Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • English  (3)
  • National Defense Research Institute 〈U.S.〉  (3)
  • NetLibrary, Inc
  • Santa Monica, CA : Rand Corp  (3)
  • United States  (3)
Datasource
Material
Language
  • English  (3)
Years
  • 1
    ISBN: 9780833042910 , 0833044303 , 0833042912 , 9780833044303
    Language: English
    Pages: 1 Online-Ressource (xv, 39 pages)
    Edition: [S.l.] HathiTrust Digital Library 2010 Electronic reproduction
    Parallel Title: Print version Eibner, Christine Maintaining military medical skills during peacetime
    Keywords: United States Personnel management ; United States ; Medicine, Military ; Manpower planning ; Medicine, Military ; Manpower planning ; United States ; MEDICAL ; Health Policy ; BUSINESS & ECONOMICS ; Human Resources & Personnel Management ; Manpower planning ; Medicine, Military ; Personnel management ; United States ; Electronic books
    Abstract: Military medical personnel are tasked with fulfilling both the benefits mission and the readiness mission of the U.S. Department of Defense (DoD). Currently, most military medical personnel are stationed at military treatment facilities (MTFs) during peacetime, where they maintain their clinical skills by treating beneficiaries of TRICARE, the military health care program. However, the medical skills required during deployment are likely to differ significantly from those required at MTFs. Alternative arrangements for maintaining medical skills for deployment may be needed. One alternative would be to station some military medical personnel in nonmilitary settings where the case mix might more closely resemble the expected case mix under deployment, such as emergency rooms or trauma centers. This study explored one model under which active-duty personnel would be assigned to civilian settings during peacetime, focusing on civilian receptiveness to the proposed arrangement and identifying potential barriers and concerns. Findings indicate that civilian medical organizations are generally receptive to the idea of such a model and that DoD could consider conducting a pilot study to assess the effectiveness of the model in improving military medical readiness
    Abstract: Military medical personnel are tasked with fulfilling both the benefits mission and the readiness mission of the U.S. Department of Defense (DoD). Currently, most military medical personnel are stationed at military treatment facilities (MTFs) during peacetime, where they maintain their clinical skills by treating beneficiaries of TRICARE, the military health care program. However, the medical skills required during deployment are likely to differ significantly from those required at MTFs. Alternative arrangements for maintaining medical skills for deployment may be needed. One alternative would be to station some military medical personnel in nonmilitary settings where the case mix might more closely resemble the expected case mix under deployment, such as emergency rooms or trauma centers. This study explored one model under which active-duty personnel would be assigned to civilian settings during peacetime, focusing on civilian receptiveness to the proposed arrangement and identifying potential barriers and concerns. Findings indicate that civilian medical organizations are generally receptive to the idea of such a model and that DoD could consider conducting a pilot study to assess the effectiveness of the model in improving military medical readiness
    Note: Includes bibliographical references , Title from electronic t.p. (viewed Jan. 29, 2008) , Use copy Restrictions unspecified star MiAaHDL , Electronic reproduction , Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Santa Monica, CA : Rand Corp
    ISBN: 9780833041364 , 0833042823 , 0833041363 , 9780833042828
    Language: English
    Pages: 1 Online-Ressource (xiii, 60 pages)
    Series Statement: Rand counterinsurgency study paper 3
    Series Statement: Occasional paper (Rand Corporation) OP-178
    Parallel Title: Print version Byman, Daniel, 1967- Understanding proto-insurgencies
    DDC: 355.02/18
    Keywords: Insurgency ; Terrorism Prevention ; Counterinsurgency ; Insurgency ; Terrorism ; Counterinsurgency ; Counterinsurgency ; Influence (Literary, artistic, etc.) ; Insurgency ; Diplomatic relations ; Terrorism ; Prevention ; TECHNOLOGY & ENGINEERING ; Military Science ; HISTORY ; Military ; Other ; United States ; POLITICAL SCIENCE ; Security (National & International) ; United States Foreign relations ; United States Influence ; United States ; United States ; Electronic books
    Abstract: To gain the size and capabilities of an insurgency, a would-be insurgent movement must create a politically relevant identity; it must espouse a cause that is popular beyond the group; it must gain dominance over rival organizations; and it must find a sanctuary that provides respite from police, intelligence, and military services. Violence is instrumental in all the tasks proto-insurgencies seek to accomplish. However, violence can also backfire on them, since few people support it. Support from outside states offers numerous advantages to groups seeking to become insurgencies. It can provide safe haven, money, training, and help with political mobilization. It can also help groups overcome logistical difficulties, hinder intelligence-gathering against them, and legitimize them, making government delegitimization efforts almost impossible. Outside states, however, often deliberately try to control or even weaken the group and at times can reduce its political popularity. The reaction of the state is often the most important factor in a movement's overall success. Perhaps the best and most efficient way to prevent proto-insurgents from gaining ground is through in-group policing, since groups know their own members and can enable arrests or other forms of pressure. The government can also promote rival identities. Governments must, however, recognize the proto-insurgents' weaknesses and avoid overreaction that may inadvertently strengthen them. The most obvious action for the United States is to anticipate the possibility of an insurgency developing before it materializes. It can also provide behind-the-scenes training and advisory programs and can help inhibit outside support
    Abstract: To gain the size and capabilities of an insurgency, a would-be insurgent movement must create a politically relevant identity; it must espouse a cause that is popular beyond the group; it must gain dominance over rival organizations; and it must find a sanctuary that provides respite from police, intelligence, and military services. Violence is instrumental in all the tasks proto-insurgencies seek to accomplish. However, violence can also backfire on them, since few people support it. Support from outside states offers numerous advantages to groups seeking to become insurgencies. It can provide safe haven, money, training, and help with political mobilization. It can also help groups overcome logistical difficulties, hinder intelligence-gathering against them, and legitimize them, making government delegitimization efforts almost impossible. Outside states, however, often deliberately try to control or even weaken the group and at times can reduce its political popularity. The reaction of the state is often the most important factor in a movement's overall success. Perhaps the best and most efficient way to prevent proto-insurgents from gaining ground is through in-group policing, since groups know their own members and can enable arrests or other forms of pressure. The government can also promote rival identities. Governments must, however, recognize the proto-insurgents' weaknesses and avoid overreaction that may inadvertently strengthen them. The most obvious action for the United States is to anticipate the possibility of an insurgency developing before it materializes. It can also provide behind-the-scenes training and advisory programs and can help inhibit outside support
    Note: "RAND National Defense Research Institute , "Prepared for the Office of the Secretary of Defense , Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Santa Monica, CA : Rand Corp
    ISBN: 9780833041890 , 0833042882 , 0833041894 , 9780833042880
    Language: English
    Pages: 1 Online-Ressource (xxxiv, 159 pages)
    Series Statement: Rand counterinsurgency study v. 1
    Parallel Title: Print version Byting back
    DDC: 322.42
    Keywords: Military art and science ; Afghan War, 2001- ; Insurgency ; Iraq War, 2003-2011 ; Military art and science ; Afghan War, 2001- ; Insurgency ; Iraq War, 2003-2011 ; POLITICAL SCIENCE ; Security (National & International) ; Insurgency ; Military art and science ; Political Science ; Military & Naval Science ; Law, Politics & Government ; Political Theory of the State ; Military Administration ; Iraq War (2003-2011) ; Iraq ; United States ; POLITICAL SCIENCE ; Political Process ; Political Advocacy ; Afghan War (2001- ) ; Electronic books
    Abstract: U.S. counterinsurgency efforts in Iraq and Afghanistan have failed to exploit information power, which could be a U.S. advantage but instead is being used advantageously by insurgents. Because insurgency and counterinsurgency involve a battle for the allegiance of a population between a government and an armed opposition movement, the key to exploiting information power is to connect with and learn from the population itself, increasing the effectiveness of both the local government and the U.S. military and civilian services engaged in supporting it. Utilizing mostly available networking technology, the United States could achieve early, affordable, and substantial gains in the effectiveness of counterinsurgency by more open, integrated, and inclusive information networking with the population, local authorities, and coalition partners. The most basic information link with the population would be an information technology (IT)-enhanced, fraud-resistant registry-census. The most promising link would come from utilizing local cell phone networks, which are proliferating even among poor countries. Access to data routinely collected by such networks can form the basis for security services such as enhanced-911 and forensics. The cell phones of a well-wired citizenry can be tantamount to sensor fields in settled areas. They can link indigenous forces with each other and with U.S. forces without interoperability problems; they can also track the responses of such forces to emergencies. Going further, outfitting weaponry with video cameras would bolster surveillance, provide lessons learned, and guard against operator misconduct. Establishing a national Wiki can help citizens describe their neighborhoods to familiarize U.S. forces with them and can promote accountable service delivery. All such information can improve counterinsurgency operations by making U.S. forces and agencies far better informed than they are at present. The authors argue that today's military and intelligence networks -- being closed, compartmentalized, controlled by information providers instead of users, and limited to U.S. war fighters -- hamper counterinsurgency and deprive the United States of what ought to be a strategic advantage. In contrast, based on a review of 160 requirements for counterinsurgency, the authors call for current networks to be replaced by an integrated counterinsurgency operating network (ICON) linking U.S. and indigenous operators, based on principles of inclusi ...
    Abstract: U.S. counterinsurgency efforts in Iraq and Afghanistan have failed to exploit information power, which could be a U.S. advantage but instead is being used advantageously by insurgents. Because insurgency and counterinsurgency involve a battle for the allegiance of a population between a government and an armed opposition movement, the key to exploiting information power is to connect with and learn from the population itself, increasing the effectiveness of both the local government and the U.S. military and civilian services engaged in supporting it. Utilizing mostly available networking technology, the United States could achieve early, affordable, and substantial gains in the effectiveness of counterinsurgency by more open, integrated, and inclusive information networking with the population, local authorities, and coalition partners. The most basic information link with the population would be an information technology (IT)-enhanced, fraud-resistant registry-census. The most promising link would come from utilizing local cell phone networks, which are proliferating even among poor countries. Access to data routinely collected by such networks can form the basis for security services such as enhanced-911 and forensics. The cell phones of a well-wired citizenry can be tantamount to sensor fields in settled areas. They can link indigenous forces with each other and with U.S. forces without interoperability problems; they can also track the responses of such forces to emergencies. Going further, outfitting weaponry with video cameras would bolster surveillance, provide lessons learned, and guard against operator misconduct. Establishing a national Wiki can help citizens describe their neighborhoods to familiarize U.S. forces with them and can promote accountable service delivery. All such information can improve counterinsurgency operations by making U.S. forces and agencies far better informed than they are at present. The authors argue that today's military and intelligence networks -- being closed, compartmentalized, controlled by information providers instead of users, and limited to U.S. war fighters -- hamper counterinsurgency and deprive the United States of what ought to be a strategic advantage. In contrast, based on a review of 160 requirements for counterinsurgency, the authors call for current networks to be replaced by an integrated counterinsurgency operating network (ICON) linking U.S. and indigenous operators, based on principles of inclusi ...
    Note: "RAND National Defense Research Institute , Includes bibliographical references (pages 157-159)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...