{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T16:01:10Z","timestamp":1772294470256,"version":"3.50.1"},"reference-count":41,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2011,9,1]],"date-time":"2011-09-01T00:00:00Z","timestamp":1314835200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Systems Journal"],"published-print":{"date-parts":[[2011,9]]},"DOI":"10.1109\/jsyst.2011.2158680","type":"journal-article","created":{"date-parts":[[2011,6,21]],"date-time":"2011-06-21T15:01:03Z","timestamp":1308668463000},"page":"342-351","source":"Crossref","is-referenced-by-count":3,"title":["Through-Life NEC Scenario Development"],"prefix":"10.1109","volume":"5","author":[{"given":"Esmond N.","family":"Urwin","sequence":"first","affiliation":[]},{"given":"David J.","family":"Gunton","sequence":"additional","affiliation":[]},{"given":"Simon Reay","family":"Atkinson","sequence":"additional","affiliation":[]},{"given":"Andrew J.","family":"Daw","sequence":"additional","affiliation":[]},{"given":"Michael J.","family":"deC Henshaw","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1504\/IJTIP.2005.006516"},{"key":"ref38","article-title":"Concepts of agility in network enabled capability","author":"mackley","year":"2008","journal-title":"Conference on Realising NEC"},{"key":"ref33","year":"2006","journal-title":"Defence Industrial Strategy"},{"key":"ref32","article-title":"The influence of the concept of capability-based management on the development of the systems engineering discipline","author":"neaga","year":"2009","journal-title":"Proc 7th Annu Conf Systems Engineering Research"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1080\/14751790902749900"},{"key":"ref30","year":"2001","journal-title":"The UK Joint High Level Operational Concept"},{"key":"ref37","article-title":"Collaborative, academic-industry research approach for advancing systems engineering","author":"henshaw","year":"2009","journal-title":"Proc 7th Annu Conf Systems Engineering Research"},{"key":"ref36","article-title":"Policy making for global transportation planning using the delphi-scenario writing method with a new concept of future vision","author":"kawano","year":"2005","journal-title":"European Regional Science Association"},{"key":"ref35","author":"cresswell","year":"2008","journal-title":"Research Design Qualitative Quantitative and Mixed Methods Approaches"},{"key":"ref34","year":"0","journal-title":"Network Enabled Capability Through Innovative Systems Engineering"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/0024-6301(95)00015-B"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1504\/IJTIP.2005.006516"},{"key":"ref11","article-title":"Covering the bases: Development of a framework for defence force planning scenarios","author":"friesen","year":"2010","journal-title":"15th ICCRTS"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/S0003-6870(99)00035-6"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/S0959-3780(02)00006-7"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/S0040-1625(03)00137-9"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/S0007-6813(01)80044-6"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2007.12.003"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/S0377-2217(03)00068-7"},{"key":"ref18","article-title":"Scenarios &#38; vision, managing and planning in turbulent times, how scenario techniques help you plotting a successful path into the future","author":"von reibnitz","year":"1999","journal-title":"SBM Conf IT Challenges in the Next Millennium"},{"key":"ref19","author":"schwartz","year":"1996","journal-title":"The Art of the Long View"},{"key":"ref28","year":"2007","journal-title":"Capability Management Handbook"},{"key":"ref4","author":"davis","year":"2007","journal-title":"Enhancing Strategic Planning With Massive Scenario Generation Theory and Experiments"},{"key":"ref27","year":"2009","journal-title":"Understanding Network Enabled Capability"},{"key":"ref3","first-page":"3","author":"alexander","year":"2004","journal-title":"Scenarios Stories Use Cases through the Systems Development Life-Cycle"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/S0953-5438(00)00023-0"},{"key":"ref29","year":"0","journal-title":"Acquisition Operating Framework (AOF)"},{"key":"ref5","article-title":"Managing Innovation&#x2014;A multidisciplinary scenario development approach","author":"urwin","year":"2009","journal-title":"Proc Advances in Production Management Systems"},{"key":"ref8","year":"2006","journal-title":"Guide for Understanding and Implementing Defense Experimentation (GUIDEx)"},{"key":"ref7","article-title":"How do we know that a scenario is appropriate","author":"whitworth","year":"2006","journal-title":"11th Int Command and Control Technology Symp"},{"key":"ref2","year":"1995","journal-title":"Scenario Based Design Envisioning Work and Technology in Systems Development"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"795","DOI":"10.1016\/j.futures.2005.01.003","article-title":"The origins and evolution of scenario techniques in long range business planning","volume":"37","author":"bradfield","year":"2005","journal-title":"Futures"},{"key":"ref1","first-page":"25","author":"maiden","year":"2004","journal-title":"Scenarios Stories Use Cases through the Systems Development Life-Cycle"},{"key":"ref20","doi-asserted-by":"crossref","DOI":"10.1016\/0024-6301(96)00004-0","article-title":"Creating the future: The use and misuse of scenarios","volume":"29","author":"godet","year":"1996","journal-title":"Long Range Planning"},{"key":"ref22","author":"dammers","year":"2000","journal-title":"Leren van de Toekomst Over de rol van Scenario's bij Stratgische Bekleidsforming"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1504\/IJTIP.2005.006516"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/S0016-3287(02)00090-3"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1504\/IJTIP.2005.006516"},{"key":"ref23","author":"steinmller","year":"1997","journal-title":"Grundlagen und Methoden der Zukunftsforschung Szenarien"},{"key":"ref26","year":"2005","journal-title":"Network Enabled Capability"},{"key":"ref25","author":"alberts","year":"2005","journal-title":"Power to the Edge Command and Control in the Information Age"}],"container-title":["IEEE Systems Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4267003\/5995186\/05892907.pdf?arnumber=5892907","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:52:40Z","timestamp":1642006360000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5892907\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9]]},"references-count":41,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/jsyst.2011.2158680","relation":{},"ISSN":["1932-8184","1937-9234"],"issn-type":[{"value":"1932-8184","type":"print"},{"value":"1937-9234","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,9]]}}}