Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Terrorism Prevention  (13)
Datasource
Material
Language
  • 1
    ISBN: 9780833037640 , 0833037641
    Language: English
    Pages: 1 Online-Ressource (1 volume)
    Parallel Title: Print version Jackson, Brian A., 1972- Aptitude for destruction. Volume 1, Organizational learning in terrorist groups and its implications for combating terrorism
    DDC: 303.6/25
    Keywords: Terrorism Prevention ; Government policy ; Organizational learning ; Terrorists ; Terrorism ; Organizational learning ; Terrorists ; POLITICAL SCIENCE ; Political Freedom & Security ; Terrorism ; Organizational learning ; Terrorism ; Prevention ; Government policy ; Terrorists ; Electronic books
    Abstract: Cover; Preface; Figures; Summary; Acknowledgments; Abbreviations and Acronyms; Chapter One -- Introduction; About This Study; About This Report; Chapter Two -- What is Organizational Learning?; Organizational Learning as a Four-Part Process; The Need to Combine Explicit and Tacit Knowledge; Different Forms of Organizational Learning; Chapter Three -- The Need to Learn in Order to Change Effectively; Development, Improvement, and Employmentof New Weapons or Tactics; Improving Skills with Current Weapons or Tactics; Collecting and Utilizing Intelligence Information
    Abstract: Cover; Preface; Figures; Summary; Acknowledgments; Abbreviations and Acronyms; Chapter One -- Introduction; About This Study; About This Report; Chapter Two -- What is Organizational Learning?; Organizational Learning as a Four-Part Process; The Need to Combine Explicit and Tacit Knowledge; Different Forms of Organizational Learning; Chapter Three -- The Need to Learn in Order to Change Effectively; Development, Improvement, and Employmentof New Weapons or Tactics; Improving Skills with Current Weapons or Tactics; Collecting and Utilizing Intelligence Information
    Note: Includes bibliographical references
    URL: Volltext  (kostenfrei)
    URL: Volltext  (Kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Santa Monica, CA : RAND Corp
    ISBN: 9780833040770 , 0833040774 , 9780833040749 , 083304074X
    Language: English
    Pages: Online Ressource (1 v.) , ill.
    Edition: Online-Ausg.
    Parallel Title: Print version Aptitude for destruction
    DDC: 303.625
    Keywords: Terrorism Prevention ; Government policy ; Terroristes ; Apprentissage organisationnel ; Terrorisme Prévention ; Politique gouvernementale ; Terrorists ; Organizational learning ; Terrorism Prevention ; Government policy ; Organizational learning ; Terrorists ; Terrorism Prevention ; Government policy ; POLITICAL SCIENCE ; Terrorism ; Organizational learning ; Terrorism ; Prevention ; Government policy ; Terrorists ; POLITICAL SCIENCE ; Political Freedom & Security ; Terrorism ; Electronic books ; Electronic books
    Abstract: v. 1.Organizational learning in terrorist groups and its implications for combating terrorism --v. 2.Case studies of organizational learning in five terrorist groups.
    Description / Table of Contents: v. 1.Organizational learning in terrorist groups and its implications for combating terrorismv. 2.Case studies of organizational learning in five terrorist groups.
    Note: "Prepared for the National Institute of Justice. - "MG-332-NIJ"--P. [4] of cover. - Includes bibliographical references. - Description based on print version record , "MG-332-NIJ"--P. [4] of cover , Includes bibliographical references
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9780833040763
    Language: English
    Pages: 1 Online-Ressource (1 volume) , Illustrations
    Series Statement: Aptitude for destruction Volume 1
    DDC: 303.6/25
    Keywords: Terrorists ; Organizational learning ; Terrorism Prevention ; Government policy ; POLITICAL SCIENCE Political Freedom & Security ; Terrorism ; Organizational learning ; Terrorism Prevention ; Government policy ; Terrorists
    Abstract: Understanding how terrorist groups learn may aid in developing strategies to combat terrorist activities.
    Note: Includes bibliographical references
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Book
    Book
    Santa Monica, Calif. [u.a.] : RAND Corporation
    ISBN: 0833037641
    Language: English
    Series Statement: RAND Corporation monograph series
    DDC: 303.625
    Keywords: Terrorists ; Organizational learning ; Terrorism Prevention ; Government policy ; Terroristische Vereinigung ; Lernfähigkeit ; Organisationsstruktur ; Anpassung ; Terrorismus ; Bekämpfung
    Description / Table of Contents: v. 1. Organizational learning in terrorist groups and its implications for combating terrorism -- v. 2. Case studies of organizational learnings in five terrorist groups
    Note: "Prepared for the National Institute of Justice." , Includes bibliographical references , Erschienen: 1 - 2
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    ISBN: 9780833040763 , 0833040766 , 9780833040732 , 0833040731
    Language: English
    Pages: Online Ressource (1 v.) , ill.
    Edition: Online-Ausg.
    Parallel Title: Erscheint auch als Jackson, Brian A., 1972- Aptitude for destruction. Volume 1, Organizational learning in terrorist groups and its implications for combating terrorism
    DDC: 303.625
    Keywords: Terrorism Prevention ; Government policy ; Terroristes ; Apprentissage organisationnel ; Terrorisme Prévention ; Politique gouvernementale ; Terrorists ; Organizational learning ; Terrorism Prevention ; Government policy ; Asthma Treatment ; United States ; United States. Army Medical care ; Military Science ; Health ; Medicine ; Terrorism ; Prevention ; Government policy ; Terrorists ; POLITICAL SCIENCE ; Political Freedom & Security ; Terrorism ; Organizational learning ; Electronic books ; Electronic books
    Abstract: Understanding how terrorist groups learn may aid in developing strategies to combat terrorist activities
    Note: "Prepared for the National Institute of Justice. - "MG-331-NIJ"--P. [4] of cover. - Includes bibliographical references. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Book
    Book
    Santa Monica, Calif. [u.a.] : RAND Corporation
    ISBN: 0833037641
    Language: English
    Series Statement: RAND Corporation monograph series
    DDC: 303.625
    Keywords: Terrorists ; Organizational learning ; Terrorism Prevention ; Government policy ; Terroristische Vereinigung ; Lernfähigkeit ; Organisationsstruktur ; Anpassung ; Terrorismus ; Bekämpfung
    Description / Table of Contents: v. 1. Organizational learning in terrorist groups and its implications for combating terrorism -- v. 2. Case studies of organizational learnings in five terrorist groups
    Note: "Prepared for the National Institute of Justice." , Includes bibliographical references , Erschienen: 1 - 2
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Santa Monica, CA : RAND National Defense Research Institute
    ISBN: 9780833041692 , 0833044877 , 083304169X , 9780833044877
    Language: English
    Pages: 1 Online-Ressource (xxii, 106 pages)
    Edition: [S.l.] HathiTrust Digital Library 2010 Electronic reproduction
    Series Statement: Rand corporation monograph series
    Parallel Title: Print version Evaluating novel threats to the homeland
    Keywords: Terrorism Prevention ; Drone aircraft ; Cruise missiles ; Air defenses ; Terrorism ; Drone aircraft ; Cruise missiles ; Air defenses ; TECHNOLOGY ; General ; POLITICAL SCIENCE ; Political Freedom & Security ; Terrorism ; Air defenses ; Cruise missiles ; Drone aircraft ; Terrorism ; Prevention ; United States ; TECHNOLOGY ; Military Science ; Electronic books
    Abstract: Changes in technology and adversary behavior will invariably produce new threats that must be assessed by defense and homeland security planners, and a decision must be made about whether they merit changes in current defenses or the development of new defensive approaches. An example of such a novel threat is the use of cruise missiles or unmanned aerial vehicles (UAVs) by terrorist groups or other asymmetric actors to attack homeland targets. Individual threats cannot be assessed in isolation, however, since adversaries always have many options for staging attacks. To examine the threat of UAVs and cruise missiles, RAND utilized a "red analysis of alternatives" approach, wherein the benefits, costs, and risks of different options are considered from the point of view of a potential adversary. For several types of attacks, the suitability of cruise missiles and UAVs was compared against other options, such as vest bombs, car bombs, and mortars. This approach identifies the operational problems faced by a potential adversary to help the defense understand how the capabilities that different attack modes provide may overcome those problems. Given the insights this analysis of alternatives produced into the circumstances under which UAVs and cruise missiles might be preferred by an attacker, RAND explored defensive options to address the threat. This analysis considered defensive options targeting the full range of adversary activities, including activities before, during, and after an attack, rather than a preferential focus on classical terminal-defense strategies. UAVs and cruise missiles represent a "niche threat" within a larger threat context; therefore, defenses were sought that provide common protection against both this and other asymmetric threats. The monograph concludes with a discussion of cross-cutting lessons about this threat and the assessment of novel threats in general
    Abstract: Changes in technology and adversary behavior will invariably produce new threats that must be assessed by defense and homeland security planners, and a decision must be made about whether they merit changes in current defenses or the development of new defensive approaches. An example of such a novel threat is the use of cruise missiles or unmanned aerial vehicles (UAVs) by terrorist groups or other asymmetric actors to attack homeland targets. Individual threats cannot be assessed in isolation, however, since adversaries always have many options for staging attacks. To examine the threat of UAVs and cruise missiles, RAND utilized a "red analysis of alternatives" approach, wherein the benefits, costs, and risks of different options are considered from the point of view of a potential adversary. For several types of attacks, the suitability of cruise missiles and UAVs was compared against other options, such as vest bombs, car bombs, and mortars. This approach identifies the operational problems faced by a potential adversary to help the defense understand how the capabilities that different attack modes provide may overcome those problems. Given the insights this analysis of alternatives produced into the circumstances under which UAVs and cruise missiles might be preferred by an attacker, RAND explored defensive options to address the threat. This analysis considered defensive options targeting the full range of adversary activities, including activities before, during, and after an attack, rather than a preferential focus on classical terminal-defense strategies. UAVs and cruise missiles represent a "niche threat" within a larger threat context; therefore, defenses were sought that provide common protection against both this and other asymmetric threats. The monograph concludes with a discussion of cross-cutting lessons about this threat and the assessment of novel threats in general
    Note: "Prepared for the Defense Threat Reduction Agency , Includes bibliographical references (pages 101-106) , Use copy Restrictions unspecified star MiAaHDL , Electronic reproduction , Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    ISBN: 9780833076526 , 0833079700 , 0833076523 , 9780833079701
    Language: English
    Pages: 1 Online-Ressource (xxv, 155 pages)
    Series Statement: Rand Corporation monograph series
    Parallel Title: Print version Jackson, Brian A., 1972- Efficient aviation security
    Keywords: Terrorism Prevention ; Aeronautics Security measures ; Terrorism ; Aeronautics ; BUSINESS & ECONOMICS ; Industries ; Transportation ; Terrorism ; Prevention ; Aeronautics ; Security measures ; United States ; Electronic books
    Abstract: In the decade since the September 11, 2001, terrorist attacks, aviation security has remained a policy area at the forefront of the national policy agenda. Al-Qa'ida has maintained its focus on the U.S. aviation system, and a number of attempted attacks on aircraft have been thwarted in the succeeding years. Internationally, there have been successful attacks on aircraft and airports, and continued adaptation and innovation by terrorist groups has presented aviation planners with a shifting risk environment. The frequent adjustments and systematic tightening of security around the aviation system that have occurred since 9/11 have also put the collateral and intangible effects of security efforts into the national spotlight, with significant controversy about the intrusiveness of security, and have stimulated both analysis and debate about whether the benefits of new security measures outweigh their costs. This document seeks to contribute to the national debate on aviation security by examining a set of issues that are either overlooked or not well captured in analyses of the costs and benefits of security measures. Our effort is motivated by the position that the goal of aviation security is not just to reduce risk in the aviation system, but to do so efficiently, particularly in an era when fiscal constraints require difficult choices between spending resources on security or other important national priorities. We present a series of distinct analyses focused on tools and approaches we believed were missing and therefore hurting efforts to develop efficient security strategies, implement tactics, and get the best outcomes for the resources spent to ensure aviation security
    Abstract: In the decade since the September 11, 2001, terrorist attacks, aviation security has remained a policy area at the forefront of the national policy agenda. Al-Qa'ida has maintained its focus on the U.S. aviation system, and a number of attempted attacks on aircraft have been thwarted in the succeeding years. Internationally, there have been successful attacks on aircraft and airports, and continued adaptation and innovation by terrorist groups has presented aviation planners with a shifting risk environment. The frequent adjustments and systematic tightening of security around the aviation system that have occurred since 9/11 have also put the collateral and intangible effects of security efforts into the national spotlight, with significant controversy about the intrusiveness of security, and have stimulated both analysis and debate about whether the benefits of new security measures outweigh their costs. This document seeks to contribute to the national debate on aviation security by examining a set of issues that are either overlooked or not well captured in analyses of the costs and benefits of security measures. Our effort is motivated by the position that the goal of aviation security is not just to reduce risk in the aviation system, but to do so efficiently, particularly in an era when fiscal constraints require difficult choices between spending resources on security or other important national priorities. We present a series of distinct analyses focused on tools and approaches we believed were missing and therefore hurting efforts to develop efficient security strategies, implement tactics, and get the best outcomes for the resources spent to ensure aviation security
    Note: "MG-1220-RC."--Page 4 of cover , "RAND Homeland Security and Defense Center , Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    ISBN: 9780833047311 , 0833048643 , 0833047310 , 9780833048646
    Language: English
    Pages: 1 Online-Ressource (x, 19 pages)
    Edition: [S.l.] HathiTrust Digital Library 2010 Electronic reproduction
    Series Statement: RAND Corporation occasional paper series OP-256-RC
    Parallel Title: Print version Jackson, Brian A., 1972- Emerging threats and security planning
    Keywords: Strategic planning ; Civil defense ; National security Planning ; Terrorism Prevention ; Strategic planning ; Civil defense ; National security ; Terrorism ; POLITICAL SCIENCE ; Political Freedom & Security ; Terrorism ; POLITICAL SCIENCE ; Terrorism ; Civil defense ; Military readiness ; Planning ; National security ; Planning ; Strategic planning ; Terrorism ; Prevention ; United States ; United States Defenses ; Planning ; United States
    Abstract: "Concerns about how terrorists might attack in the future are central to the design of security efforts to protect both individual targets and the nation overall. In thinking about emerging threats, security planners are confronted by a panoply of possible future scenarios coming from sources ranging from the terrorists themselves to red-team brainstorming efforts to explore ways adversaries might attack in the future. This paper explores an approach to assessing emerging and/or novel threats and deciding whether, or how much, they should concern security planners by asking two questions: (1) Are some of the novel threats 'niche threats' that should be addressed within existing security efforts? (2) Which of the remaining threats are attackers most likely to execute successfully and should therefore be of greater concern for security planners? If threats can reasonably be considered niche threats, they can be prudently addressed in the context of existing security activities. If threats are unusual enough, suggest significant new vulnerabilities, or their probability or consequences means they cannot be considered lesser included cases within other threats, prioritizing them based on their ease of execution provides a guide for which threats merit the greatest concern and most security attention. This preserves the opportunity to learn from new threats yet prevents security planners from being pulled in many directions simultaneously by attempting to respond to every threat at once."--Page 4 of cover
    Abstract: "Concerns about how terrorists might attack in the future are central to the design of security efforts to protect both individual targets and the nation overall. In thinking about emerging threats, security planners are confronted by a panoply of possible future scenarios coming from sources ranging from the terrorists themselves to red-team brainstorming efforts to explore ways adversaries might attack in the future. This paper explores an approach to assessing emerging and/or novel threats and deciding whether, or how much, they should concern security planners by asking two questions: (1) Are some of the novel threats 'niche threats' that should be addressed within existing security efforts? (2) Which of the remaining threats are attackers most likely to execute successfully and should therefore be of greater concern for security planners? If threats can reasonably be considered niche threats, they can be prudently addressed in the context of existing security activities. If threats are unusual enough, suggest significant new vulnerabilities, or their probability or consequences means they cannot be considered lesser included cases within other threats, prioritizing them based on their ease of execution provides a guide for which threats merit the greatest concern and most security attention. This preserves the opportunity to learn from new threats yet prevents security planners from being pulled in many directions simultaneously by attempting to respond to every threat at once."--Page 4 of cover
    Note: Includes bibliographical references (pages 17-19) , Use copy Restrictions unspecified star MiAaHDL , Electronic reproduction , Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Santa Monica, CA : RAND Homeland Security
    ISBN: 9780833039149 , 0833042475 , 0833039148 , 9780833042477
    Language: English
    Pages: 1 Online-Ressource (xxviii, 153 pages)
    Series Statement: Rand Corporation monograph series
    Parallel Title: Print version Breaching the fortress wall
    Keywords: National security ; War on Terrorism, 2001-2009 Technology ; Terrorism Case studies ; Terrorism Case studies Prevention ; Security systems ; Terrorism Prevention ; National security ; War on Terrorism, 2001-2009 ; Terrorism ; Terrorism ; Security systems ; Terrorism ; National security ; Security systems ; Technology ; Terrorism ; Terrorism ; Prevention ; Terrorismus ; Bekämpfung ; Sicherheitsmaßnahme ; POLITICAL SCIENCE ; Political Freedom & Security ; Terrorism ; POLITICAL SCIENCE ; Terrorism ; Case studies ; War on Terrorism (2001-2009) ; Electronic books
    Abstract: The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to target groups? efforts and protect the public from the threat of terrorist violence. Terrorist organizations are acutely aware of government efforts to deploy these systems and actively seek ways to evade or counteract them. This study draws on relevant data from the history of a variety of terroris
    Abstract: The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to target groups? efforts and protect the public from the threat of terrorist violence. Terrorist organizations are acutely aware of government efforts to deploy these systems and actively seek ways to evade or counteract them. This study draws on relevant data from the history of a variety of terroris
    Note: "MG-481-DHS"--Page 4 of cover , "Prepared for the Department of Homeland Security , Includes bibliographical references (pages 139-153)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...