implementation, and Outreach (2011). Please note that this report addresses National Earthquake as an example of uncertainties that can disrupt a supply chain. IABSRI considers uncertainties as one of the missing gaps in the U.S. supply chains. Hurricane Harvey, in 2017, is another example of uncertainties. It seriously impacted the small value chain members of many supply chains in Texas.

The Hollings Manufacturing Extension Partnership (MEP), a program of the U.S. Commerce Department’s National Institute of Standards and Technology (NIST), had to award $3 million in funding to help manufacturers begin the long road to recovery from Hurricane Harvey. [Source:]

The IABSRI is using Big Data Analytics to address this major issue in supply chains.

The National Academy of Sciences Report on Improving the Decision Making Abilities of SMALL UNIT LEADERS (2012).

The National Academy of Sciences Report on Foundational Cybersecurity Research: Improving Science, Engineering, and Institutions (2017). This report addresses major technical and scientific issues, such as the lack of human context in the current cybersecurity research landscape. A direct excerpt from NAS Report attests to this missing gap: “(t)he fact that these systems are designed, developed, deployed, and used by humans, and that humans are also the adversaries behind attacks on them, means that the work done in the social, behavioral, and decision sciences will be critical. Deepening our understanding of humans and human organizations and linking that understanding to more traditional research in cybersecurity, is necessary to develop a robust security science and to deploy systems most effectively so that they do what they were designed to do, to say nothing of securing them against human adversaries. Cybersecurity can be viewed as a cutting edge of computing that demands a broad, multidisciplinary effort. Addressing the global cybersecurity challenge needs not just computer science, engineering science, and mathematics, but also draws on what we know and understand about human nature and how humans interact with and manage systems—and each other [Page 67].” In collaboration with Dr. Vladimir Lefebvre, who pioneered the Reflexive Game Theory, the IABSRI is currently creating a machine learning platform with human context to address this critical issue to mitigate spear phishing attacks in endpoint devices.