Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Terrorism Prevention  (14)
Datasource
Material
Language
  • 1
    ISBN: 9780833040763
    Language: English
    Pages: 1 Online-Ressource (1 volume) , Illustrations
    Series Statement: Aptitude for destruction Volume 1
    DDC: 303.6/25
    Keywords: Terrorists ; Organizational learning ; Terrorism Prevention ; Government policy ; POLITICAL SCIENCE Political Freedom & Security ; Terrorism ; Organizational learning ; Terrorism Prevention ; Government policy ; Terrorists
    Abstract: Understanding how terrorist groups learn may aid in developing strategies to combat terrorist activities.
    Note: Includes bibliographical references
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Santa Monica, CA : RAND Homeland Security
    ISBN: 9780833039149 , 0833042475 , 0833039148 , 9780833042477
    Language: English
    Pages: 1 Online-Ressource (xxviii, 153 pages)
    Series Statement: Rand Corporation monograph series
    Parallel Title: Print version Breaching the fortress wall
    Keywords: National security ; War on Terrorism, 2001-2009 Technology ; Terrorism Case studies ; Terrorism Case studies Prevention ; Security systems ; Terrorism Prevention ; National security ; War on Terrorism, 2001-2009 ; Terrorism ; Terrorism ; Security systems ; Terrorism ; National security ; Security systems ; Technology ; Terrorism ; Terrorism ; Prevention ; Terrorismus ; Bekämpfung ; Sicherheitsmaßnahme ; POLITICAL SCIENCE ; Political Freedom & Security ; Terrorism ; POLITICAL SCIENCE ; Terrorism ; Case studies ; War on Terrorism (2001-2009) ; Electronic books
    Abstract: The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to target groups? efforts and protect the public from the threat of terrorist violence. Terrorist organizations are acutely aware of government efforts to deploy these systems and actively seek ways to evade or counteract them. This study draws on relevant data from the history of a variety of terroris
    Abstract: The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to target groups? efforts and protect the public from the threat of terrorist violence. Terrorist organizations are acutely aware of government efforts to deploy these systems and actively seek ways to evade or counteract them. This study draws on relevant data from the history of a variety of terroris
    Note: "MG-481-DHS"--Page 4 of cover , "Prepared for the Department of Homeland Security , Includes bibliographical references (pages 139-153)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9780833047311 , 0833048643 , 0833047310 , 9780833048646
    Language: English
    Pages: 1 Online-Ressource (x, 19 pages)
    Edition: [S.l.] HathiTrust Digital Library 2010 Electronic reproduction
    Series Statement: RAND Corporation occasional paper series OP-256-RC
    Parallel Title: Print version Jackson, Brian A., 1972- Emerging threats and security planning
    Keywords: Strategic planning ; Civil defense ; National security Planning ; Terrorism Prevention ; Strategic planning ; Civil defense ; National security ; Terrorism ; POLITICAL SCIENCE ; Political Freedom & Security ; Terrorism ; POLITICAL SCIENCE ; Terrorism ; Civil defense ; Military readiness ; Planning ; National security ; Planning ; Strategic planning ; Terrorism ; Prevention ; United States ; United States Defenses ; Planning ; United States
    Abstract: "Concerns about how terrorists might attack in the future are central to the design of security efforts to protect both individual targets and the nation overall. In thinking about emerging threats, security planners are confronted by a panoply of possible future scenarios coming from sources ranging from the terrorists themselves to red-team brainstorming efforts to explore ways adversaries might attack in the future. This paper explores an approach to assessing emerging and/or novel threats and deciding whether, or how much, they should concern security planners by asking two questions: (1) Are some of the novel threats 'niche threats' that should be addressed within existing security efforts? (2) Which of the remaining threats are attackers most likely to execute successfully and should therefore be of greater concern for security planners? If threats can reasonably be considered niche threats, they can be prudently addressed in the context of existing security activities. If threats are unusual enough, suggest significant new vulnerabilities, or their probability or consequences means they cannot be considered lesser included cases within other threats, prioritizing them based on their ease of execution provides a guide for which threats merit the greatest concern and most security attention. This preserves the opportunity to learn from new threats yet prevents security planners from being pulled in many directions simultaneously by attempting to respond to every threat at once."--Page 4 of cover
    Abstract: "Concerns about how terrorists might attack in the future are central to the design of security efforts to protect both individual targets and the nation overall. In thinking about emerging threats, security planners are confronted by a panoply of possible future scenarios coming from sources ranging from the terrorists themselves to red-team brainstorming efforts to explore ways adversaries might attack in the future. This paper explores an approach to assessing emerging and/or novel threats and deciding whether, or how much, they should concern security planners by asking two questions: (1) Are some of the novel threats 'niche threats' that should be addressed within existing security efforts? (2) Which of the remaining threats are attackers most likely to execute successfully and should therefore be of greater concern for security planners? If threats can reasonably be considered niche threats, they can be prudently addressed in the context of existing security activities. If threats are unusual enough, suggest significant new vulnerabilities, or their probability or consequences means they cannot be considered lesser included cases within other threats, prioritizing them based on their ease of execution provides a guide for which threats merit the greatest concern and most security attention. This preserves the opportunity to learn from new threats yet prevents security planners from being pulled in many directions simultaneously by attempting to respond to every threat at once."--Page 4 of cover
    Note: Includes bibliographical references (pages 17-19) , Use copy Restrictions unspecified star MiAaHDL , Electronic reproduction , Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Book
    Book
    Santa Monica, Calif. [u.a.] : RAND Corporation
    ISBN: 0833037641
    Language: English
    Series Statement: RAND Corporation monograph series
    DDC: 303.625
    Keywords: Terrorists ; Organizational learning ; Terrorism Prevention ; Government policy ; Terroristische Vereinigung ; Lernfähigkeit ; Organisationsstruktur ; Anpassung ; Terrorismus ; Bekämpfung
    Description / Table of Contents: v. 1. Organizational learning in terrorist groups and its implications for combating terrorism -- v. 2. Case studies of organizational learnings in five terrorist groups
    Note: "Prepared for the National Institute of Justice." , Includes bibliographical references , Erschienen: 1 - 2
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Book
    Book
    Santa Monica, Calif. [u.a.] : RAND Corporation
    ISBN: 0833037641
    Language: English
    Series Statement: RAND Corporation monograph series
    DDC: 303.625
    Keywords: Terrorists ; Organizational learning ; Terrorism Prevention ; Government policy ; Terroristische Vereinigung ; Lernfähigkeit ; Organisationsstruktur ; Anpassung ; Terrorismus ; Bekämpfung
    Description / Table of Contents: v. 1. Organizational learning in terrorist groups and its implications for combating terrorism -- v. 2. Case studies of organizational learnings in five terrorist groups
    Note: "Prepared for the National Institute of Justice." , Includes bibliographical references , Erschienen: 1 - 2
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    ISBN: 9780833040763 , 0833040766 , 9780833040732 , 0833040731
    Language: English
    Pages: Online Ressource (1 v.) , ill.
    Edition: Online-Ausg.
    Parallel Title: Erscheint auch als Jackson, Brian A., 1972- Aptitude for destruction. Volume 1, Organizational learning in terrorist groups and its implications for combating terrorism
    DDC: 303.625
    Keywords: Terrorism Prevention ; Government policy ; Terroristes ; Apprentissage organisationnel ; Terrorisme Prévention ; Politique gouvernementale ; Terrorists ; Organizational learning ; Terrorism Prevention ; Government policy ; Asthma Treatment ; United States ; United States. Army Medical care ; Military Science ; Health ; Medicine ; Terrorism ; Prevention ; Government policy ; Terrorists ; POLITICAL SCIENCE ; Political Freedom & Security ; Terrorism ; Organizational learning ; Electronic books ; Electronic books
    Abstract: Understanding how terrorist groups learn may aid in developing strategies to combat terrorist activities
    Note: "Prepared for the National Institute of Justice. - "MG-331-NIJ"--P. [4] of cover. - Includes bibliographical references. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    ISBN: 9780833037640 , 0833037641
    Language: English
    Pages: 1 Online-Ressource (1 volume)
    Parallel Title: Print version Jackson, Brian A., 1972- Aptitude for destruction. Volume 1, Organizational learning in terrorist groups and its implications for combating terrorism
    DDC: 303.6/25
    Keywords: Terrorism Prevention ; Government policy ; Organizational learning ; Terrorists ; Terrorism ; Organizational learning ; Terrorists ; POLITICAL SCIENCE ; Political Freedom & Security ; Terrorism ; Organizational learning ; Terrorism ; Prevention ; Government policy ; Terrorists ; Electronic books
    Abstract: Cover; Preface; Figures; Summary; Acknowledgments; Abbreviations and Acronyms; Chapter One -- Introduction; About This Study; About This Report; Chapter Two -- What is Organizational Learning?; Organizational Learning as a Four-Part Process; The Need to Combine Explicit and Tacit Knowledge; Different Forms of Organizational Learning; Chapter Three -- The Need to Learn in Order to Change Effectively; Development, Improvement, and Employmentof New Weapons or Tactics; Improving Skills with Current Weapons or Tactics; Collecting and Utilizing Intelligence Information
    Abstract: Cover; Preface; Figures; Summary; Acknowledgments; Abbreviations and Acronyms; Chapter One -- Introduction; About This Study; About This Report; Chapter Two -- What is Organizational Learning?; Organizational Learning as a Four-Part Process; The Need to Combine Explicit and Tacit Knowledge; Different Forms of Organizational Learning; Chapter Three -- The Need to Learn in Order to Change Effectively; Development, Improvement, and Employmentof New Weapons or Tactics; Improving Skills with Current Weapons or Tactics; Collecting and Utilizing Intelligence Information
    Note: Includes bibliographical references
    URL: Volltext  (kostenfrei)
    URL: Volltext  (Kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    ISBN: 9780833076526 , 0833079700 , 0833076523 , 9780833079701
    Language: English
    Pages: 1 Online-Ressource (xxv, 155 pages)
    Series Statement: Rand Corporation monograph series
    Parallel Title: Print version Jackson, Brian A., 1972- Efficient aviation security
    Keywords: Terrorism Prevention ; Aeronautics Security measures ; Terrorism ; Aeronautics ; BUSINESS & ECONOMICS ; Industries ; Transportation ; Terrorism ; Prevention ; Aeronautics ; Security measures ; United States ; Electronic books
    Abstract: In the decade since the September 11, 2001, terrorist attacks, aviation security has remained a policy area at the forefront of the national policy agenda. Al-Qa'ida has maintained its focus on the U.S. aviation system, and a number of attempted attacks on aircraft have been thwarted in the succeeding years. Internationally, there have been successful attacks on aircraft and airports, and continued adaptation and innovation by terrorist groups has presented aviation planners with a shifting risk environment. The frequent adjustments and systematic tightening of security around the aviation system that have occurred since 9/11 have also put the collateral and intangible effects of security efforts into the national spotlight, with significant controversy about the intrusiveness of security, and have stimulated both analysis and debate about whether the benefits of new security measures outweigh their costs. This document seeks to contribute to the national debate on aviation security by examining a set of issues that are either overlooked or not well captured in analyses of the costs and benefits of security measures. Our effort is motivated by the position that the goal of aviation security is not just to reduce risk in the aviation system, but to do so efficiently, particularly in an era when fiscal constraints require difficult choices between spending resources on security or other important national priorities. We present a series of distinct analyses focused on tools and approaches we believed were missing and therefore hurting efforts to develop efficient security strategies, implement tactics, and get the best outcomes for the resources spent to ensure aviation security
    Abstract: In the decade since the September 11, 2001, terrorist attacks, aviation security has remained a policy area at the forefront of the national policy agenda. Al-Qa'ida has maintained its focus on the U.S. aviation system, and a number of attempted attacks on aircraft have been thwarted in the succeeding years. Internationally, there have been successful attacks on aircraft and airports, and continued adaptation and innovation by terrorist groups has presented aviation planners with a shifting risk environment. The frequent adjustments and systematic tightening of security around the aviation system that have occurred since 9/11 have also put the collateral and intangible effects of security efforts into the national spotlight, with significant controversy about the intrusiveness of security, and have stimulated both analysis and debate about whether the benefits of new security measures outweigh their costs. This document seeks to contribute to the national debate on aviation security by examining a set of issues that are either overlooked or not well captured in analyses of the costs and benefits of security measures. Our effort is motivated by the position that the goal of aviation security is not just to reduce risk in the aviation system, but to do so efficiently, particularly in an era when fiscal constraints require difficult choices between spending resources on security or other important national priorities. We present a series of distinct analyses focused on tools and approaches we believed were missing and therefore hurting efforts to develop efficient security strategies, implement tactics, and get the best outcomes for the resources spent to ensure aviation security
    Note: "MG-1220-RC."--Page 4 of cover , "RAND Homeland Security and Defense Center , Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    ISBN: 9780833083869 , 0833083872 , 0833083864 , 9780833083876
    Language: English
    Pages: 1 Online-Ressource (31 pages)
    Parallel Title: Print version Jackson, Brian A., 1972- How do we know what information sharing is really worth?
    Keywords: Selective dissemination of information ; Intelligence service ; Information policy ; Communication in law enforcement ; Government information Access control ; Terrorism Prevention ; Domestic intelligence ; Exchange of government information ; Selective dissemination of information ; Intelligence service ; Information policy ; Communication in law enforcement ; Government information ; Terrorism ; Domestic intelligence ; Exchange of government information ; Selective dissemination of information ; Terrorism ; Prevention ; United States ; COMPUTERS ; Internet ; Security ; Communication in law enforcement ; Domestic intelligence ; Exchange of government information ; Government information ; Access control ; Information policy ; Intelligence service ; Electronic books
    Abstract: Since the terrorist attacks of September 11, 2001, the sharing of intelligence and law enforcement information has been a central part of U.S. domestic security efforts. Though much of the public debate about such sharing focuses on addressing the threat of terrorism, organizations at all levels of government routinely share varied types of information through multiagency information systems, collaborative groups, and other links. Given resource constraints, there are concerns about the effectiveness of information-sharing and fusion activities and, therefore, their value relative to the public funds invested in them. Solid methods for evaluating these efforts are lacking, however, limiting the ability to make informed policy decisions. Drawing on a substantial literature review and synthesis, this report lays out the challenges of evaluating information-sharing efforts that frequently seek to achieve multiple goals simultaneously; reviews past evaluations of information-sharing programs; and lays out a path to improving the evaluation of such efforts going forward
    Note: "RAND Homeland Security and Defense Center , "This research was conducted within the RAND Homeland Security and Defense Center ... a joint center of two research divisions: RAND Justice, Infrastructure, and Environment, and the RAND National Security Research Division"--Back cover , "RAND Corporation research report series."--Web Page (PDF) , "RR-380-OSD"--Page 31 , Caption title , Includes bibliographical references (pages 27-30)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    ISBN: 9780833046161 , 0833047035 , 9781282081635 , 1282081632 , 9780833047038 , 0833046160
    Language: English
    Pages: 1 Online-Ressource (xxiii, 283 pages)
    Series Statement: Rand Corporation monograph series
    Parallel Title: Print version Challenge of domestic intelligence in a free society
    Keywords: Terrorism Prevention ; Terrorism Government policy ; Intelligence service ; Terrorism ; Terrorism ; Intelligence service ; POLITICAL SCIENCE ; Political Freedom & Security ; Terrorism ; POLITICAL SCIENCE ; International Relations ; General ; Intelligence service ; Terrorism ; Government policy ; Terrorism ; Prevention ; United States ; Electronic books
    Abstract: Whether U.S. terrorism-prevention efforts match the threat continues to be central in policy debate. Part of this debate is whether the United States needs a dedicated domestic counterterrorism intelligence agency. To inform future policy decisionmaking, this book examines, from a variety of perspectives, the policy proposal that such an agency be created. These include its possible capabilities, comparing its potential effectiveness with that of current efforts, and its acceptability to the public, as well as various balances and trade-offs involved in creating such an agency. Reflecting the limits in the data available and the significant uncertainty associated with this policy area, if there is a unifying message from the study, it is one of caution and deliberation. In an area in which direct assessment and analysis are limited, there is a need to carefully consider the implications and potential outcomes of such significant policy changes. In doing so, examination from different perspectives and through different approaches -- to ideally capture a sufficient picture of the complexity to see not just the benefits we hope to gain from policy change but the layers of effects and interactions that could either help or hurt the chances of those benefits appearing -- is a critical ingredient of policy deliberation and design
    Abstract: Whether U.S. terrorism-prevention efforts match the threat continues to be central in policy debate. Part of this debate is whether the United States needs a dedicated domestic counterterrorism intelligence agency. To inform future policy decisionmaking, this book examines, from a variety of perspectives, the policy proposal that such an agency be created. These include its possible capabilities, comparing its potential effectiveness with that of current efforts, and its acceptability to the public, as well as various balances and trade-offs involved in creating such an agency. Reflecting the limits in the data available and the significant uncertainty associated with this policy area, if there is a unifying message from the study, it is one of caution and deliberation. In an area in which direct assessment and analysis are limited, there is a need to carefully consider the implications and potential outcomes of such significant policy changes. In doing so, examination from different perspectives and through different approaches -- to ideally capture a sufficient picture of the complexity to see not just the benefits we hope to gain from policy change but the layers of effects and interactions that could either help or hurt the chances of those benefits appearing -- is a critical ingredient of policy deliberation and design
    Note: Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...