Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Datasource
Material
Language
Years
  • 1
    ISBN: 9780833076762 , 0833081926 , 0833076760 , 9780833081926
    Language: English
    Pages: 1 Online-Ressource (xxii, 63 pages)
    Series Statement: Technical report Using EPIC to find conflicts, inconsistencies, and gaps in Department of Defense policies
    Parallel Title: Available in another form
    Parallel Title: Available in another form
    Keywords: United States Personnel management ; Data processing ; United States Officials and employees ; Selection and appointment ; United States ; United States ; Manpower ; Manpower ; Military & Naval Science ; Law, Politics & Government ; Military Administration ; United States ; United States ; POLITICAL SCIENCE ; Political Freedom ; Manpower ; Personnel management ; Data processing ; Electronic books
    Abstract: The authors present a framework and methodology to identify the roles and responsibilities (R & R) of those implementing Department of Defense policies and also potential conflicts, ambiguities, gaps, inconsistencies, and redundancies in those policies. They introduce a new software tool that automates one step of the methodology-EPIC-and demonstrate its use with three case studies to illustrate the technique and also the tool's flexibility. EPIC allows analysts to efficiently analyze multiple policy documents to detect potential conflicts in policy early on, thereby allowing policy developers to focus their attention on the need for clarification and, possibly, changes in policy. The authors relate executive positions to R & R and the products that result from their execution. If it can be shown that more than one actor is assigned to take the same action on the same product, then a potential conflict exists in the body of policy. If, on the other hand, no executive is assigned to take action on a product, then there is a potential gap in the body of policy. Use of this new tool will result in better and more consistent defense policy
    Abstract: The authors present a framework and methodology to identify the roles and responsibilities (R & R) of those implementing Department of Defense policies and also potential conflicts, ambiguities, gaps, inconsistencies, and redundancies in those policies. They introduce a new software tool that automates one step of the methodology-EPIC-and demonstrate its use with three case studies to illustrate the technique and also the tool's flexibility. EPIC allows analysts to efficiently analyze multiple policy documents to detect potential conflicts in policy early on, thereby allowing policy developers to focus their attention on the need for clarification and, possibly, changes in policy. The authors relate executive positions to R & R and the products that result from their execution. If it can be shown that more than one actor is assigned to take the same action on the same product, then a potential conflict exists in the body of policy. If, on the other hand, no executive is assigned to take action on a product, then there is a potential gap in the body of policy. Use of this new tool will result in better and more consistent defense policy
    Note: "RAND National Defense Research Institute , "This research was conducted within the Acquisition and Technology Policy Center (ATPC) of RAND National Defense Research Institute"--Preface , Includes bibliographical references (pages 61-63)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9780833094124 , 0833095250 , 0833094122 , 9780833095251
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: RR 1421-DIR
    Parallel Title: Erscheint auch als
    DDC: 665.5/30289
    Keywords: Petroleum refineries Safety measures ; Law and legislation ; Gas manufacture and works Safety measures ; Law and legislation ; Petroleum refineries ; Gas manufacture and works ; United States ; Electronic books
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9780833043030 , 0833044273 , 083304303X , 9780833044273
    Language: English
    Pages: 1 Online-Ressource (xli, 178 pages)
    Parallel Title: Print version Networked forces in stability operations
    Keywords: United States History 21st century ; United States ; Stryker brigade combat teams Case studies Evaluation ; Iraq War, 2003-2011 Campaigns ; Communications, Military Case studies Evaluation ; Command and control systems Case studies Evaluation ; Stryker brigade combat teams ; Iraq War, 2003-2011 ; Communications, Military ; Command and control systems ; POLITICAL SCIENCE ; Political Freedom ; Command and control systems ; Evaluation ; Military campaigns ; Iraq War (2003-2011) ; Iraq ; United States ; United States ; Case studies ; History ; HISTORY ; Military ; United States Armed Forces ; Stability operations ; Evaluation ; United States ; Electronic books
    Abstract: "The Stryker brigade, one of the Army's newest units, has a full complement of Army digital networked communications and battle command systems. An important issue for the Department of Defense and the Army is whether these networking capabilities translate into an information advantage and, if so, whether that advantage results in greater mission effectiveness in stability operations. To answer those two questions, the authors compare three units that operated in the same area in Iraq's northern provinces between 2003 and 2005: the 101st Airborne Division (ABD) (which had only limited digital communications capabilities), the 3/2 Stryker brigade combat team (SBCT), and the 1/25 SBCT. Overall, the 1/25 SBCT and 101st ABD performed best in the stability phase in northern Iraq. They were particularly effective in social networking with the local populace and civilian leaders. The 3/2 SBCT did not perform as well as the 1/25 SBCT, even though it was equipped with some of the same digital networking capabilities. Some of the tactics it employed, such as indiscriminate sweeps, widened the gulf between coalition forces and the local populace. Although networking technologies confer obvious benefits, the authors conclude that command leadership, training, and the processes employed in stability operations are just as important for improving mission effectiveness in stability operations."--Publisher's website
    Abstract: "The Stryker brigade, one of the Army's newest units, has a full complement of Army digital networked communications and battle command systems. An important issue for the Department of Defense and the Army is whether these networking capabilities translate into an information advantage and, if so, whether that advantage results in greater mission effectiveness in stability operations. To answer those two questions, the authors compare three units that operated in the same area in Iraq's northern provinces between 2003 and 2005: the 101st Airborne Division (ABD) (which had only limited digital communications capabilities), the 3/2 Stryker brigade combat team (SBCT), and the 1/25 SBCT. Overall, the 1/25 SBCT and 101st ABD performed best in the stability phase in northern Iraq. They were particularly effective in social networking with the local populace and civilian leaders. The 3/2 SBCT did not perform as well as the 1/25 SBCT, even though it was equipped with some of the same digital networking capabilities. Some of the tactics it employed, such as indiscriminate sweeps, widened the gulf between coalition forces and the local populace. Although networking technologies confer obvious benefits, the authors conclude that command leadership, training, and the processes employed in stability operations are just as important for improving mission effectiveness in stability operations."--Publisher's website
    Note: Includes bibliographical references (pages 171-178)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Santa Monica, CA : RAND
    ISBN: 9780833081773 , 0833084720 , 0833081772 , 9780833084729
    Language: English
    Pages: 1 Online-Ressource (xx, 69 pages)
    Series Statement: RAND Corporation research report series RR357-NAVY
    Parallel Title: Print version Wong, Carolyn, 1952- Authority to issue interoperability policy
    Keywords: United States Personnel management ; United States Management ; United States ; United States ; Sea-power Management ; Organizational effectiveness ; Sea-power ; Organizational effectiveness ; Armed Forces ; Personnel management ; Organizational effectiveness ; United States ; United States ; POLITICAL SCIENCE ; Political Freedom ; Armed Forces ; Management ; Electronic books
    Abstract: Achieving interoperability among systems is instrumental to enabling critical functions, such as timely information exchange during operations and efficiencies in acquisition, so it is important to understand what parties have authority to issue policy that governs the facets of interoperability. This report presents an approach and framework for determining what parties have authority to issue interoperability policy, the legal and policy origins and implementation paths of the authority, and the extent of the authority. The approach includes rigorous analysis by researchers to identify pertinent authorities in federal law supplemented by a means to facilitate discovery of roles and responsibilities in Department of Defense and Service-level policies. The approach results in a roles and responsibilities network that traces the paths of authority available to issue interoperability policy. The authors use as a case study the authority of the Assistant Secretary of the Navy, Research, Development, and Acquisition, Chief Systems Engineer to issue Navy interoperability policy related to mission area systems engineering (MASE) to demonstrate the use of the framework and methodology. They find that there are 13 different paths of authority that could be cited by four different parties to claim authority to influence interoperability policy related to MASE. The approach used in this report might be developed, along with complementary analytic techniques, to provide the government with the ability to create and maintain consistent and comprehensive bodies of policy that will ensure the effective and efficient operation of defense agencies
    Abstract: Achieving interoperability among systems is instrumental to enabling critical functions, such as timely information exchange during operations and efficiencies in acquisition, so it is important to understand what parties have authority to issue policy that governs the facets of interoperability. This report presents an approach and framework for determining what parties have authority to issue interoperability policy, the legal and policy origins and implementation paths of the authority, and the extent of the authority. The approach includes rigorous analysis by researchers to identify pertinent authorities in federal law supplemented by a means to facilitate discovery of roles and responsibilities in Department of Defense and Service-level policies. The approach results in a roles and responsibilities network that traces the paths of authority available to issue interoperability policy. The authors use as a case study the authority of the Assistant Secretary of the Navy, Research, Development, and Acquisition, Chief Systems Engineer to issue Navy interoperability policy related to mission area systems engineering (MASE) to demonstrate the use of the framework and methodology. They find that there are 13 different paths of authority that could be cited by four different parties to claim authority to influence interoperability policy related to MASE. The approach used in this report might be developed, along with complementary analytic techniques, to provide the government with the ability to create and maintain consistent and comprehensive bodies of policy that will ensure the effective and efficient operation of defense agencies
    Note: "Prepared for the United States Navy. Approved for public release; distribution unlimited , Includes bibliographical references (page 69)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    ISBN: 9780833087348 , 0833090097 , 0833087347 , 9780833090096
    Language: English
    Pages: 1 Online-Ressource (xxvii, 112 pages)
    Keywords: United States Procurement ; Cost control ; United States ; POLITICAL SCIENCE ; Political Freedom ; Armed Forces ; Procurement ; Cost control ; United States ; Electronic books
    Abstract: The report presents the results of two studies: The first compares the capabilities and development approaches used in the Joint Tactical Radio System wideband networking waveform (WNW) and the commercial long-term evolution waveform, and the second analyzes military acquisition programs that have repeatedly exceeded certain cost thresholds. The first study compares differences in system designs, technical requirements, intellectual property protection schemes, and cost in the development of WNW. It also examined how technical risks and challenging requirements contributed to schedule and cost increases. The second study attempts to identify unique characteristics of programs that overrun their budgets more than once
    Note: "Prepared for the Office of the Secretary of Defense , "This research was sponsored by the Performance Assessments and Root Cause Analysis (PARCA) office, in the Office of the Assistant Secretary of Defense for Acquisition, and conducted within the Acquisition and Technology Policy Center of the RAND National Defense Research Institute"--Preface , "RAND National Defense Research Institute , Includes bibliographical references (pages 109-112)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    ISBN: 9780833084941 , 0833085700 , 0833084941 , 9780833085702
    Language: English
    Pages: 1 Online-Ressource (xviii, 84 pages)
    Parallel Title: Print version Gonzales, Daniel Improving interagency information sharing using technology demonstrations
    Keywords: United States ; United States ; Civil-military relations ; Drug control Technological innovations ; Drug traffic Prevention ; Border security ; Interagency coordination ; Information networks Management ; Military law ; Civil-military relations ; Drug control ; Drug traffic ; Border security ; Interagency coordination ; Information networks ; Military law ; Information networks ; Management ; Interagency coordination ; Military law ; Law - U.S ; Law, Politics & Government ; Military Law - U.S ; United States ; TECHNOLOGY & ENGINEERING ; Military Science ; Border security ; Civil-military relations ; United States ; Drug control ; Technological innovations ; Electronic books
    Abstract: The Department of Defense (DoD) has developed new sensor technologies to support military forces operating in Iraq and Afghanistan. These new capabilities may be useful in counterdrug (CD) operations along the southern U.S. border. DoD has held technology demonstrations to test and demonstrate new technologies along the southern border--because the field conditions along the border closely resemble those in current military theaters of operation and because they can also reveal whether new technologies are useful for CD operations led by domestic law enforcement agencies. However, there are legal questions about whether such technology demonstrations fully comply with U.S. law and whether advanced DoD sensors can legally be used in domestic CD operations when they are operated by U.S. military forces. In this report, the authors examine federal law and DoD policy to answer these questions. Some parts of U.S. law mandate information sharing among federal departments and agencies for national security purposes and direct DoD to play a key role in domestic CD operations in support of U.S. law enforcement agencies, while other parts of the law place restrictions on when the U.S. military may participate in law enforcement operations. Reviewing relevant federal law and DoD policy, the authors conclude that there is no legal reason why a DoD sensor should be excluded from use in an interagency technology demonstration or in an actual CD operation as long as a valid request for support is made by an appropriate law enforcement official and so long as no personally identifiable or private information is collected. The authors recommend DoD policy on domestic CD operations be formally clarified and that an approval process should be established for technology demonstrations with a CD nexus
    Abstract: The Department of Defense (DoD) has developed new sensor technologies to support military forces operating in Iraq and Afghanistan. These new capabilities may be useful in counterdrug (CD) operations along the southern U.S. border. DoD has held technology demonstrations to test and demonstrate new technologies along the southern border--because the field conditions along the border closely resemble those in current military theaters of operation and because they can also reveal whether new technologies are useful for CD operations led by domestic law enforcement agencies. However, there are legal questions about whether such technology demonstrations fully comply with U.S. law and whether advanced DoD sensors can legally be used in domestic CD operations when they are operated by U.S. military forces. In this report, the authors examine federal law and DoD policy to answer these questions. Some parts of U.S. law mandate information sharing among federal departments and agencies for national security purposes and direct DoD to play a key role in domestic CD operations in support of U.S. law enforcement agencies, while other parts of the law place restrictions on when the U.S. military may participate in law enforcement operations. Reviewing relevant federal law and DoD policy, the authors conclude that there is no legal reason why a DoD sensor should be excluded from use in an interagency technology demonstration or in an actual CD operation as long as a valid request for support is made by an appropriate law enforcement official and so long as no personally identifiable or private information is collected. The authors recommend DoD policy on domestic CD operations be formally clarified and that an approval process should be established for technology demonstrations with a CD nexus
    Note: "RR551-OSD"--Page 4 of cover , "RAND National Security Research Division , "This research was ... conducted within the International Security and Defense Policy Center of the RAND National Defense Research Institute"--Preface , Includes bibliographical references (pages 81-84)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    ISBN: 9780833085702 , 9780833084941
    Language: Undetermined
    Pages: 1 Online-Ressource
    Keywords: African history ; Asian history ; Diplomacy ; Police & security services ; Military engineering
    Abstract: The Department of Defense (DoD) has developed new sensor technologies to support U.S. forces in Iraq and Afghanistan; these technologies are potentially useful for counterdrug operations along the southern U.S. border, but there are legal questions regarding how they may be used and how sensor information may be shared between federal agencies in domestic operations. This report examines federal law and DoD policy to answer these questions
    Note: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    ISBN: 9780833044273 , 9780833043030
    Language: Undetermined
    Pages: 1 Online-Ressource
    Keywords: Political control & freedoms ; Military engineering
    Abstract: Compares three units that conducted stability operations in the same area in northern Iraq-the 101st Airborne Division (which had only limited digital communications), the 3/2 Stryker brigade combat team (SBCT), and the 1/25 SBCT (both equipped with digital networks) and finds that leadership, training, and tactics and procedures are just as important as networking capabilities for improving mission effectiveness in stability operations
    Note: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    ISBN: 9780833090096 , 9780833087348
    Language: Undetermined
    Pages: 1 Online-Ressource
    Keywords: Military history ; Political control & freedoms ; Military engineering
    Abstract: The report presents the results of two studies: The first compares the capabilities and development approaches used in the Joint Tactical Radio System wideband networking waveform and the commercial long-term evolution waveform, and the second analyzes military acquisition programs that have exceeded certain cost thresholds more than once
    Note: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    ISBN: 9780833095251 , 9780833094124
    Language: Undetermined
    Pages: 1 Online-Ressource
    Keywords: Energy industries & utilities ; History of the Americas ; Occupational medicine
    Abstract: The research reported here assessed the costs and benefits of the proposed California process safety management (PSM) and California Accidental Release Prevention regulations that are designed to improve safety at oil and gas refineries operating in California. The authors estimate these costs and benefits in four categories: costs to industry, costs to society, benefits to industry, and benefits to society
    Note: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...