Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • English  (18)
  • Rand Corporation National Security Research Division  (18)
  • Santa Monica, CA : RAND  (18)
  • United States  (17)
  • Iran
Datasource
Material
Language
  • English  (18)
Years
  • 1
    ISBN: 9780833093165 , 0833093169 , 9780833084163 , 083308416X
    Language: English
    Pages: 1 Online-Ressource (ix, 78 pages)
    Series Statement: Research report RR-498-ARA
    Parallel Title: Print version Surprise Out of Zion?
    Keywords: Preemptive attack (Military science) Case studies ; Preemptive attack (Military science) ; Diplomatic relations ; Israel ; United States ; Preemptive attack (Military science) ; HISTORY ; Middle East ; Israel ; Case studies ; Military history ; Israel Case studies Foreign relations ; Israel History, Military 20th century ; United States Case studies Foreign relations ; Israel ; Israel ; United States ; Electronic books
    Abstract: "Might U.S. officials be surprised by an Israeli strike on Iran's nuclear facilities? This study examines key historical precedents, considering four cases in which Israeli leaders chose preemptive or preventive military strikes and had to decide whether to notify or consult with the United States: the Suez crisis of 1956, the Six-Day War of 1967, the 1981 strike on Iraq's nuclear reactor, and the 2007 bombing of Syria's al-Kibar nuclear facility"--Publisher's description
    Abstract: "Might U.S. officials be surprised by an Israeli strike on Iran's nuclear facilities? This study examines key historical precedents, considering four cases in which Israeli leaders chose preemptive or preventive military strikes and had to decide whether to notify or consult with the United States: the Suez crisis of 1956, the Six-Day War of 1967, the 1981 strike on Iraq's nuclear reactor, and the 2007 bombing of Syria's al-Kibar nuclear facility"--Publisher's description
    Note: "June 29, 2015"--Table of Contents page , Includes bibliographical references (pages 75-78)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9780833084941 , 0833085700 , 0833084941 , 9780833085702
    Language: English
    Pages: 1 Online-Ressource (xviii, 84 pages)
    Parallel Title: Print version Gonzales, Daniel Improving interagency information sharing using technology demonstrations
    Keywords: United States ; United States ; Civil-military relations ; Drug control Technological innovations ; Drug traffic Prevention ; Border security ; Interagency coordination ; Information networks Management ; Military law ; Civil-military relations ; Drug control ; Drug traffic ; Border security ; Interagency coordination ; Information networks ; Military law ; Information networks ; Management ; Interagency coordination ; Military law ; Law - U.S ; Law, Politics & Government ; Military Law - U.S ; United States ; TECHNOLOGY & ENGINEERING ; Military Science ; Border security ; Civil-military relations ; United States ; Drug control ; Technological innovations ; Electronic books
    Abstract: The Department of Defense (DoD) has developed new sensor technologies to support military forces operating in Iraq and Afghanistan. These new capabilities may be useful in counterdrug (CD) operations along the southern U.S. border. DoD has held technology demonstrations to test and demonstrate new technologies along the southern border--because the field conditions along the border closely resemble those in current military theaters of operation and because they can also reveal whether new technologies are useful for CD operations led by domestic law enforcement agencies. However, there are legal questions about whether such technology demonstrations fully comply with U.S. law and whether advanced DoD sensors can legally be used in domestic CD operations when they are operated by U.S. military forces. In this report, the authors examine federal law and DoD policy to answer these questions. Some parts of U.S. law mandate information sharing among federal departments and agencies for national security purposes and direct DoD to play a key role in domestic CD operations in support of U.S. law enforcement agencies, while other parts of the law place restrictions on when the U.S. military may participate in law enforcement operations. Reviewing relevant federal law and DoD policy, the authors conclude that there is no legal reason why a DoD sensor should be excluded from use in an interagency technology demonstration or in an actual CD operation as long as a valid request for support is made by an appropriate law enforcement official and so long as no personally identifiable or private information is collected. The authors recommend DoD policy on domestic CD operations be formally clarified and that an approval process should be established for technology demonstrations with a CD nexus
    Abstract: The Department of Defense (DoD) has developed new sensor technologies to support military forces operating in Iraq and Afghanistan. These new capabilities may be useful in counterdrug (CD) operations along the southern U.S. border. DoD has held technology demonstrations to test and demonstrate new technologies along the southern border--because the field conditions along the border closely resemble those in current military theaters of operation and because they can also reveal whether new technologies are useful for CD operations led by domestic law enforcement agencies. However, there are legal questions about whether such technology demonstrations fully comply with U.S. law and whether advanced DoD sensors can legally be used in domestic CD operations when they are operated by U.S. military forces. In this report, the authors examine federal law and DoD policy to answer these questions. Some parts of U.S. law mandate information sharing among federal departments and agencies for national security purposes and direct DoD to play a key role in domestic CD operations in support of U.S. law enforcement agencies, while other parts of the law place restrictions on when the U.S. military may participate in law enforcement operations. Reviewing relevant federal law and DoD policy, the authors conclude that there is no legal reason why a DoD sensor should be excluded from use in an interagency technology demonstration or in an actual CD operation as long as a valid request for support is made by an appropriate law enforcement official and so long as no personally identifiable or private information is collected. The authors recommend DoD policy on domestic CD operations be formally clarified and that an approval process should be established for technology demonstrations with a CD nexus
    Note: "RR551-OSD"--Page 4 of cover , "RAND National Security Research Division , "This research was ... conducted within the International Security and Defense Policy Center of the RAND National Defense Research Institute"--Preface , Includes bibliographical references (pages 81-84)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9780833083869 , 0833083872 , 0833083864 , 9780833083876
    Language: English
    Pages: 1 Online-Ressource (31 pages)
    Parallel Title: Print version Jackson, Brian A., 1972- How do we know what information sharing is really worth?
    Keywords: Selective dissemination of information ; Intelligence service ; Information policy ; Communication in law enforcement ; Government information Access control ; Terrorism Prevention ; Domestic intelligence ; Exchange of government information ; Selective dissemination of information ; Intelligence service ; Information policy ; Communication in law enforcement ; Government information ; Terrorism ; Domestic intelligence ; Exchange of government information ; Selective dissemination of information ; Terrorism ; Prevention ; United States ; COMPUTERS ; Internet ; Security ; Communication in law enforcement ; Domestic intelligence ; Exchange of government information ; Government information ; Access control ; Information policy ; Intelligence service ; Electronic books
    Abstract: Since the terrorist attacks of September 11, 2001, the sharing of intelligence and law enforcement information has been a central part of U.S. domestic security efforts. Though much of the public debate about such sharing focuses on addressing the threat of terrorism, organizations at all levels of government routinely share varied types of information through multiagency information systems, collaborative groups, and other links. Given resource constraints, there are concerns about the effectiveness of information-sharing and fusion activities and, therefore, their value relative to the public funds invested in them. Solid methods for evaluating these efforts are lacking, however, limiting the ability to make informed policy decisions. Drawing on a substantial literature review and synthesis, this report lays out the challenges of evaluating information-sharing efforts that frequently seek to achieve multiple goals simultaneously; reviews past evaluations of information-sharing programs; and lays out a path to improving the evaluation of such efforts going forward
    Note: "RAND Homeland Security and Defense Center , "This research was conducted within the RAND Homeland Security and Defense Center ... a joint center of two research divisions: RAND Justice, Infrastructure, and Environment, and the RAND National Security Research Division"--Back cover , "RAND Corporation research report series."--Web Page (PDF) , "RR-380-OSD"--Page 31 , Caption title , Includes bibliographical references (pages 27-30)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    ISBN: 9780833082305 , 0833082078 , 0833082302 , 9780833082077
    Language: English
    Pages: 1 Online-Ressource (xix, 51 pages)
    Parallel Title: Print version Moore, Nancy Y., 1947- Small business and strategic sourcing
    Keywords: United States Procurement ; United States ; Small business ; Strategic planning ; Government contractors ; Government purchasing ; Defense contracts ; Small business ; Strategic planning ; Government contractors ; Government purchasing ; Defense contracts ; Small business ; Strategic planning ; United States ; BUSINESS & ECONOMICS ; Outsourcing ; Armed Forces ; Procurement ; Defense contracts ; United States ; Government contractors ; Government purchasing ; Electronic books
    Abstract: The Department of Defense (DoD) may face challenges as it attempts to maintain its goal of spending about 23 percent of its prime-contract dollars for goods and services with small businesses and at the same time apply strategic-sourcing practices to reduce total costs and improve performance in ways that will not conflict with small-business goals while making DoD purchasing more effective and efficient. Strategic sourcing practices, for example, recommend consolidation of the supply base to reduce total costs, which can lead to fewer, larger, longer-term contracts with fewer and, often, larger suppliers
    Abstract: The Department of Defense (DoD) may face challenges as it attempts to maintain its goal of spending about 23 percent of its prime-contract dollars for goods and services with small businesses and at the same time apply strategic-sourcing practices to reduce total costs and improve performance in ways that will not conflict with small-business goals while making DoD purchasing more effective and efficient. Strategic sourcing practices, for example, recommend consolidation of the supply base to reduce total costs, which can lead to fewer, larger, longer-term contracts with fewer and, often, larger suppliers
    Note: "RAND National Defense Research Institute , "Prepared for the Office of the Secretary of Defense , "This research was conducted within the Acquisition and Technology Policy Center of the RAND National Defense Research Institute"--Preface , Includes bibliographical references (pages 47-51)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    ISBN: 9780833084040 , 0833085530 , 0833084046 , 9780833085535
    Language: English
    Pages: 1 Online-Ressource (xxiv, 226 pages)
    Series Statement: RAND Corporation research report series RR513
    Parallel Title: Print version Watts, Stephen (Stephen Baldwin) Countering others' insurgencies
    Keywords: Counterinsurgency Government policy ; Counterinsurgency ; Counterinsurgency ; Counterinsurgency ; Counterinsurgency ; Counterinsurgency ; Pakistan ; Philippines ; United States ; Military relations ; Military & Naval Science ; Law, Politics & Government ; Military Science - General ; Counterinsurgency ; Counterinsurgency ; Government policy ; United States Military relations ; Pakistan Military relations ; United States Military relations ; Philippines Military relations ; United States Military relations ; United States ; Pakistan ; United States ; Philippines ; United States ; Electronic books
    Abstract: This study examines the counterinsurgency strategies and practices adopted by threatened regimes and the conditions under which U.S. "small-footprint" partnerships are likely to help these governments succeed. The report's findings are derived from a mixed-method research design incorporating both quantitative and qualitative analysis. Simple statistical analyses are applied to a dataset of counterinsurgencies that have terminated since the end of the Cold War (72 in all), and more in-depth analyses are provided of two recent cases of U.S. partnerships with counterinsurgent regimes, in the Philippines and Pakistan. The quantitative analysis finds that the cases of small-footprint U.S. operations that are commonly touted as "success stories" all occurred in countries approximating a best-case scenario. Such a verdict is not meant to deny the importance of U.S. assistance; rather, it is meant to highlight that similar U.S. policies with less promising partner nations should not be expected to produce anywhere near the same levels of success. The majority of insurgencies have taken place in worst-case conditions, and in these environments, counterinsurgent regimes are typically unsuccessful in their efforts to end rebellion, and they often employ violence indiscriminately. The case studies of the Philippines and Pakistan largely reinforce the findings of the quantitative analysis. They also highlight the challenges the United States faces in attempting to influence partner regimes to fight counterinsurgencies in the manner that the United States would prefer. The study concludes with policy recommendations for managing troubled partnerships
    Abstract: This study examines the counterinsurgency strategies and practices adopted by threatened regimes and the conditions under which U.S. "small-footprint" partnerships are likely to help these governments succeed. The report's findings are derived from a mixed-method research design incorporating both quantitative and qualitative analysis. Simple statistical analyses are applied to a dataset of counterinsurgencies that have terminated since the end of the Cold War (72 in all), and more in-depth analyses are provided of two recent cases of U.S. partnerships with counterinsurgent regimes, in the Philippines and Pakistan. The quantitative analysis finds that the cases of small-footprint U.S. operations that are commonly touted as "success stories" all occurred in countries approximating a best-case scenario. Such a verdict is not meant to deny the importance of U.S. assistance; rather, it is meant to highlight that similar U.S. policies with less promising partner nations should not be expected to produce anywhere near the same levels of success. The majority of insurgencies have taken place in worst-case conditions, and in these environments, counterinsurgent regimes are typically unsuccessful in their efforts to end rebellion, and they often employ violence indiscriminately. The case studies of the Philippines and Pakistan largely reinforce the findings of the quantitative analysis. They also highlight the challenges the United States faces in attempting to influence partner regimes to fight counterinsurgencies in the manner that the United States would prefer. The study concludes with policy recommendations for managing troubled partnerships
    Note: Includes bibliographical references (pages 201-226)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    ISBN: 9780833085313 , 0833089978 , 083308531X , 9780833089977
    Language: English
    Pages: 1 Online-Ressource (xxii, 94 pages)
    Parallel Title: Erscheint auch als Rostker, Bernard Building toward an unmanned aircraft system training strategy
    Keywords: Drone aircraft ; Drone aircraft pilots Training of ; Drone aircraft ; Drone aircraft pilots ; Air Forces ; TECHNOLOGY & ENGINEERING ; Military Science ; Drone aircraft ; Military & Naval Science ; Law, Politics & Government ; United States ; Electronic book
    Note: "RAND National Defense Research Institute , "The research was conducted within the Forces and Resources Policy Center of the RAND National Research Institute (NDRI)"--Preface , Includes bibliographical references (pages 91-94) , Online version: Building toward an unmanned aircraft system training strategy
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    ISBN: 9780833084590 , 0833084593
    Language: English
    Pages: 1 Online-Ressource (28 pages)
    Keywords: United States Appropriations and expenditures ; United States Procurement ; Costs ; Evaluation ; United States ; United States ; Weapons systems Costs ; Forecasting ; Systems integration Risk assessment ; Electronic spreadsheets Computer programs ; Weapons systems ; Systems integration ; Electronic spreadsheets ; Electronic spreadsheets ; Computer programs ; Expenditures, Public ; United States ; TECHNOLOGY & ENGINEERING ; Military Science ; United States ; United States Armed Forces ; Weapons systems ; Costs ; Evaluation ; United States ; Electronic books
    Note: "RAND National Security Research Division , Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    ISBN: 9780833080608 , 0833084801 , 0833080601 , 9780833084804
    Language: English
    Pages: 1 Online-Ressource (44 pages)
    Keywords: United States Appropriations and expenditures ; United States Procurement ; Costs ; Evaluation ; Methodology ; United States ; United States ; Weapons systems Costs ; Forecasting ; Systems integration Risk assessment ; Methodology ; Weapons systems ; Systems integration ; TECHNOLOGY & ENGINEERING ; Military Science ; United States ; United States ; Expenditures, Public ; United States Armed Forces ; Weapons systems ; Costs ; Evaluation ; Methodology ; United States ; Electronic books
    Abstract: Implementing risk management principles to manage large defense acquisition programs is a priority for the U.S. defense acquisition community. To assist those decisionmakers responsible for identifying the risk associated with major weapons programs, RAND researchers developed a methodology and accompanying Excel, information-based risk tool (the ⁰́Assessor Tool⁰́₊). The Assessor Tool offers an Office of the Secretary of Defense (OSD)-level approach to the evaluation and measurement of system integration risk. That is, it is meant for assessors, such as OSD personnel, who may not be especially familiar with the specific program under evaluation but still may need to make judgments about the program⁰́₉s risk. It is based on a tractable and comprehensive set of questions that can help evaluate integration risk at each point in the acquisition process. More specifically, the tool enables users to see how well integration risk is being managed by providing a standards-based valuation of integration issues that can lead to cost growth, schedule growth, and program performance. The users⁰́₉ manual for the Assessor Tool is available in a companion document, An Excel Tool to Assess Acquisition Program Risk (by Lauren A. Fleishman-Mayer, Mark V. Arena, and Michael E. McMahon, TL-113-OSD, 2013). The Assessor Tool and its methodology may also be generalizable to an entire set of information-based risk assessment applications. Overall, the methodology and tool have many strengths, including being based on well-grounded theories, allowing for reproducibility and traceability, and the extensive flexibility to be used to evaluate risk for many different types of programs. To provide a benchmarking and validation of the risk scores calculated by the tool, future work could include the tool⁰́₉s validation by tracking its output against a program⁰́₉s performance
    Abstract: Implementing risk management principles to manage large defense acquisition programs is a priority for the U.S. defense acquisition community. To assist those decisionmakers responsible for identifying the risk associated with major weapons programs, RAND researchers developed a methodology and accompanying Excel, information-based risk tool (the ⁰́Assessor Tool⁰́₊). The Assessor Tool offers an Office of the Secretary of Defense (OSD)-level approach to the evaluation and measurement of system integration risk. That is, it is meant for assessors, such as OSD personnel, who may not be especially familiar with the specific program under evaluation but still may need to make judgments about the program⁰́₉s risk. It is based on a tractable and comprehensive set of questions that can help evaluate integration risk at each point in the acquisition process. More specifically, the tool enables users to see how well integration risk is being managed by providing a standards-based valuation of integration issues that can lead to cost growth, schedule growth, and program performance. The users⁰́₉ manual for the Assessor Tool is available in a companion document, An Excel Tool to Assess Acquisition Program Risk (by Lauren A. Fleishman-Mayer, Mark V. Arena, and Michael E. McMahon, TL-113-OSD, 2013). The Assessor Tool and its methodology may also be generalizable to an entire set of information-based risk assessment applications. Overall, the methodology and tool have many strengths, including being based on well-grounded theories, allowing for reproducibility and traceability, and the extensive flexibility to be used to evaluate risk for many different types of programs. To provide a benchmarking and validation of the risk scores calculated by the tool, future work could include the tool⁰́₉s validation by tracking its output against a program⁰́₉s performance
    Note: "This research was conducted within the Acquisition and Technology Policy Center of the RAND National Defense Research Institute"--Preface , "RAND National Security Research Division , Includes bibliographical references (pages 25-26) , Title from title screen (viewed on October 24, 2013)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    ISBN: 9780833080516 , 0833082027 , 0833080512 , 9780833082022
    Language: English
    Pages: 1 Online-Ressource (xxii, 53 pages)
    Series Statement: RAND Corporation research report series RR243
    Keywords: National Intelligence University (U.S.) Research ; National Intelligence University (U.S.) ; Interagency coordination ; Intelligence service ; Interagency coordination ; Intelligence service ; Government - General ; Law, Politics & Government ; Political Institutions & Public Administration - General ; United States ; EDUCATION ; Higher ; Intelligence service ; Interagency coordination ; Research ; Electronic books
    Abstract: The Center for Strategic Intelligence Research (CSIR) of the National Intelligence University (NIU) is responsible for supporting faculty and student research efforts and coordinating NIU research activities with the Intelligence Community (IC). A challenge to these coordination efforts lies in the fact that research being conducted regularly in the IC exists, for the most part, in small pockets scattered throughout a number of different IC agencies. To better identify collaborative research opportunities, topics, and processes, CSIR asked RAND to conduct a study that would capture information about these research entities, their responsibilities, and their willingness to support interagency research with NIU. The study team conducted semistructured interviews with a purposive sample of representatives of research entities in the IC. The interviews discussed interagency research and collaboration with NIU. We found that the majority of these research entities are small (less than ten full-time staff), face the competing responsibilities of short-term analytic responses and longer-term analysis and research, and are interested in research plans aligned with national priorities. The research entities are willing to support NIU, but expect NIU to take the lead in facilitating research collaboration
    Abstract: The Center for Strategic Intelligence Research (CSIR) of the National Intelligence University (NIU) is responsible for supporting faculty and student research efforts and coordinating NIU research activities with the Intelligence Community (IC). A challenge to these coordination efforts lies in the fact that research being conducted regularly in the IC exists, for the most part, in small pockets scattered throughout a number of different IC agencies. To better identify collaborative research opportunities, topics, and processes, CSIR asked RAND to conduct a study that would capture information about these research entities, their responsibilities, and their willingness to support interagency research with NIU. The study team conducted semistructured interviews with a purposive sample of representatives of research entities in the IC. The interviews discussed interagency research and collaboration with NIU. We found that the majority of these research entities are small (less than ten full-time staff), face the competing responsibilities of short-term analytic responses and longer-term analysis and research, and are interested in research plans aligned with national priorities. The research entities are willing to support NIU, but expect NIU to take the lead in facilitating research collaboration
    Note: "This research was sponsored by NIU and conducted within the Intelligence Policy Center of the RAND National Defense Research Institute"--Preface , "RAND National Security Research Division , Includes bibliographical references (pages 51-53)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    ISBN: 9780833082138 , 0833086030 , 0833082132 , 9780833086037
    Language: English
    Pages: 1 Online-Ressource (viii, 81 pages)
    Parallel Title: Online version Webb, Timothy, 1936- Venture capital and strategic investment for developing government mission capabilities
    Parallel Title: Print version Webb, Timothy, 1936- Venture capital and strategic investment for developing government mission capabilities
    Keywords: Technology and state ; Venture capital Government policy ; Incentives in industry Government policy ; Technological innovations Government policy ; Technology and state ; Venture capital ; Incentives in industry ; Technological innovations ; United States ; Technological innovations ; Government policy ; Technology and state ; Venture capital ; Government policy ; Business & Economics ; Economic History ; BUSINESS & ECONOMICS ; Econometrics ; Incentives in industry ; Government policy ; Electronic books
    Abstract: A wide range of military capability improvement efforts have benefited from development and procurement methods that accommodate urgent operational needs. Changes in the threat environment suggest a need for a fresh examination of the adequacy and suitability of acquisition methods for the coming decade. This report examines one class of acquisition method, known as government venture capital (GVC), or government strategic investment (GSI). The research extracts general observations from previous cases and from a partial economic model of the GSI type of initiative. Taken together, these analyses will help government acquisition managers to judge more thoroughly the suitability of strategic investment methods for motivating future government mission-oriented innovation by private firms. The report does not explicitly compare GSIs and alternatives for their efficacy in advancing government mission objectives. If it had, it is likely that the main advantage of GSI would be improved access to information about alternative approaches available in the commercial market, resulting from the close relationships the GSI structure engenders between government and business
    Abstract: A wide range of military capability improvement efforts have benefited from development and procurement methods that accommodate urgent operational needs. Changes in the threat environment suggest a need for a fresh examination of the adequacy and suitability of acquisition methods for the coming decade. This report examines one class of acquisition method, known as government venture capital (GVC), or government strategic investment (GSI). The research extracts general observations from previous cases and from a partial economic model of the GSI type of initiative. Taken together, these analyses will help government acquisition managers to judge more thoroughly the suitability of strategic investment methods for motivating future government mission-oriented innovation by private firms. The report does not explicitly compare GSIs and alternatives for their efficacy in advancing government mission objectives. If it had, it is likely that the main advantage of GSI would be improved access to information about alternative approaches available in the commercial market, resulting from the close relationships the GSI structure engenders between government and business
    Note: "RAND National Defense Research Institute , "This research was ... conducted within the Acquisition and Technology Policy Center of the RAND National Defense Research Institute"--Preface , Includes bibliographical references (pages 79-81)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    Santa Monica, CA : RAND
    ISBN: 9780833081735 , 083308173X , 9780833081742 , 0833081756 , 0833081748 , 0833081721 , 9780833081728 , 9780833081759
    Language: English
    Pages: 1 Online-Ressource (xxx, 312 pages)
    Series Statement: Rand Corporation research report series
    Parallel Title: Print version Bennett, Bruce W., 1952- Preparing for the possibility of a North Korean collapse
    Keywords: Failed states ; Korean reunification question (1945- ) ; Failed states ; Korean reunification question (1945- ) ; Korean reunification question (1945- ) ; Diplomatic relations ; Economic history ; Failed states ; Politics and government ; POLITICAL SCIENCE ; Government ; International ; Korea (North) ; United States ; POLITICAL SCIENCE ; International Relations ; General ; POLITICAL SCIENCE ; Human Rights ; United States Foreign relations ; Korea (North) Foreign relations ; Korea (North) Economic conditions 21st century ; Korea (North) Politics and government 2011- ; United States ; Korea (North) ; Korea (North) ; Korea (North) ; Electronic books
    Abstract: A North Korean government collapse would have serious consequences in North Korea and beyond. At the very least, a collapse would reduce the already scarce food and essential goods available to the population, in part due to hoarding and increasing costs. This could lead to a humanitarian disaster. Factions emerging after a collapse could plunge the country into civil war that spills over into neighboring countries. Weapons of mass destruction (WMD) could be used and even proliferated. This report examines ways of controlling and mitigating the consequences, recognizing that the Republic of Korea (ROK) and its U.S. ally will almost certainly need to intervene militarily in the North, likely seeking Korean unification as the ultimate outcome. But such an intervention requires serious preparation. North Koreans must be convinced that they will be treated well and could actually have better lives after unification. The allies need to prepare to deliver humanitarian aid in the North, stop conflict, demilitarize the North Korean military and security services over time, and secure and eventually eliminate North Korean WMD. Potential Chinese intervention must be addressed, ideally leading to cooperation with ROK and U.S. forces. Plans are needed for liberating North Korean political prisons before the guards execute the prisoners. Property rights need to be addressed. The ROK must sustain its military capabilities despite major reductions in force size due to very low birthrates. And ROK reluctance to broadly address North Korean collapse must be overcome so that plans in these areas can move forward
    Abstract: A North Korean government collapse would have serious consequences in North Korea and beyond. At the very least, a collapse would reduce the already scarce food and essential goods available to the population, in part due to hoarding and increasing costs. This could lead to a humanitarian disaster. Factions emerging after a collapse could plunge the country into civil war that spills over into neighboring countries. Weapons of mass destruction (WMD) could be used and even proliferated. This report examines ways of controlling and mitigating the consequences, recognizing that the Republic of Korea (ROK) and its U.S. ally will almost certainly need to intervene militarily in the North, likely seeking Korean unification as the ultimate outcome. But such an intervention requires serious preparation. North Koreans must be convinced that they will be treated well and could actually have better lives after unification. The allies need to prepare to deliver humanitarian aid in the North, stop conflict, demilitarize the North Korean military and security services over time, and secure and eventually eliminate North Korean WMD. Potential Chinese intervention must be addressed, ideally leading to cooperation with ROK and U.S. forces. Plans are needed for liberating North Korean political prisons before the guards execute the prisoners. Property rights need to be addressed. The ROK must sustain its military capabilities despite major reductions in force size due to very low birthrates. And ROK reluctance to broadly address North Korean collapse must be overcome so that plans in these areas can move forward
    Note: "Prepared for the Smith Richardson Foundation , At head of title: Rand National Security Research Division , Includes bibliographical references (pages 297-312) and index
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    ISBN: 9780833083708 , 0833083708
    Language: English
    Pages: 1 Online-Ressource (145 pages)
    DDC: 344.7301/25763
    Keywords: United States ; United States ; Soldiers Employment ; Employee retention ; Soldiers ; Employee retention ; Uniformed Services Employment and Reemployment Rights Act of 1994 (United States) ; Employee retention ; Soldiers ; Employment ; United States ; United States National Guard ; Employment ; United States Armed Forces ; Reserves ; Employment ; United States ; United States ; Electronic books
    Abstract: Employer Support of the Guard and Reserve (ESGR), a U.S. Department of Defense office (DoD), asked the RAND Corporation to study the implications that using the Reserve Components (RCs) as an operational force can have for employers in view of employment rights protections for RC members. Specifically, ESGR wanted to know whether changes are needed to the Uniformed Services Employment and Reemployment Rights Act (USERRA), 1994 legislation designed to prevent hiring discrimination and bolster job protection for members of the armed forces, including those of the RCs; ESGR support programs; or RC activation and deployment policies, given the increased mobilization of the National Guard and Reserve and the continuing need to balance the rights, duties, and obligations of employers, RC members, and RC members⁰́₉ families. The study involved the review and analysis of existing research and data related to USERRA and the effects on employers of employee absences more generally, an analysis of the 2011 DoD National Survey of Employers, focus groups with employers conducted in 2012, interviews with RC chiefs conducted in 2011, and a legal and legislative history review of USERRA. This report describes key findings from the analysis
    Abstract: Employer Support of the Guard and Reserve (ESGR), a U.S. Department of Defense office (DoD), asked the RAND Corporation to study the implications that using the Reserve Components (RCs) as an operational force can have for employers in view of employment rights protections for RC members. Specifically, ESGR wanted to know whether changes are needed to the Uniformed Services Employment and Reemployment Rights Act (USERRA), 1994 legislation designed to prevent hiring discrimination and bolster job protection for members of the armed forces, including those of the RCs; ESGR support programs; or RC activation and deployment policies, given the increased mobilization of the National Guard and Reserve and the continuing need to balance the rights, duties, and obligations of employers, RC members, and RC members⁰́₉ families. The study involved the review and analysis of existing research and data related to USERRA and the effects on employers of employee absences more generally, an analysis of the 2011 DoD National Survey of Employers, focus groups with employers conducted in 2012, interviews with RC chiefs conducted in 2011, and a legal and legislative history review of USERRA. This report describes key findings from the analysis
    Note: "RAND National Security Research Division , "The research was conducted within the Forces and Resources Policy Center of the RAND National Defense Research Institute"--Page [ii] , Includes bibliographical references , Title from title screen (viewed August 23, 2013)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    ISBN: 9780833081025 , 0833082035 , 0833081020 , 9780833082039
    Language: English
    Pages: 1 Online-Ressource (xvi, 71 pages)
    Keywords: United States ; United States ; Organizational change Management ; Corporate culture ; Strategic planning ; Organizational change ; Corporate culture ; Strategic planning ; Military Administration ; Corporate culture ; Organizational change ; Management ; Strategic planning ; Military & Naval Science ; Law, Politics & Government ; BUSINESS & ECONOMICS ; Strategic Planning ; United States ; Electronic books
    Abstract: To help the National Reconnaissance Office (NRO) become more flexible and agile in an increasingly uncertain world, RAND sought answers to two key questions. First, would the NRO benefit from building modular satellites? RAND researchers developed a method for evaluating whether a system is a good candidate for modularity and applied it to systems both inside and outside the NRO. The authors found that NRO space systems do not appear to be strong candidates for modularization. Second, what lessons might be drawn from how chief executive officers, military personnel, and health care professionals (among others) respond to surprise? RAND developed a framework to categorize professionals' responses to surprise and then conducted discussions with representatives from 13 different professions, including former ambassadors, chief executive officers, military personnel, and physicians. The authors observed that all interviewees used common coping strategies. The authors also found some differences in response to surprise that depend on two factors: time available to respond and the level of chaos in the environment. The report concludes with recommendations on actions that the NRO can take to improve the flexibility of its hardware and the workforce
    Abstract: To help the National Reconnaissance Office (NRO) become more flexible and agile in an increasingly uncertain world, RAND sought answers to two key questions. First, would the NRO benefit from building modular satellites? RAND researchers developed a method for evaluating whether a system is a good candidate for modularity and applied it to systems both inside and outside the NRO. The authors found that NRO space systems do not appear to be strong candidates for modularization. Second, what lessons might be drawn from how chief executive officers, military personnel, and health care professionals (among others) respond to surprise? RAND developed a framework to categorize professionals' responses to surprise and then conducted discussions with representatives from 13 different professions, including former ambassadors, chief executive officers, military personnel, and physicians. The authors observed that all interviewees used common coping strategies. The authors also found some differences in response to surprise that depend on two factors: time available to respond and the level of chaos in the environment. The report concludes with recommendations on actions that the NRO can take to improve the flexibility of its hardware and the workforce
    Note: "This research was conducted within the Intelligence Policy Center of the RAND National Defense Research Division (NSRD)"--Preface , "RAND National Defense Research Institute , Includes bibliographical references (pages 69-71)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    ISBN: 9780833059727 , 0833059890 , 0833059726 , 9780833059895
    Language: English
    Pages: 1 Online-Ressource (xxi, 86 pages)
    Series Statement: Technical report
    Parallel Title: Print version Using social media to gauge Iranian public opinion and mood after the 2009 election
    Keywords: Twitter ; Twitter ; Public opinion ; Social media Political aspects ; Social media Political aspects ; Research ; Presidents Election 2009 ; Public opinion ; Public opinion ; Social media ; Social media ; Presidents ; Twitter ; POLITICAL SCIENCE ; Political Process ; Elections ; POLITICAL SCIENCE ; Political Process ; General ; POLITICAL SCIENCE ; International Relations ; General ; Presidents ; Election ; Public opinion ; Public opinion ; Social media ; Political aspects ; Government - Non-U.S ; Law, Politics & Government ; Government - Asia ; Iran ; Electronic books
    Abstract: Preface -- Figures and Table -- Summary -- Acknowledgments -- Abbreviations -- Introduction -- Analysis of Social Media Can Help Gauge Public Opinion and Mood in Closed Societies -- A New Computer-Based Tool Offers a Promising Means of Tapping into Politically Oriented Content in Social Media -- This Type of Analysis Can Have Important Policy Uses -- Organization of This Report -- Methodology -- The Precedent for Our Approach: Previous Research Using LIWC and Word-Usage Analysis -- LIWC Has Been Shown to Accurately Represent Verbal Expression -- The Real Potential of Exploring Word Usage Lies in Its Links with Behaviors and Outcomes -- Word Usage Is Now Being Studied in Politically Oriented Contexts -- Our Research Process -- Planning Tasks: Understanding the Sphere of Relevant Social Media -- Selecting Twitter Texts -- Selecting Iran-Relevant Political Topics -- Selecting the LIWC Word Categories to Use in Our Analysis and Defining How We Would Interpret Them -- Background on Social Media Use in Iran and Events Surrounding the 2009 Election -- Social Media Use in Contemporary Iran -- The Scale of Internet and Social Media Usage in Contemporary Iran -- Who Is Using Social Media in Iran? -- The Anonymity Factor -- The Iranian Information Environment Prior to the 2009 Presidential Election -- The Use of Social Media During the 2009 Presidential Election in Iran -- The Role of Social Media in Iran's Internal Politics Grew Rapidly After the 2009 Presidential Election -- Major Events in Iran During the Post-Election Period -- The Rise of Mass Protests -- June 19: Khamenei's Friday Prayer Speech -- June 20: Neda Agha-Soltan's Death -- July 9: Anniversary of the 1999 Student Uprisings -- August 5: Ahmadinejad's Inauguration -- September 18: Quds Day -- Late December: Ashura Day Protests -- February 11, 2010: 31st Anniversary of the Islamic Revolution -- Overall Trends in Public Mood in Iran After the 2009 Presidential Election -- Public Mood Throughout the Nine Months After the Election -- Twitter's Clearest Indicator of Mood and Forecaster of Action: Swear Words -- Use of Pronouns on Twitter After the Election -- Summary -- Iranian Public Opinion About Specific Topics in the Aftermath of the 2009 Election -- Public Opinion Leading Domestic Political Figures: Ahmadinejad, Khamenei, Mousavi, and Karroubi -- Summary -- Background -- Comparing Trends in Public Opinion About Political Figures -- Around the Quds Day Protest, Twitter Users Wrote More Negatively About Khamenei Than About Ahmadinejad -- At Certain Points, Twitter Users Wrote More Positively and Less Negatively About Karroubi Than About Mousavi -- Initially, Twitter Users Swore More About Ahmadinejad Than About Mousavi, but the Opposite Became True -- Policy Implications -- Pro-Government and Opposition Groups: The Green Movement, the Revolutionary Guards, and the Basij -- Summary -- Background -- Comparing Trends in Public Opinion About Political Groups -- The Green Movement Was Viewed More Positively Than the Revolutionary Guards or Basij -- Twitter Users Swore More About the Basij Than About the Revolutionary Guards -- Public Opinion About the United States, President Obama, and the CIA -- Summary -- Usage of Swear Words Suggests Early Frustration with the United States and President Obama, as Well as a Strong Desire for U.S. Action -- Usage of First-Person Singular Pronouns Regarding the United States and President Obama Generally Paralleled Usage of Swear Words -- Pronoun Use When Writing About Obama as Compared with Iranian Figures -- Twitter Users Expressed Less Negative Emotion When Writing About Obama as Compared with Iranian Figures -- Positive Emotions in Tweets About Obama Showed Several Pronounced Spikes Compared with Tweets About the United States -- Some Twitter Users Pointed to Foreign Influence, Particularly Intelligence Agencies, as the Driving Force Behind Protests -- Public Opinion About Specific Countries: Israel, the United States, and Iran -- Summary -- Twitter Users Only Infrequently Swore Regarding Israel or the United States -- Twitter Users Swore More When Referring to the "Islamic Republic" Than to "Iran" -- Twitter Users Expressed Positive Emotions Toward Israelis Who May Have Aided the Protest Movement -- Methodological Considerations -- Additional Demonstration of the Methodology: Sadness Words -- Linguistic Indicators That Did Not Work as Expected on Twitter -- Differences in Phrasing May Reflect Differing Intentions and Writing Styles -- Limitations of Automated Analysis Suggest That It Is a Complementary Approach to Manual Analysis -- Next Steps: A Design for a Second Phase of This Program of Research -- Looking Ahead Toward the 2013 Iranian Presidential Elections -- Validating the Methodology -- Improving Current Aspects of the Methodology -- Expanding the Scope of the Current Work -- Additional Details Regarding Methodology: Data Collection and Analysis -- References
    Abstract: Preface -- Figures and Table -- Summary -- Acknowledgments -- Abbreviations -- Introduction -- Analysis of Social Media Can Help Gauge Public Opinion and Mood in Closed Societies -- A New Computer-Based Tool Offers a Promising Means of Tapping into Politically Oriented Content in Social Media -- This Type of Analysis Can Have Important Policy Uses -- Organization of This Report -- Methodology -- The Precedent for Our Approach: Previous Research Using LIWC and Word-Usage Analysis -- LIWC Has Been Shown to Accurately Represent Verbal Expression -- The Real Potential of Exploring Word Usage Lies in Its Links with Behaviors and Outcomes -- Word Usage Is Now Being Studied in Politically Oriented Contexts -- Our Research Process -- Planning Tasks: Understanding the Sphere of Relevant Social Media -- Selecting Twitter Texts -- Selecting Iran-Relevant Political Topics -- Selecting the LIWC Word Categories to Use in Our Analysis and Defining How We Would Interpret Them -- Background on Social Media Use in Iran and Events Surrounding the 2009 Election -- Social Media Use in Contemporary Iran -- The Scale of Internet and Social Media Usage in Contemporary Iran -- Who Is Using Social Media in Iran? -- The Anonymity Factor -- The Iranian Information Environment Prior to the 2009 Presidential Election -- The Use of Social Media During the 2009 Presidential Election in Iran -- The Role of Social Media in Iran's Internal Politics Grew Rapidly After the 2009 Presidential Election -- Major Events in Iran During the Post-Election Period -- The Rise of Mass Protests -- June 19: Khamenei's Friday Prayer Speech -- June 20: Neda Agha-Soltan's Death -- July 9: Anniversary of the 1999 Student Uprisings -- August 5: Ahmadinejad's Inauguration -- September 18: Quds Day -- Late December: Ashura Day Protests -- February 11, 2010: 31st Anniversary of the Islamic Revolution -- Overall Trends in Public Mood in Iran After the 2009 Presidential Election -- Public Mood Throughout the Nine Months After the Election -- Twitter's Clearest Indicator of Mood and Forecaster of Action: Swear Words -- Use of Pronouns on Twitter After the Election -- Summary -- Iranian Public Opinion About Specific Topics in the Aftermath of the 2009 Election -- Public Opinion Leading Domestic Political Figures: Ahmadinejad, Khamenei, Mousavi, and Karroubi -- Summary -- Background -- Comparing Trends in Public Opinion About Political Figures -- Around the Quds Day Protest, Twitter Users Wrote More Negatively About Khamenei Than About Ahmadinejad -- At Certain Points, Twitter Users Wrote More Positively and Less Negatively About Karroubi Than About Mousavi -- Initially, Twitter Users Swore More About Ahmadinejad Than About Mousavi, but the Opposite Became True -- Policy Implications -- Pro-Government and Opposition Groups: The Green Movement, the Revolutionary Guards, and the Basij -- Summary -- Background -- Comparing Trends in Public Opinion About Political Groups -- The Green Movement Was Viewed More Positively Than the Revolutionary Guards or Basij -- Twitter Users Swore More About the Basij Than About the Revolutionary Guards -- Public Opinion About the United States, President Obama, and the CIA -- Summary -- Usage of Swear Words Suggests Early Frustration with the United States and President Obama, as Well as a Strong Desire for U.S. Action -- Usage of First-Person Singular Pronouns Regarding the United States and President Obama Generally Paralleled Usage of Swear Words -- Pronoun Use When Writing About Obama as Compared with Iranian Figures -- Twitter Users Expressed Less Negative Emotion When Writing About Obama as Compared with Iranian Figures -- Positive Emotions in Tweets About Obama Showed Several Pronounced Spikes Compared with Tweets About the United States -- Some Twitter Users Pointed to Foreign Influence, Particularly Intelligence Agencies, as the Driving Force Behind Protests -- Public Opinion About Specific Countries: Israel, the United States, and Iran -- Summary -- Twitter Users Only Infrequently Swore Regarding Israel or the United States -- Twitter Users Swore More When Referring to the "Islamic Republic" Than to "Iran" -- Twitter Users Expressed Positive Emotions Toward Israelis Who May Have Aided the Protest Movement -- Methodological Considerations -- Additional Demonstration of the Methodology: Sadness Words -- Linguistic Indicators That Did Not Work as Expected on Twitter -- Differences in Phrasing May Reflect Differing Intentions and Writing Styles -- Limitations of Automated Analysis Suggest That It Is a Complementary Approach to Manual Analysis -- Next Steps: A Design for a Second Phase of This Program of Research -- Looking Ahead Toward the 2013 Iranian Presidential Elections -- Validating the Methodology -- Improving Current Aspects of the Methodology -- Expanding the Scope of the Current Work -- Additional Details Regarding Methodology: Data Collection and Analysis -- References
    Note: Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    Santa Monica, CA : RAND
    ISBN: 9780833058652 , 0833058673 , 0833058657 , 9780833058676
    Language: English
    Pages: 1 Online-Ressource (xxvi, 128 pages)
    Series Statement: Rand Corporation monograph series MG-1154-SRF
    Parallel Title: Print version Coping with a nuclearizing Iran
    Keywords: Nuclear weapons ; Nuclear weapons ; HISTORY ; Military ; Nuclear Warfare ; POLITICAL SCIENCE ; International Relations ; Arms Control ; Diplomatic relations ; Iran ; United States ; Nuclear weapons ; Strategic aspects of individual places ; Iran Strategic aspects ; Iran Foreign relations ; United States Foreign relations ; Iran ; Iran ; United States ; Electronic books
    Abstract: It is not inevitable that Iran will acquire nuclear weapons or even that it will gain the capacity to quickly produce them. U.S. and even Israeli analysts continually push their estimates for such an event further into the future. Nevertheless, absent a change in Iranian policy, it is reasonable to assume that, some time in the coming decade, Iran will acquire such a capability. Most recent scholarly studies have also focused on how to prevent Iran from acquiring nuclear weapons. Other, less voluminous writing looks at what to do after Iran becomes a nuclear power. What has so far been lacking is a policy framework for dealing with Iran before, after, and, indeed, during its crossing of the nuclear threshold. This monograph attempts to fill that gap by providing a midterm strategy for dealing with Iran that neither begins nor ends at the point at which Tehran acquires a nuclear weapon capability. It proposes an approach that neither acquiesces to a nuclear-armed Iran nor refuses to admit the possibility -- indeed, the likelihood -- of this occurring
    Abstract: It is not inevitable that Iran will acquire nuclear weapons or even that it will gain the capacity to quickly produce them. U.S. and even Israeli analysts continually push their estimates for such an event further into the future. Nevertheless, absent a change in Iranian policy, it is reasonable to assume that, some time in the coming decade, Iran will acquire such a capability. Most recent scholarly studies have also focused on how to prevent Iran from acquiring nuclear weapons. Other, less voluminous writing looks at what to do after Iran becomes a nuclear power. What has so far been lacking is a policy framework for dealing with Iran before, after, and, indeed, during its crossing of the nuclear threshold. This monograph attempts to fill that gap by providing a midterm strategy for dealing with Iran that neither begins nor ends at the point at which Tehran acquires a nuclear weapon capability. It proposes an approach that neither acquiesces to a nuclear-armed Iran nor refuses to admit the possibility -- indeed, the likelihood -- of this occurring
    Note: "National Security Research Division , Includes bibliographical references (pages 111-128)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    Santa Monica, CA : RAND
    ISBN: 9780833049827 , 0833050753 , 0833049828 , 9780833050755
    Language: English
    Pages: 1 Online-Ressource (xxvi, 115 pages)
    Series Statement: Rand Corporation monograph series MG-987-SRF
    Parallel Title: Print version Hired guns
    Keywords: Government contractors Evaluation ; Contracting out Evaluation ; Government contractors Evaluation ; Contracting out Evaluation ; Private security services Evaluation ; Private military companies Evaluation ; Postwar reconstruction Evaluation ; Government contractors ; Contracting out ; Government contractors ; Contracting out ; Private security services ; Private military companies ; Postwar reconstruction ; POLITICAL SCIENCE ; International Relations ; General ; Contracting out ; Evaluation ; Government contractors ; Evaluation ; Iraq ; United States ; HISTORY ; Military ; Electronic books
    Abstract: "The use of armed private security contractors (PSCs) in the Iraq war has been unprecedented. Not only government agencies but also journalists, reconstruction contractors, and nongovernmental organizations frequently view them as a logical choice to fill their security needs, yet there have been a number of reports of PSCs committing serious, and sometimes fatal, abuses of power in Iraq. This study uses a systematic, empirically based survey of opinions of U.S. military and State Department personnel on the ground in Iraq to shed light on the following questions: To what extent are armed PSCs perceived to be imposing costs on the U.S. military effort? If so, are those costs tempered by positive contributions? How has the use of PSCs affected U.S. military operations in Operation Iraqi Freedom? While the military personnel did report some incidents of unnecessarily threatening, arrogant, or belligerent contractor behavior, the survey results indicate that neither the U.S. military nor State Department personnel appear to perceive PSCs to be "running wild" in Iraq. Moreover, respondents tended to consider PSCs a force multiplier rather than an additional strain on military troops, but both military and State Department respondents held mixed views regarding the contribution of armed contractors to U.S. foreign policy objectives."--Page 4 of cover
    Abstract: "The use of armed private security contractors (PSCs) in the Iraq war has been unprecedented. Not only government agencies but also journalists, reconstruction contractors, and nongovernmental organizations frequently view them as a logical choice to fill their security needs, yet there have been a number of reports of PSCs committing serious, and sometimes fatal, abuses of power in Iraq. This study uses a systematic, empirically based survey of opinions of U.S. military and State Department personnel on the ground in Iraq to shed light on the following questions: To what extent are armed PSCs perceived to be imposing costs on the U.S. military effort? If so, are those costs tempered by positive contributions? How has the use of PSCs affected U.S. military operations in Operation Iraqi Freedom? While the military personnel did report some incidents of unnecessarily threatening, arrogant, or belligerent contractor behavior, the survey results indicate that neither the U.S. military nor State Department personnel appear to perceive PSCs to be "running wild" in Iraq. Moreover, respondents tended to consider PSCs a force multiplier rather than an additional strain on military troops, but both military and State Department respondents held mixed views regarding the contribution of armed contractors to U.S. foreign policy objectives."--Page 4 of cover
    Note: Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    ISBN: 9780833050052 , 0833050141 , 0833050052 , 9780833050144
    Language: English
    Pages: 1 Online-Ressource (xxiv, 199 pages, 1 flowchart)
    Series Statement: RAND Corporation monograph series
    Parallel Title: Print version Jackson, Brian A., 1972- Evaluating the reliability of emergency response systems for large-scale incident operations
    DDC: 363.34/80684
    Keywords: Emergency communication systems ; Preparedness Evaluation ; Incident command systems ; Assistance in emergencies ; Emergency management Evaluation ; Emergency communication systems ; Preparedness ; Incident command systems ; Assistance in emergencies ; Emergency management ; Disaster Planning organization & administration ; Emergencies ; Program Evaluation ; Emergency Responders ; Incident command systems ; United States ; Emergency management ; Evaluation ; SOCIAL SCIENCE ; Disasters & Disaster Relief ; Assistance in emergencies ; Emergency communication systems ; United States ; Electronic books
    Abstract: The ability to measure emergency preparedness - to predict the likely performance of emergency response systems in future events - is critical for policy analysis in homeland security. Yet it remains difficult to know how prepared a response system is to deal with large-scale incidents, whether it be a natural disaster, terrorist attack, or industrial or transportation accident. This research draws on the fields of systems analysis and engineering to apply the concept of system reliability to the evaluation of emergency response systems. The authors describe a method for modeling an emergency response system; identifying how individual parts of the system might fail; and assessing the likelihood of each failure and the severity of its effects on the overall response effort. The authors walk the reader through two applications of this method: a simplified example in which responders must deliver medical treatment to a certain number of people in a specified time window, and a more complex scenario involving the release of chlorine gas. The authors also describe an exploratory analysis in which they parsed a set of after-action reports describing real-world incidents, to demonstrate how this method can be used to quantitatively analyze data on past response performance. The authors conclude with a discussion of how this method of measuring emergency response system reliability could inform policy discussion of emergency preparedness, how system reliability might be improved, and the costs of doing so. --From publisher description
    Abstract: The ability to measure emergency preparedness - to predict the likely performance of emergency response systems in future events - is critical for policy analysis in homeland security. Yet it remains difficult to know how prepared a response system is to deal with large-scale incidents, whether it be a natural disaster, terrorist attack, or industrial or transportation accident. This research draws on the fields of systems analysis and engineering to apply the concept of system reliability to the evaluation of emergency response systems. The authors describe a method for modeling an emergency response system; identifying how individual parts of the system might fail; and assessing the likelihood of each failure and the severity of its effects on the overall response effort. The authors walk the reader through two applications of this method: a simplified example in which responders must deliver medical treatment to a certain number of people in a specified time window, and a more complex scenario involving the release of chlorine gas. The authors also describe an exploratory analysis in which they parsed a set of after-action reports describing real-world incidents, to demonstrate how this method can be used to quantitatively analyze data on past response performance. The authors conclude with a discussion of how this method of measuring emergency response system reliability could inform policy discussion of emergency preparedness, how system reliability might be improved, and the costs of doing so. --From publisher description
    Note: Includes bibliographical references (pages 187-199)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    Santa Monica, CA : RAND
    ISBN: 9780833047007 , 083304723X , 9781282282698 , 1282282697 , 9780833047236 , 0833047000
    Language: English
    Pages: 1 Online-Ressource (xxiv, 101 pages)
    Series Statement: RAND Corporation monograph series
    Parallel Title: Print version Imported oil and U.S. national security
    Keywords: Petroleum industry and trade Government policy ; National security ; Petroleum industry and trade ; Petroleum industry and trade ; National security ; Petroleum industry and trade ; BUSINESS & ECONOMICS ; International ; Marketing ; POLITICAL SCIENCE ; International Relations ; Trade & Tariffs ; BUSINESS & ECONOMICS ; International ; General ; BUSINESS & ECONOMICS ; Exports & Imports ; POLITICAL SCIENCE ; Public Policy ; Environmental Policy ; National security ; Petroleum industry and trade ; Petroleum industry and trade ; Government policy ; oil ; natural security ; USA ; United States
    Abstract: Introduction -- Oil markets and U.S. national security -- Oil as a foreign policy instrument -- Oil revenues, rogue states, and terrorist groups -- Incremental costs for U.S. forces to secure the supply and transit of oil from the Persian Gulf -- Policy options to address U.S. national security concerns linked to imported oil
    Abstract: In 2007, on a net basis, the United States imported 58 percent of the oil it consumed. This book critically evaluates commonly suggested links between these oil imports and U.S. national security. The major risk to the United States posed by reliance on oil is the economic costs of a major disruption in global oil supplies. On the other hand, the study found no evidence that oil exporters have been able to use embargoes or threats of embargoes to achieve key political and foreign policy goals. Oil revenues are irrelevant for terrorist groups' ability to launch attacks. The study also assesses the economic, political, and military costs and benefits of potential policies to alleviate challenges to U.S. national security linked to imported oil. Of these measures, the adoption of the following energy policies by the U.S. government would most effectively reduce the costs to U.S. national security of importing oil: (1) Support well-functioning oil markets and refrain from imposing price controls or rationing during times of severe disruptions in supply. (2) Initiate a high-level review of prohibitions on exploring and developing new oil fields in restricted areas in order to provide policymakers and stakeholders with up-to-date and unbiased information on both economic benefits and environmental risks from relaxing those restrictions. (3) Ensure that licensing and permitting procedures and environmental standards for developing and producing oil and oil substitutes are clear, efficient, balanced in addressing both costs and benefits, and transparent. (4) Impose an excise tax on oil to increase fuel economy and soften growth in demand for oil. (5) Provide more U.S. government funding for research on improving the efficiency with which the U.S. economy uses oil and competing forms of energy.--Publisher description
    Abstract: In 2007, on a net basis, the United States imported 58 percent of the oil it consumed. This book critically evaluates commonly suggested links between these oil imports and U.S. national security. The major risk to the United States posed by reliance on oil is the economic costs of a major disruption in global oil supplies. On the other hand, the study found no evidence that oil exporters have been able to use embargoes or threats of embargoes to achieve key political and foreign policy goals. Oil revenues are irrelevant for terrorist groups' ability to launch attacks. The study also assesses the economic, political, and military costs and benefits of potential policies to alleviate challenges to U.S. national security linked to imported oil. Of these measures, the adoption of the following energy policies by the U.S. government would most effectively reduce the costs to U.S. national security of importing oil: (1) Support well-functioning oil markets and refrain from imposing price controls or rationing during times of severe disruptions in supply. (2) Initiate a high-level review of prohibitions on exploring and developing new oil fields in restricted areas in order to provide policymakers and stakeholders with up-to-date and unbiased information on both economic benefits and environmental risks from relaxing those restrictions. (3) Ensure that licensing and permitting procedures and environmental standards for developing and producing oil and oil substitutes are clear, efficient, balanced in addressing both costs and benefits, and transparent. (4) Impose an excise tax on oil to increase fuel economy and soften growth in demand for oil. (5) Provide more U.S. government funding for research on improving the efficiency with which the U.S. economy uses oil and competing forms of energy.--Publisher description
    Note: "Sponsored by the Institute for 21st Century Energy, U.S. Chamber of Commerce , Issued by: RAND Infrastructure, Safety, and Environment and National Security Research Division , Includes bibliographical references (pages 93-103) , Title from PDF title page (viewed May 11, 2009)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...