Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • English  (28)
  • 2015-2019  (28)
  • 1990-1994
  • Santa Monica, Calif : RAND  (28)
  • United States  (28)
Datasource
Material
Language
  • English  (28)
Years
Year
  • 1
    ISBN: 9780833092922 , 0833092928
    Language: English
    Pages: Online Ressource (xxxv, 148 pages) , color illustrations, color map, color charts.
    Series Statement: Research Report RR-1236-OSD
    Parallel Title: Erscheint auch als
    DDC: 303.62509599
    Keywords: United States / Army / Special Forces ; United States ; United States ; United States ; Terrorism Prevention ; Philippines ; Counterinsurgency Philippines ; Transnational crime Prevention ; International cooperation ; Operation Enduring Freedom, 2001- ; Combined operations (Military science) ; Transnational crime Prevention ; International cooperation ; Counterinsurgency ; Terrorism Prevention ; Terrorism Prevention ; Operation Enduring Freedom, 2001- ; Counterinsurgency ; Transnational crime Prevention ; International cooperation ; Combined operations (Military science) ; Terrorism ; Prevention ; HISTORY ; Asia ; Southeast Asia ; Military relations ; Strategic aspects of individual places ; Combined operations (Military science) ; Counterinsurgency ; Philippines Strategic aspects ; 21st century ; United States Military relations ; Philippines ; Philippines Military relations ; United States ; Philippines Military relations ; Philippines Strategic aspects 21st century ; United States Military relations ; United States Military relations ; Philippines Military relations ; Philippines Strategic aspects 21st century ; Philippines ; United States ; Electronic books
    Abstract: "This report examines the 14-year experience of U.S. special operations forces in the Philippines from 2001 through 2014. The objective of this case history is to document and evaluate the activities and effects of special operations capabilities employed to address terrorist threats in Operation Enduring Freedom--Philippines through (1) training and equipping Philippine security forces, (2) providing operational advice and assistance, and (3) conducting civil–military and information operations. The report evaluates the development, execution, and adaptation of the U.S. effort to enable the Philippine government to counter transnational terrorist groups. An average of 500 to 600 U.S. Army, Navy, Air Force, and Marine Corps special operations units were employed continuously under the command of a joint special operations task force. They provided training, advice, and assistance during combat operations to both Philippine special operations units and selected air, ground, and naval conventional units; conducted civil–military and information operations on Basilan, in the Sulu archipelago, and elsewhere in Mindanao; provided intelligence, surveillance, reconnaissance, medical evacuation, and emergency care; aided planning and intelligence fusion at joint operational commands and force development at institutional headquarters; and coordinated their programs closely with the U.S. embassy country team. The authors conclude that Operation Enduring Freedom--Philippines contributed to the successful degradation of transnational terrorist threats in the Philippines and the improvement of its security forces, particularly special operations units. It identifies contributing and limiting factors, which could be relevant to the planning and implementation of future such efforts"--Publisher's description
    Description / Table of Contents: Preface -- Figures -- Summary -- Acknowledgments -- Abbreviations -- Chapter 1: Introduction: Study Purpose -- Research Approach -- Organization of the Report -- Chapter 2: U.S.-Philippine Relations in Historical Perspective: U.S.-Philippine Policy Decisions -- The Initial Assessment -- Joint Task Force 510 and the Terms of Reference -- 2003-2004: Transition to Joint Special Operations Task Force--Philippines -- Summary -- Chapter 4: 2005-2007: The Move to Jolo and Operation Ultimatum: Assessment and Adaptation -- Plan Execution -- Increased Emphasis on Armed Forces of Philippines Targeting of Abu Sayyaf Group Leaders -- Summary -- Chapter 6: 2010-2012: Transitioning Up: Assessment and Adaptation -- Plan Execution -- Summary -- Chapter 7: 2012-2014: Zamboanga Siege and Transitioning Out: Assessment and Adaptation -- Plan Execution -- Summary -- Chapter 8: Conclusion: Overall Outcomes -- Limiting Factors -- Key Contributing Factors -- Generalizability of Findings -- Appendixes: A. Balikatan 02-1 Terms of Reference -- B. Plan Analysis Tool -- Bibliography.
    Note: "April 6, 2016"--Table of contents page. - Includes bibliographical references (pages 139-148). - Online resource; title from PDF title page (RAND, viewed April 7, 2016) , Includes bibliographical references (pages 139-148)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9780833092946 , 0833094432 , 0833092944 , 9780833094438
    Language: English
    Pages: 1 Online-Ressource (xxx, 180 pages)
    Series Statement: Research report RR-1199-RWJ
    Parallel Title: Erscheint auch als Chandra, Anita Building a national culture of health
    Keywords: Public health Economic aspects ; Well-being ; Quality of life ; Health promotion ; Preventive health services ; Health care reform ; Public health Social aspects ; Public health ; Well-being ; Quality of life ; Health promotion ; Preventive health services ; Health care reform ; Public health ; Health Policy ; Quality of Life ; Health Behavior ; MEDICAL ; Preventive Medicine ; Health care reform ; Health promotion ; Preventive health services ; Public health ; Economic aspects ; Public health ; Social aspects ; Quality of life ; Well-being ; United States ; United States ; Electronic book
    Abstract: Preface -- Figures -- Tables -- Abbreviations -- Summary -- Acknowledgments -- 1. Introduction: Defining Culture -- Defining Health -- The Culture of Health Action Framework -- Methods Employed for Action Framework Development -- Remainder of the Report -- 2. Developing the Action Framework and Drivers: Moving to an Action Framework -- Developing Drivers and Identifying Potential Measures -- Environmental Scan/Literature Review -- Stakeholder Engagement -- RWJF Partner Inputs -- Logic Model for the Culture of Health -- Team Analysis -- 3. Toward a Strategy for Measuring a Culture of Health: Measure Characteristics -- Criteria for Selecting Individual Measures -- 4. Stakeholder Engagement to Inform the Culture of Health Action Framework: Key Principles of Stakeholder Engagement -- Concept Mapping -- Remaining Chapters -- 5. Making Health a Shared Value: Envisioning and Defining This Action Area -- Drivers in the Action Area of Making Health a Shared Value -- Measures -- Limitations -- 6. Fostering Cross-Sector Collaboration to Improve Well-Being: Envisioning and Defining This Action Area -- Drivers in the Action Area of Fostering Cross-Sector Collaboration to Improve Well-Being -- Measures -- Limitations -- 7. Creating Healthier, More Equitable Communities: Envisioning and Defining This Action Area -- Drivers in the Action Area of Creating Healthier, More Equitable Communities -- Measures -- Limitations -- 8. Strengthening Integration of Health Services and Systems: Envisioning and Defining This Action Area -- Drivers in the Action Area of Strengthening Integration of Health Services and systems -- Measures -- Limitations -- 9. Improving Population Health, Well-Being, and Equity: Envisioning and Defining Outcomes -- Outcome Areas and Definitions -- Measures -- Limitations -- 10. Summary and Next Steps: Current Measurement Gaps -- Next Steps with Action Framework -- Sentinel Communities -- Implementation: Next Steps -- References -- Appendix A. Frequently Asked Questions About the Culture of Health -- Appendix B. Sentinel Community Overview and Frequently Asked Questions
    Abstract: Preface -- Figures -- Tables -- Abbreviations -- Summary -- Acknowledgments -- 1. Introduction: Defining Culture -- Defining Health -- The Culture of Health Action Framework -- Methods Employed for Action Framework Development -- Remainder of the Report -- 2. Developing the Action Framework and Drivers: Moving to an Action Framework -- Developing Drivers and Identifying Potential Measures -- Environmental Scan/Literature Review -- Stakeholder Engagement -- RWJF Partner Inputs -- Logic Model for the Culture of Health -- Team Analysis -- 3. Toward a Strategy for Measuring a Culture of Health: Measure Characteristics -- Criteria for Selecting Individual Measures -- 4. Stakeholder Engagement to Inform the Culture of Health Action Framework: Key Principles of Stakeholder Engagement -- Concept Mapping -- Remaining Chapters -- 5. Making Health a Shared Value: Envisioning and Defining This Action Area -- Drivers in the Action Area of Making Health a Shared Value -- Measures -- Limitations -- 6. Fostering Cross-Sector Collaboration to Improve Well-Being: Envisioning and Defining This Action Area -- Drivers in the Action Area of Fostering Cross-Sector Collaboration to Improve Well-Being -- Measures -- Limitations -- 7. Creating Healthier, More Equitable Communities: Envisioning and Defining This Action Area -- Drivers in the Action Area of Creating Healthier, More Equitable Communities -- Measures -- Limitations -- 8. Strengthening Integration of Health Services and Systems: Envisioning and Defining This Action Area -- Drivers in the Action Area of Strengthening Integration of Health Services and systems -- Measures -- Limitations -- 9. Improving Population Health, Well-Being, and Equity: Envisioning and Defining Outcomes -- Outcome Areas and Definitions -- Measures -- Limitations -- 10. Summary and Next Steps: Current Measurement Gaps -- Next Steps with Action Framework -- Sentinel Communities -- Implementation: Next Steps -- References -- Appendix A. Frequently Asked Questions About the Culture of Health -- Appendix B. Sentinel Community Overview and Frequently Asked Questions
    Note: Includes bibliographical references (pages 144-169)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9780833095169 , 0833095161
    Language: English
    Pages: 1 Online-Ressource (5 pages)
    Series Statement: Research report RR-1162-COMMASS
    DDC: 362.10973
    Keywords: Minorities Medical care ; Health care reform ; Health services accessibility ; Social status Health aspects ; Minorities ; Health care reform ; Health services accessibility ; Social status ; Health Services Accessibility statistics & numerical data ; Health Care Reform ; Ethnic Groups statistics & numerical data ; United States ; United States ; Health care reform ; Health services accessibility ; Minorities ; Medical care ; Electronic books
    Abstract: "A key aim of U.S. health care reforms is to ensure equitable care while improving quality for all Americans. Limited race/ethnicity data in health care records hamper efforts to meet this goal. Despite improvements in access and quality, gaps persist, particularly among persons belonging to racial/ethnic minority and low-income groups. This report describes the use of indirect estimation methods to produce probabilistic estimates of racial/ethnic populations to monitor health care utilization and improvement. One method described, called Bayesian Indirect Surname Geocoding, uses a person's Census surname and the racial/ethnic composition of their neighborhood to produce a set of probabilities that a given person belongs to one of a set of mutually exclusive racial/ethnic groups. Advances in methods for estimating race/ethnicity are enabling health plans and other health care organizations to overcome a long-standing barrier to routine monitoring and actions to reduce disparities in care. Though these new estimation methods are promising, practical knowledge and guidance on how to most effectively apply newly available race/ethnicity data to address disparities can be greatly extended"--Publisher's description
    Description / Table of Contents: Key findings -- NEWER INDIRECT ESTIMATION METHODS -- ACCURACY OF NEWER ESTIMATES -- USES OF INDIRECTLY ESTIMATED RACE/ETHNICITY -- RELATED APPLICATIONS OF INDIRECT ESTIMATION -- CONCLUSION -- REFERENCES.
    Note: "March 28, 2016"--Table of contents page , Includes bibliographical references (page 5)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    ISBN: 9780833095282 , 0833095285
    Language: English
    Pages: 1 Online-Ressource (vi, 9 pages)
    Series Statement: Research report RR-1460-RC/UCLA
    DDC: 324.973
    Keywords: Presidents Election ; Statistics ; Election forecasting 21st century ; Political campaigns Statistics ; Presidents ; Election forecasting ; Political campaigns ; Politics and government ; Presidents ; Election ; Statistics ; Political campaigns ; United States ; Election forecasting ; United States Politics and government 21st century ; United States ; Electronic books
    Abstract: "The 2016 RAND Presidential Election Panel Survey uses the American Life Panel (ALP) to study voting intentions, public opinion, and voter behavior. The ALP is a scientifically recruited Internet panel. Using the ALP allows us to contact the same people over time to study the evolution of their voting intentions, behavior, and opinions. Furthermore, we follow previous RAND election surveys by asking respondents about their voting intentions in probabilistic terms (percent chance), which improves forecasts. This document provides a detailed description of our methodology"--Publisher's description
    Description / Table of Contents: Preface -- Table of Contents -- Table and Figure -- Abbreviations -- Methodology of the 2016 RAND Presidential Election Panel Survey: Sample -- Weighting -- Surveys -- Predicting Election Results -- Additional Analyses -- References.
    Note: "Sponsored by philanthropic contributions from RAND supporters, RAND, and UCLA , "March 28, 2016"-Table of contents page , Includes bibliographical references (pages 8-9)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Santa Monica, Calif : RAND
    ISBN: 9780833096296 , 083309629X , 9780833095411 , 0833095412
    Language: English
    Pages: 1 Online-Ressource (xii, 40 pages)
    Series Statement: Research report RR-1526-CMS
    DDC: 617.9/195
    Keywords: Medical fees Law and legislation ; Health insurance claims ; Postoperative care Costs ; Managed care plans (Medical care) ; Medical fees ; Health insurance claims ; Postoperative care ; Managed care plans (Medical care) ; Managed Care Programs ; Fees, Medical legislation & jurisprudence ; Postoperative Care economics ; Health insurance claims ; United States ; Managed care plans (Medical care) ; Medical fees ; Law and legislation ; United States ; Electronic books
    Abstract: "The Centers for Medicare & Medicaid Services (CMS) uses a fee schedule to pay physicians and nonphysician practitioners for their professional services. For many surgeries and other types of procedures, Medicare's payment for the procedure includes post-operative visits delivered during a global period of ten or 90 days anchored on the surgery date. The Medicare Access and CHIP Reauthorization Act of 2015 requires CMS gather the necessary data to appropriately value post-operative care. The law requires CMS to collect data on the "number and level" of visits in the global period from a representative sample of physicians beginning January 1, 2017. Congress suggested, but does not require, that the data be collected through claims. CMS asked the RAND Corporation to provide recommendations on how to best collect the number and level of post-operative visits through the use of nonpayment claims. To do so, RAND first gathered input from individuals performing surgical procedures on the range of post-operative care provided during the global period. RAND consulted with an expert panel on how to categorize the care into codes that capture the major differences in the breadth and intensity of post-operative care across care settings. This report provides recommendations for a set of nonpayment codes that combine visit times with the complexity of services, for both inpatient and office-based services. The recommended codes attempt to balance the need for a simple and straightforward system with the demand for a set of codes to capture the granularity and heterogeneity associated with post-operative care delivery"--Publisher's description
    Description / Table of Contents: Preface -- Tables -- Figure -- Summary -- Acknowledgments -- Abbreviations -- Glossary -- 1. Introduction: Background -- Project Objectives -- Organization of this Report -- Clarifications on Terminology -- 2. Overview of Current Payment Policy for Post-Operative Services in the Global Period: Process for Determining Valuation of Global Procedures -- Billing for Post-Operative Services Provided During the Global Period -- 3. Interviews on Post-Operative Care: Interview Sampling Approach -- Interview Guide -- Interview Findings -- Summary of Interview Findings -- 4. Challenges Identified During Interviews and Expert Panel in Capturing Post-Operative Care via Codes: Expert Panel -- Challenges Identified During the Interviews and/or Expert Panel -- Summary of Challenges Associated with Capturing Post-Operative Care -- 5. Options for Capturing Post-Operative Care: Setting of Care -- Existing E&M Codes -- Scope of Care -- Time -- Summary of Options -- 6. Recommendations for Capturing Post-Operative Care: Proposed Framework of Post-Operative Codes -- Inpatient Codes: A, B, and C -- Office-Based Visit Codes: D and E -- Code for Non–Face-to-Face Care: F -- Codes for Clinical Staff: G and H -- Choosing the Correct Time Increment -- Summary of Recommendations -- 7. Summary and Next Steps: Other Considerations -- Next Steps -- Conclusion -- References.
    Note: "July 19, 2016"--Table of contents page , Includes bibliographical references (pages 38-40)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    ISBN: 9780833091772 , 083309517X , 0833091778 , 083309517X , 9780833091772 , 9780833095176
    Language: English
    Pages: 1 Online-Ressource (xxi, 74 pages)
    Series Statement: Research report RR-1188-OSD
    Parallel Title: Erscheint auch als
    Keywords: United States ; United States ; Veterans Services for ; Veterans Employment ; Veterans ; Veterans ; Armed Forces ; Reserves ; Veterans ; Employment ; Veterans ; Services for ; LAW / Labor & Employment ; Armed Forces ; United States ; United States National Guard ; United States Armed Forces ; Reserves ; United States ; United States
    Abstract: "As required by the 2015 National Defense Authorization Act, this report examines the efforts of the Department of Defense (DoD) to directly provide job placement assistance and related employment services to members of the reserve components. he authors of Review of the Provision of Job Placement Assistance and Related Employment Services to Members of the Reserve Components accounted for the key characteristics of the federal programs, resources, and offices that provide job placement assistance and related employment services to reserve component members. For each program, resource, and office, the authors identified the types of services provided, the intensity of those services, and the populations that are served. The authors then assessed this summary information to determine where gaps and overlaps might exist. The authors also conducted informational discussions with key stakeholders from each of the major agencies that provide job assistance to reserve component members. The authors found 40 federal programs, resources, and offices that provide job placement assistance that can be accessed by reserve component members. The bulk of the job placement assistance and related employment services available to reserve component members are provided by agencies in DoD, the Department of Labor, and the Department of Veterans Affairs. A broad set of services is covered by existing programs, and the stakeholders did not perceive any significant gaps among the many federal programs and resources that are available, but the authors did find some potential areas of overlap. There are many programs providing basic employment services, and while several of these programs target different populations and offer unique approaches to service provision, these programs could potentially represent overlap. In addition, there are a number of programs that offer slight variations on very similar tools and resources, and these resources could potentially be streamlined to cut costs and ensure consistency in information"--Publisher's description
    Description / Table of Contents: Ch. 1: Introduction -- ch. 2: Overview of federal employment programs for reserve component members -- ch. 3: Gaps and overlaps in federal job placement assistance for reserve component members -- ch. 4: Recommendations for improving federal job placement assistance for reserve component members -- Appendix A: Summary table of federal job assistance programs, resources, and offices -- Appendix B: Literature review data-abstraction forum -- Appendix C: Information discussion protocol -- Appendix D: Program data sources.
    Description / Table of Contents: Preface -- Tables -- Summary -- Acknowledgments -- Chapter One: Introduction: Study Approach -- Caveats and Limitations -- Study Scope -- Organization of This Report -- Chapter Two: Overview of Federal Employment Programs for Reserve Component Members: Approach to Documenting Programs, Resources, and Offices -- Department of Defense -- Department of Labor -- Department of Veterans Affairs -- Interagency Programs and Other Federal Programs -- Summary of Findings -- Chapter Three: Gaps and Overlaps in Federal Job Placement Assistance for Reserve Component Members -- Overview of Services Provided -- Potential Gaps in Services Provided -- Potential Overlaps in Services Provided -- Overview of Populations Served -- Potential Gaps in Populations Served -- Summary -- Chapter Four: Recommendations for Improving Federal Job Placement Assistance for Reserve Component Members -- A Road Map for Improving Federal Employment Assistance to Reserve Component Members -- Things to Consider Before Making Changes -- Final Thoughts -- Appendix: A. Summary Table of Federal Job Assistance Programs, Resources, and Offices -- B. Literature Review Data-Abstraction Form -- C. Informational Discussion Protocol -- D. Program Data Sources -- Abbreviations -- References.
    Note: "March 24, 2016"--Table of contents page , Includes bibliographical references (pages 71-74)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    ISBN: 0833094394 , 083309436X , 9780833094360 , 9780833094391
    Language: English
    Pages: 1 Online-Ressource (xix, 91 pages) , color charts
    Series Statement: Research report RR-1530-OSD
    Parallel Title: Erscheint auch als Assessing the implications of allowing transgender personnel to serve openly
    Keywords: Transgender military personnel ; Intersex military personnel ; Gay military personnel Government policy ; SOCIAL SCIENCE ; Gay Studies ; Armed Forces ; Minorities ; Intersex military personnel ; Transgender military personnel ; United States ; United States Armed Forces ; Minorities
    Abstract: "Recent U.S. Department of Defense (DoD) policy banned transgender personnel from serving openly in the military. Potential changes to this policy raised questions regarding access to gender transition--related health care, the range of transition-related treatments that DoD will need to provide, the potential costs associated with these treatments, and the impact of these health care needs on force readiness and the deployability of transgender service members. A RAND study identified the health care needs of the transgender population and transgender service members in particular. It also examined the costs of covering transition-related treatments, assessed the potential readiness implications of a policy change, and reviewed the experiences of foreign militaries that permit transgender personnel to serve openly"--Publisher's description
    Abstract: Chapter 1.Introduction --Chapter 2.What are the health care needs of the transgender population? --Chapter 3. :What is the estimated transgender population in the U.S. military? --Chapter 4.How many transgender service members are likely to seek gender transition-related medical treatment? --Chapter 5.What are the costs associated with extending health care coverage for gender transition-related treatments? --Chapter 6:What are the potential readiness implications of allowing transgender service members to serve openly? --Chapter 7.What lessons can be learned from foreign militaries that permit transgender personnel to serve openly? --Chapter 8. :Which DoD policies would need to be changed if transgender service members are allowed to serve openly? --Appendixes.
    Abstract: Preface --Figures and Tables --Summary --Acknowledgments --Abbreviations --Chapter 1.Introduction :Study Approach --Organization of This Report --Chapter 2.What Are the Health Care Needs of the Transgender Population?:Definitions of Key Terms and Concepts --Health Care Needs of the Transgender Population --Military Health System Capacity and Gender Transition--Related Treatment --Potential Consequences of Not Providing Necessary Gender Transition--Related Care --Chapter 3. :What Is the Estimated Transgender Population in the U.S. Military? :General Population Estimates of Transgender Prevalence --Prevalence-Based Approach to Estimating the Number of Transgender Service Members in the U.S. Military --Chapter 4.How Many Transgender Service Members Are Likely to Seek Gender Transition-Related Medical Treatment? --Prevalence-Based Approach to Estimating the Number of Gender Transition-Related Treatments in the U.S. Military --Utilization-Based Approach to Estimating the Number of Gender Transition-Related Treatments in the U.S. Military --Summarizing the Estimates --Chapter 5.What Are the Costs Associated with Extending Health Care Coverage for Gender Transition-Related Treatments?:Private Health Insurance Cost Estimates --Sensitivity Analyses --Summarizing the Estimates --Chapter 6:What Are the Potential Readiness Implications of Allowing Transgender Service Members to Serve Openly?:Impact on Ability to Deploy --Impact on Unit Cohesion --Costs of Separation Requirements Related to Transgender Service Members --Chapter 7.What Lessons Can Be Learned from Foreign Militaries That Permit Transgender Personnel to Serve Openly?:Policies on Transgender Personnel in Foreign Militaries --Effects on Cohesion and Readiness --Best Practices from Foreign Militaries --Lessons Learned and Issues to Consider for U.S. Military Policy --Chapter 8. :Which DoD Policies Would Need to Be Changed if Transgender Service Members Are Allowed to Serve Openly?:Accession Policy --Retention Policy --Separation Policy --Deployment Policy --Chapter 9.Conclusion --APPENDIXES --References.
    Note: "June 30, 2016"--Table of contents page , Includes bibliographical references (pages 85-91)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Santa Monica, Calif : RAND
    ISBN: 9780833094537 , 0833094351 , 083309453X , 9780833094353
    Language: English
    Pages: 1 Online-Ressource (ix, 57 pages)
    Series Statement: Perspectives PE-192-RC
    Keywords: Terrorism Risk assessment 21st century ; Intelligence service Methodology ; Terrorism Prevention 21st century ; Civil-military relations ; National security 21st century ; Terrorism ; Intelligence service ; Terrorism ; Civil-military relations ; National security ; POLITICAL SCIENCE ; Security (National & International) ; Administrative agencies ; Reorganization ; Executive advisory bodies ; Interagency coordination ; Military readiness ; Decision making ; National security ; Decision making ; United States ; Electronic book
    Abstract: "Every president needs a decisionmaking system that harnesses the full capabilities and accumulated wisdom of the U.S. government and the nation's many stakeholders. Yet national security professionals--the officials who must advise the president on the most-difficult decisions -- cite a range of structural problems that hinder effective policymaking. While a more focused and timely decisionmaking process will not necessarily improve outcomes for the United States, poor choices could be calamitous. This Perspective analyzes a range of management challenges in the national security system and presents eight recommendations for strengthening U.S. decisionmaking and oversight of policy implementation. Among the conclusions: The National Security Council staff size should be reduced to better focus on high-priority areas. Civil-military operations should be planned by a new joint office at the State Department with a military general officer as deputy. Red-team and lessons-learned efforts would help ensure that the system is adaptive and responsive. Better integration of intelligence insights and secondments of senior officials across agencies can improve the quality and coherence of decisionmaking. And the use of special envoys, or "czars," should be limited"--Publisher's description
    Description / Table of Contents: Foreword -- Acknowledgments -- Chapter 1: Introduction: Evolution of Strategies and Systems -- Chapter 2: Why Process Matters -- Chapter 3: How Did the National Security System Evolve? -- How Do Other Nations Make Decisions? -- Chapter 4: Previous Attempts at Reform -- Chapter 5: Changing Environment -- Chapter 6: Recommendations for the National Security Decision Structure -- NSC Staff Size -- Civil-Military Cooperation and Resource Sharing -- Decline of Disciplined, Organizational Messaging Systems -- Including the Right Agencies -- Integrating Intelligence Insights -- Groupthink and Embedded Assumptions -- Continuity, Integration, and Professional Staff Development -- Overuse of Czars -- Chapter 7: Conclusion: Strategizing, Decisionmaking, and Policy Implementation -- Abbreviations -- Bibliography -- About the Author.
    Note: "April 5, 2016"--Table of contents page , Includes bibliographical references (pages 51-56)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    ISBN: 9780833095763 , 0833095765
    Language: English
    Pages: 1 Online-Ressource (15 pages)
    Series Statement: Research Report RR-1095-OSD
    DDC: 362.860973
    Keywords: Veterans Medical care ; Veterans Mental health services ; Veterans Employment ; Veterans Education ; Veterans Services for ; Career changes ; Veterans ; Veterans ; Veterans ; Veterans ; Veterans ; Career changes ; Veterans ; Employment ; Veterans ; Medical care ; Veterans ; Mental health services ; Veterans ; Services for ; United States ; Career changes ; Veterans ; Education ; Electronic books
    Abstract: "The transition from military service to the civilian world can be very challenging, particularly for young veterans with no prior civilian work experience and those with injuries or disabilities. As part of their duty to care for the men and women who have served the country in uniform--as well as to promote strong member recruitment in the future--the U.S. Department of Defense and the U.S. Department of Veterans Affairs seek to monitor and improve the education and employment opportunities and the health and well-being of military veterans and reservists. Over the past decade, the RAND Corporation has proactively pursued a program of research addressing veterans' transitions to the civilian labor market. This document compiles RAND's body of work on this topic and highlights the breadth of topics RAND has studied. It distills more than a decade's worth of research on many facets of veteran life into a set of ten questions and answers gleaned from this work"--Publisher's description
    Description / Table of Contents: Overview -- HOW WIDESPREAD IS VETERAN UNEMPLOYMENT? : RAND Findings: Collecting the Right Data -- More-Robust Results -- Read More -- WHY ARE SO MANY VETERANS ON UNEMPLOYMENT INSURANCE?: RAND Findings: Building a Better Database -- Suggested Solutions -- Read More -- ARE TAX CREDITS FOR HIRING VETERANS USEFUL AND COST-EFFECTIVE?: RAND Findings -- Do Companies Unfairly Benefit? -- Benefits Outweigh the Costs -- Read More -- DO SERVICE MEMBERS AND VETERANS EARN LESS THAN CIVILIANS?: RAND Findings -- Occupational Differences -- College Enrollment -- Economic Condition -- Read More -- HOW EFFECTIVE ARE SUPPORT SERVICES FOR VETERANS' TRANSITIONS?: RAND Findings -- PaYS -- 100,000 Jobs Mission -- Beyond Yellow Ribbon -- Toolkit for Translating Skills -- Read More -- WHAT DO VETERANS EXPERIENCE WHEN RETURNING TO SCHOOL?: RAND Findings -- GI Bill Costs and Savings: Veterans' College Experience and For-Profit Institutions -- Read More -- HOW WIDESPREAD AND COSTLY ARE MENTAL HEALTH PROBLEMS AMONG SERVICE MEMBERS AND VETERANS?: RAND Findings -- Gaps in Mental Health Services -- Effects of PTSD on Earnings -- Read More -- IS SUICIDE A CRISIS IN THE MILITARY?: RAND Findings -- Mismatched Research Funding -- Read More ARE DISABLED VETERANS AND SURVIVORS SUITABLY COMPENSATED?: RAND Findings -- Disability Benefits -- Disincentive to Return to Work -- Compensating Survivors -- Read More -- WHAT ARE PROMISING AVENUES FOR FUTURE RESEARCH ON VETERANS?: Findings from Previous Research -- Potential Research on Veterans' Transitions -- Mapping Veterans' Employment Paths -- Broad Long-Term Study of Veterans’ Education Outcomes -- About This Report.
    Note: "May 23, 2016"--Table of contents page , Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    ISBN: 9780833095008 , 0833096265 , 0833095005 , 0833096265 , 9780833095008 , 9780833096265
    Language: English
    Pages: 1 Online-Ressource (xv, 40 pages)
    Series Statement: Research report RR-1453-DHS
    Keywords: Global warming ; Climate and civilization ; Infrastructure (Economics) Security measures ; Climatic changes Effect of human beings on ; Natural disasters Social aspects ; Infrastructure (Economics) Risk assessment ; Climatic changes ; Global warming ; Climate and civilization ; Natural disasters ; Infrastructure (Economics) ; Infrastructure (Economics) ; SCIENCE / Earth Sciences / Meteorology & Climatology ; Climate and civilization ; Climatic changes ; Effect of human beings on ; Global warming ; Natural disasters ; Social aspects ; United States ; Electronic book
    Abstract: "Communities, companies, and governments at all levels in the United States are making decisions that will influence where, what and how infrastructure will be built. These design and policy decisions shape infrastructure, influence economic development, and influence future exposures to natural hazards for decades, Population growth and shifts, particularly those on the coasts, drive demand for new infrastructure, and, as a result, increase the exposure of infrastructure to natural hazards. These natural hazard exposures are projected to be larger and more uncertain in the future because of the effects of sea level rise and projected changes in temperature and precipitation patterns. Thus, incorporating natural hazard risk assessment into infrastructure planning is becoming both increasingly important and challenging. This report summarizes insights we have gained about the exposures to U.S. infrastructure from natural hazards now and in the future. Our analysis identifies regions in the country where infrastructure may be uniquely exposed to a complex set of natural hazards. In those regions, our analysis highlights the types of infrastructure that are exposed and the hazards that put them at risk. Our analysis also reveals where infrastructure exposures may be expected to change most dramatically. Finally, our analysis reveals where infrastructure exposures remain most uncertain and where new data and analysis would be most valuable. Each of these findings can inform federal efforts to improve infrastructure and resilience planning"--Publisher's description
    Description / Table of Contents: Chapter 1. Introduction: the need to better understand current and future hazard exposure -- Chapter 2. Defining and analyzing infrastructure exposure -- Chapter 3. Current patterns of exposure in the continental United States -- Chapter 4. Climate change and natural hazard exposure -- Chapter 5. Findings and policy considerations -- Appendix. Interactions between infrastructure and hazards.
    Description / Table of Contents: Preface -- Figures and Tables -- Summary -- Acknowledgments -- Chapter 1. Introduction: The Need to Better Understand Current and Future Hazard Exposure: RAND's Analysis of Infrastructure Exposure -- Chapter 2. Defining and Analyzing Infrastructure Exposure: Defining Exposure -- Data and Analytical Approach -- Categorizing Hazard Exposure by Intensity and Likelihood -- Chapter 3. Current Patterns of Exposure in the Continental United States: Most of the United States Is Exposed to Some Form of Natural Hazard -- Some Regions Are Exposed to More Intense or Greater Numbers of Natural Hazards -- Relative Exposure to Natural Hazards -- Chapter 4. Climate Change and Natural Hazard Exposure: Sources of Climate Change Data -- Chapter 5. Findings and Policy Considerations: Key Findings -- Data Gaps -- APPENDIX: Interactions Between Infrastructure and Hazards -- Abbreviations -- References.
    Note: "July 12, 2016"--Table of contents page , Includes bibliographical references (pages 39-40)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    ISBN: 9780833094070 , 0833094076
    Language: English
    Pages: 1 Online-Ressource (19 pages)
    Series Statement: Research report RR-1165/4-RC
    DDC: 355.1/1560973
    Keywords: United States ; United States ; United States ; United States ; Veterans' hospitals Medical care ; Veterans Legal status, laws, etc ; Veterans Services for ; Veterans Medical care ; Government policy ; Health services accessibility ; Veterans' hospitals ; Veterans ; Veterans ; Veterans ; Health services accessibility ; Veterans ; Services for ; United States ; Health services accessibility ; United States ; Veterans ; Legal status, laws, etc ; Veterans ; Medical care ; Government policy ; Electronic books
    Abstract: "In response to concerns that the Department of Veterans Affairs (VA) has faced about veterans' access to care and the quality of care delivered, Congress enacted the Veterans Access, Choice, and Accountability Act of 2014 ("Veterans Choice Act") in August 2014. The law was passed to help address access issues by expanding the criteria through which veterans can seek care from civilian providers. In addition, the law called for a series of independent assessments of the VA health care system across a broad array of topics related to the delivery of health care services to veterans in VA-owned and -operated facilities, as well as those under contract to VA. RAND conducted three of these assessments: Veteran demographics and health care needs (A), VA health care capabilities (B), and VA authorities and mechanisms for purchasing care (C). This report summarizes the findings of our assessments and includes recommendations from the reports for improving the match between veterans' needs and VA's capabilities, including VA's ability to purchase necessary care from the private sector."--Publisher's description
    Description / Table of Contents: Introduction -- CHAPTER ONE: Demand: How Much Care Do Veterans Use? -- CHAPTER TWO: Supply: What Is VA's Capacity to Deliver Health Care and How Might This Impact Veterans' Access? -- CHAPTER THREE: What Should Policymakers Consider When Examining Changes to Purchased Care? -- Recommendations.
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    ISBN: 9780833091673 , 0833093053 , 0833091670 , 9780833093059
    Language: English
    Pages: 1 Online-Ressource (xxii, 86 pages)
    Series Statement: Research report RR-1112-OSD
    Parallel Title: Print version Defense resource planning under uncertainty An application of robust decision making to munitions mix planning
    Keywords: United States Appropriations and expenditures ; United States ; Decision making ; Strategy ; Decision making ; Strategy ; Armed Forces ; Procurement ; Armed Forces ; Weapons systems ; Decision making ; Expenditures, Public ; Strategy ; United States ; TECHNOLOGY & ENGINEERING ; Military Science ; Armed Forces ; Equipment and supplies ; United States ; Armed Forces ; Ordnance and ordnance stores ; United States Armed Forces ; Equipment ; United States Armed Forces ; Ordnance and ordnance stores ; United States Armed Forces ; Procurement ; United States Armed Forces ; Weapons systems ; United States ; United States ; United States ; United States ; Electronic book
    Abstract: "Today's defense resource planners face unprecedented uncertainty. The planning processes currently used to determine what forces and capabilities will be needed to address future threats to our national security and interests may be vulnerable to predictive failure. To manage these risks, a new approach to planning is needed to identify strategies that perform well over a wide range of threat and funding futures and thus are better able to manage surprise. This report describes how robust decision making (RDM) may help address this need. RDM, a quantitative decision support methodology for informing decisions under conditions of deep uncertainty and complexity, has been applied to many policy areas in the last decade. This document provides a proof of concept application of RDM to defense planning, focusing on the air-launched munitions mix challenge. The study embeds a fast-running "weapons on targets" allocation model within a "scenario generator" that explores many thousands of plausible, future twenty-year series of military campaigns. The RDM analysis uses these simulation models to stress-test alternative munitions mix strategies against many plausible futures. The analysis then identifies a robust munitions mix strategy, which interestingly depends not only on the desired portfolio of alternative weapons types but also on the rules used to replenish depleted weapons stocks after each campaign. The study also suggests how RDM might best be integrated into current Department of Defense planning processes and some of the challenges that might be involved"--Publisher's description
    Description / Table of Contents: Preface -- Figures -- Tables -- Summary -- Acknowledgments -- Abbreviations -- CHAPTER ONE: Introduction: Planning with Predictive Failure -- Munitions Mix Challenge -- Organization of This Report -- CHAPTER TWO: The RDM Approach to Munitions Mix Planning: Comparison of RDM and Traditional Analysis -- RDM Enables Decision Makers to Discover Robust Strategies Through Iteration -- XLRM Factors Shape the Design of the Experiment -- CHAPTER THREE: RDM Munitions Mix Analysis: Initial Analysis of a Broad Range of Munitions Mix Strategies -- Analysis of Potentially More Robust Munitions Mix Strategies -- Stress-Testing of Strategies over Many Futures -- Scenarios That Illuminate the Vulnerabilities of Strategies -- Performance of Big+Deter-Mixed Strategy in the Moderate Scenario -- Performance of the Big+Deter-Mixed Strategy in the Extreme Scenario -- Future Focus on Purchase Rules in Addition to Portfolio Goals -- CHAPTER FOUR: Conclusions: A Robust Munitions Mix Strategy -- The Future of RDM in Defense Planning -- APPENDIXES -- References.
    Note: Includes bibliographical references (pages 85-86)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    ISBN: 9780833095268 , 0833095269
    Language: English
    Pages: 1 Online-Ressource (vi, 45 pages)
    Series Statement: Research report RR-1428-RC
    DDC: 610.681
    Keywords: Medical policy ; Health care reform ; Health insurance ; Medical economics ; Medical policy ; Health care reform ; Health insurance ; Medical economics ; Medical fees ; Medical care, Cost of ; Medical fees ; Medical care, Cost of ; Health Care Reform ; Delivery of Health Care ; United States ; Health Care Costs ; Medical economics ; Medical policy ; Health care reform ; Health insurance ; Medical care, Cost of ; Medical fees ; United States ; Electronic books
    Abstract: "This report describes RAND's Health Care Payment and Delivery Simulation Model (PADSIM), developed to more effectively analyze the impacts of current and future reforms to provider payment policy. These reforms include changes in how much providers are paid for their services and changes in the degree to which payments are determined by the volume of services. PADSIM offers a systematic framework for quantifying such reforms and providers' responses to them. This report discusses the motivation for building the model, describes its conceptual underpinnings, and provides an overview of how to operate the model
    Description / Table of Contents: Preface -- Figures and Tables -- Acknowledgments -- 1. Introduction -- Why Do We Need Another Model? -- Overview of PADSIM's Inputs and Outputs -- 2. PADSIM's Structure and Key Concepts -- Unit of Analysis and Scope of the Model: Crossing of State Boundaries -- Defining the Volume of Services -- Payment Policy -- Equilibrium Concept -- Congestion -- Residuals -- 3. Historical Data: Methods and Sources -- Historical Data on Hospitals -- Historical Data on Physicians -- Historical Data on Patients -- Population Projections -- Behavioral Parameters -- 4. Operating PADSIM -- 5. Examples of Simulation Results -- Pre-MACRA Baseline -- Baseline with MACRA -- Repeal the Sequester -- Projections of Payment Rates and Prospectiveness -- Simulation Results -- Appendix -- References.
    Note: "March 22, 2016"--Table of contents page , Includes bibliographical references (pages 41-45)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    ISBN: 9780833090461 , 0833095137 , 0833090461 , 9780833095138
    Language: English
    Pages: 1 Online-Ressource (xxiii, 351 pages)
    Series Statement: Research report RR-933-A
    Parallel Title: Print version Lachman, Beth E., 1960- Water management, partnerships, rights, and market trends
    Keywords: United States Environmental aspects ; United States ; Water transfer Government policy ; Management ; Water quality Management ; Water security Management ; Watershed management Political aspects ; Climatic changes ; Military bases, American Environmental aspects ; Water-supply Economic aspects ; Management ; Water transfer ; Water quality ; Water security ; Watershed management ; Climatic changes ; Military bases, American ; Water-supply ; United States ; SCIENCE ; Environmental Science ; Armed Forces ; Environmental aspects ; Climatic changes ; Military bases, American ; Environmental aspects ; Water quality management ; United States ; Electronic book
    Abstract: "This report assesses existing water market mechanisms (such as water banking and auctions) and partnership opportunities that Army installations can potentially use to improve installation water programs and their investments in water and wastewater systems. Because such mechanisms and opportunities depend on water management practices and water rights, the report also provides an overview of these areas. In addition, the report provides examples from across the United States, along with detailed case studies of these issues within Colorado and Fort Carson and within Arizona and Fort Huachuca. Water management today faces some key challenges, including aging infrastructure, water quality concerns, depleting groundwater aquifers, uncertain water supplies, pressures of population growth, climate change effects on water availability, and continued public demands for low-cost water. The traditional way of solving water problems -- by increasing access to new surface water and groundwater supplies--is often no longer viable. Such water sources are mostly allocated, and in many cases over-allocated. Today, many water managers are focused on conservation, efficient management, and accessing alternative water sources (such as treated wastewater and stormwater runoff). Water markets and partnerships are also being used in select cases. Given such water management, partnership, and market trends, the report concludes with recommendations about how Army policies and activities can be adjusted to improve installations' water security, programs, and infrastructure investments"--Publisher's description
    Description / Table of Contents: Preface -- Executive Summary -- Figures -- Tables -- Summary -- Acknowledgments -- Abbreviations -- 1. Introduction -- Background -- Purpose -- Methodology -- How to Read This Report -- 2. Background on U.S. Water Management Trends and Rights -- Historical Approaches to Water Management Focused on Accessing Water Sources -- Water Management Today Focuses on Efficient Management of Existing Resources -- Water Management Faces Key Challenges -- U.S. Water Rights -- Summary -- 3. Army Installation Water Goals, Project Funding Sources, and Partnership Opportunities -- Army Installation Water Goals -- Funding Sources for Installation Water Investments -- Opportunities for Government Water Partnerships -- Summary About Partnerships -- 4. Water Market Mechanisms -- Water Market Mechanisms Can Be an Effective Way to Allocate Water -- Water Rights Regimes Determine Market Feasibility -- Challenges in Implementing Water Market Mechanisms -- Water Transfers: Leasing and Selling Water -- Water Auctions -- Water Banks -- Block Pricing -- Water Quality Trading -- Water Market Mechanism Conclusions -- 5. Colorado and Fort Carson Water Case Study -- Colorado Water -- Fort Carson Water Case Study -- Summary -- 6. Arizona and Fort Huachuca Case Study -- Understanding the Arizona Water Situation -- Fort Huachuca Water Case Study -- Summary -- 7. Findings and Recommendations -- Water Market Findings -- Recommendations Regarding Water Markets -- Findings About Installation Water Rights -- Installation Water Rights Recommendations -- Findings About Water Partnerships -- Recommendations About Installation Water Partnerships -- Other Findings and Recommendations -- Appendix A. Select Water Banks in the United States -- Bibliography.
    Note: Includes bibliographical references (pages 310-351)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    Santa Monica, Calif : RAND
    ISBN: 9780833092496 , 0833092499 , 9780833092526 , 0833092529 , 0833092499 , 0833092529 , 9780833092496 , 9780833092526
    Language: English
    Pages: 1 Online-Ressource (1 recurso en línea (xv, 104 páginas)))
    Series Statement: Research report RR-1335-RC
    Parallel Title: Erscheint auch als Harold, Scott Warren. Getting to Yes with China in Cyberspace
    Keywords: Cyberterrorism Prevention ; Security, International 21st century ; National security ; Cyberspace Political aspects ; Cyberspace Political aspects ; Cyberterrorism ; Information warfare 21st century ; Internet in espionage ; Cyberterrorism ; Espionage, Chinese ; Cyberspace operations (Military science) ; Cyberterrorism ; Security, International ; National security ; Cyberspace ; Cyberspace ; Cyberterrorism ; Information warfare ; Internet in espionage ; Cyberterrorism ; Espionage, Chinese ; Cyberspace operations (Military science) ; Cyberspace ; Political aspects ; Cyberterrorism ; Cyberterrorism ; Prevention ; Diplomatic relations ; Espionage, Chinese ; Information warfare ; Internet in espionage ; National security ; Security, International ; Telecommunications ; Electrical & Computer Engineering ; Engineering & Applied Sciences ; COMPUTERS ; Networking ; Security ; Cyberspace operations (Military science) ; China ; United States ; United States Foreign relations 21st century ; China Foreign relations 21st century ; United States ; China
    Abstract: "Since the founding of the People's Republic of China in 1949, the U.S.-China relationship has been characterized by conflict, confrontation, and strategic mistrust. The tensions that divide the two countries have been growing in importance in recent years. Unfortunately, they apply just as much to cyberspace as to relations in the physical world. Indeed, of all the areas where the relationship between the two sides is troubled, cyberspace has been one of the most contentious. The United States and China began formal negotiations in 2013 to resolve such differences only to see them abruptly suspended in 2014, when China broke them off in response to the U.S. indictment of several Chinese military officers on charges related to cyber-espionage activities. This study explores U.S. policy options for managing relations with China over this critical policy area through the use of agreements and norms of behavior. It looks at two basic questions: Can the United States and China achieve meaningful outcomes through formal negotiations over norms and rules in cyberspace? And, if so, what areas are most likely to yield agreement and what might be exchanged for what? This analysis should be of interest to two communities: those concerned with U.S. relations with China, and those concerned with developing norms of conduct in cyberspace, notably those that enhance security and freedom"--Publisher's description
    Abstract: Ch. 1. The "cyber problem" in U.S.-China relations -- ch. 2. Coming to terms -- ch. 3. Getting to now -- ch. 4. Getting to yes? -- ch. 5. Conclusions -- Postscript.
    Abstract: Preface -- Summary -- Abbreviations -- Chapter One: The "Cyber Problem" in U.S.-China Relations: Purpose and Approach -- Organization of This Report -- Chapter Two: Coming to Terms: The Dimensions and Implications of Divergent Views of Deterrence -- Sources of Difference -- Elements of Difference -- Law and Equality -- The Application of Different Deterrence Approaches to Cyberspace: Hegemony -- Attribution Versus the Correlation of Forces -- Escalation -- Stability -- Signaling -- Overall -- Chapter Three: Getting to Now: China's Cyber Espionage -- The 2011 U.S. International Strategy for Cyberspace -- Mandiant, Snowden, and the PLA 5 -- Track Two Talks Between CICIR and CSIS -- What Could the United States Do to Discourage China's EMCE? -- Chapter Four: Getting to Yes?: Setting -- Track One Negotiations: Economically Motivated Cyber Espionage -- What Does China Want? -- Alternatives to Bilateral Negotiations with China -- The Law of Armed Conflict and the Right to Retaliate -- A Mutual Forbearance Proposal -- Chapter Five: Conclusions -- Postscript -- References.
    Note: "March 22, 2016"--Table of contents page , Incluye referencias bibliográficas
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    ISBN: 9780833095350 , 0833095811 , 0833095358 , 0833095811 , 9780833095350 , 9780833095817
    Language: English
    Pages: 1 Online-Ressource (xxv, 138 pages)
    Series Statement: Research report RR-1255-NIJ
    Keywords: Justice, Administration of ; Courts Technological innovations ; Justice, Administration of ; Courts ; Courts ; Technological innovations ; Justice, Administration of ; LAW / Criminal Law / General ; Law - U.S. - General ; Law - U.S ; Law, Politics & Government ; United States
    Abstract: "Society relies on the judicial system to play numerous roles. It is the link between law enforcement and the corrections system and serves as a check on their power over citizens. It also adjudicates civil disputes, serving as a venue for negotiation and resolution of various problems. In playing these roles, courts today are challenged by a wide range of issues, such as high caseloads, resource constraints, disparities in justice outcomes, and increasing needs to share information. For the courts to adapt to these challenges and take advantage of new opportunities to improve their ability to play their critical roles, the court system needs innovation. This report draws on published literature and new structured deliberations of a practitioner Courts Advisory Panel to frame an innovation agenda. It identifies and prioritizes potential improvements in technology, policy, and practice for the court system. Some of the top-tier needs identified by the panel and researchers include developing better tools to sort cases and match them with the process most likely to get them to an outcome efficiently and effectively, defining strategies and minimum standards for protecting the "virtual filing cabinets" that hold the court's formal records, and expanding the court-related transactions and interactions that could be done from a distance over the Internet. Such high-priority needs provide a menu of innovation options for addressing key problems or capitalizing on emerging opportunities for the court system. This report is part of a larger effort to assess and prioritize technology and related needs across the criminal justice community for the National Institute of Justice's National Law Enforcement and Corrections Technology Center system"--Publisher's description
    Description / Table of Contents: Ch. 1. Introduction -- ch. 2. The state of the U.S. court system today -- ch. 3. Court technology and practice today -- ch. 4. From courts today to courts tomorrow: identifying and prioritizing innovation needs in technology, policy, and practice -- ch. 5. Conclusions -- Appendix A. Courts advisory panel members -- Appendix B. Courts advisory panel pre-meeting questionnaire -- Appendix C. Cours advisory panel agenda -- Appendix D. Detailed methodology -- Appendix E. Full list of court needs.
    Description / Table of Contents: Preface -- Figures and Tables -- Summary -- Acknowledgments -- Abbreviations -- Chapter 1. Introduction: Considering Innovation in U.S. Courts -- About This Report -- Chapter 2: The State of the U.S. Court System Today: Key Trends and Challenges for the U.S. Court System: Court Caseloads and Resource Scarcity -- Court Security and Preparedness -- Proliferation of Problem-Solving Courts -- Racial and Economic Disparities in Case Processing and Outcomes -- Increasing Prominence of Pro Se Litigants -- Courts and Changing Technology -- Moving Forward -- Chapter 3. Court Technology and Practice Today -- A Taxonomy of Court Technology and Practice -- The State of the Art Today--Sketching the Foundation for Court Innovation: Information and Communications -- Doctrine, Tactics, Management, and Behavioral Knowledge Development and Training -- Facility Operations and Population Services -- Person-Worn Equipment and Weapons/Force -- Conclusion -- Chapter 4. From Courts Today to Courts Tomorrow: Identifying and Prioritizing Innovation Needs in Technology, Policy, and Practice -- The Courts Advisory Panel Process : Identifying Innovation Needs -- Prioritizing Innovation Needs -- Toward an Innovation Agenda for the U.S. Court System: Considering the Identified Needs as a Whole -- Identifying Priority Needs to Focus the Innovation Agenda -- Chapter 5. Conclusions: An Innovation Agenda Focused on Information and Communications Tools and Practices -- An Agenda Driven More by Adopting Existing Tools and Practices Than Developing New Ones -- Fostering Innovation in the U.S. Court System -- APPENDIXES -- References.
    Note: "May 10, 2016"--Table of contents page , Includes bibliographical references (pages 127-138)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    Santa Monica, Calif : RAND
    ISBN: 083309310X , 083309307X , 9780833093073 , 9780833093103
    Language: English
    Pages: 1 Online-Ressource (xvii, 82 pages) , color charts
    Series Statement: Research report RR-1429-RC
    Parallel Title: Erscheint auch als Martini, Jeffrey. The Outlook for Arab Gulf Cooperation
    Keywords: Gulf Cooperation Council ; Security, International ; Security, International ; Social conditions ; Strategic aspects of individual places ; Gulf Cooperation Council ; HISTORY ; General ; Economic history ; Economic policy ; International economic integration ; International economic relations ; Military policy ; Military relations ; Middle East ; Persian Gulf Region ; Middle East ; Persian Gulf States ; United States ; Persian Gulf States Economic policy ; Persian Gulf States Economic conditions ; Persian Gulf States Economic integration ; Persian Gulf Region Foreign economic relations ; Persian Gulf Region Social conditions ; United States Military relations ; Persian Gulf Region Strategic aspects ; Persian Gulf Region Military policy
    Abstract: "The cohesion of the Gulf Cooperation Council (GCC)--defined here as the ability of the six GCC member states to act together or in parallel--has significant consequences for regional stability and U.S. interests. This report examines factors that bind and divide the six GCC states--Bahrain, Kuwait, Oman, Qatar, Saudi Arabia, and the United Arab Emirates--and presents the outlook for the GCC's evolution over the next ten years. Addressing the political, economic, and security dimensions of GCC relationships, the study provides a framework for understanding intra-GCC dynamics, an expectation of future developments, and policy recommendations for enhancing stability and U.S. regional interests"--Publisher's description
    Abstract: Preface --Figures and Table --Summary --Acknowledgments --Chapter 1.Introduction --Chapter 2GCC Cohesion in Historical Perspective:The Security Dimension of GCC Cohesion --The Political Dimension of GCC Cohesion --The Economic Dimension of GCC Cohesion --Conclusion --Chapter 3.Prospects for GCC Cohesion to 2025:Security: Projected Trend Lines --Politics: Projected Trend Lines --Economics: Projected Trend Lines --Conclusion --Chapter 4.Policy Implications:Current U.S. Policy --Policy Recommendations --Limitations on U.S. Influence --Abbreviations --References.
    Note: "July 26, 2016"--Table of contents page , Includes bibliographical references (pages 73-82)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    ISBN: 0833090445 , 0833095447 , 9780833095442 , 9780833090447
    Language: English
    Pages: 1 Online-Ressource (xv, 40 pages) , 1 black and white illustration
    Series Statement: Research report RR-1003-A
    Parallel Title: Erscheint auch als Connable, Ben Stretching and exploiting thresholds for high-order war
    Keywords: Low-intensity conflicts (Military science) ; Security, International 21st century ; Security, International ; HISTORY ; Military ; Other ; TECHNOLOGY & ENGINEERING ; Military Science ; United States ; Diplomatic relations ; Low-intensity conflicts (Military science) ; Military policy ; United States Foreign relations 21st century ; United States Military policy 21st century ; Electronic book
    Abstract: "U.S. thresholds for high-order conventional and nuclear war are diffuse and dynamic, differ across regions, and are hard to enforce. Since 9/11, three of the primary nation-state competitors to the United States--Russia, China, and Iran--have successfully exploited or stretched U.S. thresholds for high-order war in order to further their strategic ends and, in the process, undermine U.S. interests. Each of these countries has made expert use of some combination of measures short of war, including economic leverage, terrorism, limited military incursions, aggressive diplomacy, and covert action, to enact its strategies. Some argue that these actions constitute a new international order, or perhaps a new way of war. They do not: Use of measures short of war is time-tested nation-state behavior. U.S. policymakers and military service leaders would benefit from additional consideration of these measures, how they are used against the United States, and how they might be defended against and exploited to further U.S. strategic interests"--Publisher's description
    Abstract: Preface --Figure --Summary --Acknowledgments --Abbreviations --1.Time-Tested Measures Short of War:Myths of the New Paradigms --2.American Understanding of Thresholds Is Impractical --3.Russia, China, and Iran Apply Measures Short of War:Example 1: Russia Exploits and Stretches Thresholds in Eastern Europe --Example 2: China Expands Its Boundaries in East Asia --Example 3: Iran in Iraq --4.Conclusion, Considerations, and Cautions:Considerations --The Risks of Improving and Increasing the Use of Measures Short of War --Bibliography.
    Note: "May 31, 2016"--Table of contents page , Includes bibliographical references (pages 31-40)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    ISBN: 9780833095213 , 0833095218
    Language: English
    Pages: 1 Online-Ressource (xxiii, 95 pages)
    Series Statement: Research report RR-1397-MCF
    DDC: 323.0420869120973
    Keywords: Immigrants Services for ; Cost effectiveness ; Immigrants ; Emigration and immigration ; Political aspects ; Social policy ; United States ; Emigration and immigration ; Economic aspects ; United States Social policy 21st century ; United States Emigration and immigration ; Economic aspects ; United States Emigration and immigration 21st century ; Political aspects ; United States ; United States ; United States ; Electronic books
    Abstract: "Traditionally, immigration policy has been a federal responsibility but, in the past decade, states have begun to adopt policies through legislation and other actions to respond to trends in unauthorized immigration. Some states have adopted restrictive policies toward unauthorized immigrants, such as expanding state and local enforcement of immigration laws, requiring employers to verify employment eligibility, and precluding access to driver's licenses or in-state tuition for public higher education. Other states have adopted policies that are unrestrictive — for example, making driver's licenses and in-state tuition available regardless of immigration status. The expanding role of states in these areas of policy raises questions about the consequences of state-level action for various stakeholders in the public and private sectors. This report features a cost-benefit framework for classifying the potential impacts of specific state-level immigration-related policies, identifying the potential domains of impact and how different stakeholders in the public and private sectors would be affected. The authors also review research literature to identify empirical evidence, where it exists, regarding the likely magnitudes of the impacts of specific state-level immigration-related policies, and use the cost-benefit framework, together with the assembled empirical evidence, to assess the rigor and relevance of existing studies of the fiscal and economic impacts of specific state-level immigration policy actions. This study should be of interest to policymakers at all levels of government, as well stakeholders in the private sector, focused on state-level immigration policy and the costs and benefits associated with state policy actions pertaining to unauthorized immigrants"--Publisher's description
    Abstract: "Traditionally, immigration policy has been a federal responsibility but, in the past decade, states have begun to adopt policies through legislation and other actions to respond to trends in unauthorized immigration. Some states have adopted restrictive policies toward unauthorized immigrants, such as expanding state and local enforcement of immigration laws, requiring employers to verify employment eligibility, and precluding access to driver's licenses or in-state tuition for public higher education. Other states have adopted policies that are unrestrictive — for example, making driver's licenses and in-state tuition available regardless of immigration status. The expanding role of states in these areas of policy raises questions about the consequences of state-level action for various stakeholders in the public and private sectors. This report features a cost-benefit framework for classifying the potential impacts of specific state-level immigration-related policies, identifying the potential domains of impact and how different stakeholders in the public and private sectors would be affected. The authors also review research literature to identify empirical evidence, where it exists, regarding the likely magnitudes of the impacts of specific state-level immigration-related policies, and use the cost-benefit framework, together with the assembled empirical evidence, to assess the rigor and relevance of existing studies of the fiscal and economic impacts of specific state-level immigration policy actions. This study should be of interest to policymakers at all levels of government, as well stakeholders in the private sector, focused on state-level immigration policy and the costs and benefits associated with state policy actions pertaining to unauthorized immigrants"--Publisher's description
    Note: "March 8, 2016"--Table of contents page , Includes bibliographical references (pages 83-95)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    ISBN: 9780833092793 , 0833092820 , 0833092790 , 9780833092823
    Language: English
    Pages: 1 Online-Ressource (xxvii, 240 pages)
    Series Statement: Research report RR-870/6-OSD
    Parallel Title: Print version Sexual Assault and Sexual Harassment in the U.S. Military. Volume 4, Investigations of Potential Bias in Estimates from the 2014 RAND Military Workplace Study
    Keywords: Soldiers ; Sex discrimination ; Social surveys ; Sexual harassment in the military ; Women soldiers ; Rape in the military ; Soldiers Crimes against ; Sex discrimination ; Social surveys ; Sexual harassment in the military ; Women soldiers Crimes against ; Rape in the military ; United States ; United States Armed Forces ; Women ; Crimes against ; Electronic book
    Abstract: Preface -- Figures and Tables -- Summary -- Acknowledgments -- Chapter One: Introduction: About the 2014 Survey -- Organization of the Report -- Statistical Analysis and Reporting Conventions Used in This Report -- Chapter Two: Follow-Up Studies of Survey Nonrespondents: Study Procedures -- Analysis of Nonresponse Bias -- Results -- Discussion and Conclusions -- Chapter Three: The Efficacy of Sampling Weights for Correcting Nonresponse Bias: Participant Characteristics Associated with Survey Nonresponse -- Association of Participant Characteristics with Survey Outcomes -- Characteristics That Could Lead to Nonresponse Bias -- The Development and Performance of RMWS Weights -- Conclusion -- Chapter Four: Investigation of Total Survey Error Using Official Records of Reported Sexual Assaults -- Chapter Five: Performance of the Sexual Assault Survey Module: Intentionality -- Offender Behavior/Lack of Consent -- Confirming Past-Year Time Frame -- Conclusions -- Chapter Six: Undercounting and Overcounting of Service Members Exposed to Sexual Assault: Inclusion of Preservice Sexual Assaults -- Exclusion of Assaults Against Members With Fewer Than Six Months of Service -- Exclusion of Members Who Recently Left the Service -- Inclusion or Exclusion of Alcohol Blackouts and Fear Responses That Immobilize -- Inclusion of Nonpenile Oral Penetration in the Penetration Counts -- Possible Exclusion of Civilian Sexual Assaults Among Reserve Component Members -- Conclusions -- Chapter Seven: Performance of the Sexual Harassment and Gender Discrimination Module: Sexual Harassment and Gender Discrimination Screening Items -- Classification of Sexual Harassment of the Sexually Hostile Work Environment Type -- Classification of Sexual Harassment of the Quid Pro Quo Type -- Classification of Gender Discrimination -- Error in Categorizing Hostile Workplace Experiences -- Conclusion -- Chapter Eight: Comparison of Events Identified by the Prior Form and RAND Forms: Some Past-Year Unwanted Sexual Contacts Counted with the Prior Form Occurred More Than a Year Ago -- The Prior Form Identifies Fewer Penetrative Sexual Assaults Than the RAND Form -- Unwanted Sexual Contacts on the Prior Form May Include Events That Are Not UCMJ Crimes -- Differences Between the WGRA and RAND Sexual Harassment Definitions -- Conclusions -- Chapter Nine: Analysis of Survey Nonconsent and Breakoff: Survey Nonconsent Rate -- Survey Breakoff Rates -- Effect of Survey Breakoff on Sample Characteristics -- Conclusions -- Chapter Ten: Service Member Tolerance of the RAND Form: Complaint Rates -- Harm to Victims -- Benefits of the New RAND Survey Using Explicit Questions to Measure Sexual Assault -- Conclusions -- Chapter Eleven: Conclusions and Recommendations for Future Administration -- s of the WGRA: Measurement Approach -- Sample Frame -- Sampling Plan -- Sample Weighting -- Improving Response Rates -- Further Study of Nonresponse Bias and Survey Error -- Frequency of WGRA Administration -- Appendixes: A. Phone Survey Script -- B. Mail Survey (Male and Female Respondent Versions) -- C. Supplementary Tables for Chapter Three -- D. Supplementary Tables for Chapter Seven -- Abbreviations -- References
    Abstract: Preface -- Figures and Tables -- Summary -- Acknowledgments -- Chapter One: Introduction: About the 2014 Survey -- Organization of the Report -- Statistical Analysis and Reporting Conventions Used in This Report -- Chapter Two: Follow-Up Studies of Survey Nonrespondents: Study Procedures -- Analysis of Nonresponse Bias -- Results -- Discussion and Conclusions -- Chapter Three: The Efficacy of Sampling Weights for Correcting Nonresponse Bias: Participant Characteristics Associated with Survey Nonresponse -- Association of Participant Characteristics with Survey Outcomes -- Characteristics That Could Lead to Nonresponse Bias -- The Development and Performance of RMWS Weights -- Conclusion -- Chapter Four: Investigation of Total Survey Error Using Official Records of Reported Sexual Assaults -- Chapter Five: Performance of the Sexual Assault Survey Module: Intentionality -- Offender Behavior/Lack of Consent -- Confirming Past-Year Time Frame -- Conclusions -- Chapter Six: Undercounting and Overcounting of Service Members Exposed to Sexual Assault: Inclusion of Preservice Sexual Assaults -- Exclusion of Assaults Against Members With Fewer Than Six Months of Service -- Exclusion of Members Who Recently Left the Service -- Inclusion or Exclusion of Alcohol Blackouts and Fear Responses That Immobilize -- Inclusion of Nonpenile Oral Penetration in the Penetration Counts -- Possible Exclusion of Civilian Sexual Assaults Among Reserve Component Members -- Conclusions -- Chapter Seven: Performance of the Sexual Harassment and Gender Discrimination Module: Sexual Harassment and Gender Discrimination Screening Items -- Classification of Sexual Harassment of the Sexually Hostile Work Environment Type -- Classification of Sexual Harassment of the Quid Pro Quo Type -- Classification of Gender Discrimination -- Error in Categorizing Hostile Workplace Experiences -- Conclusion -- Chapter Eight: Comparison of Events Identified by the Prior Form and RAND Forms: Some Past-Year Unwanted Sexual Contacts Counted with the Prior Form Occurred More Than a Year Ago -- The Prior Form Identifies Fewer Penetrative Sexual Assaults Than the RAND Form -- Unwanted Sexual Contacts on the Prior Form May Include Events That Are Not UCMJ Crimes -- Differences Between the WGRA and RAND Sexual Harassment Definitions -- Conclusions -- Chapter Nine: Analysis of Survey Nonconsent and Breakoff: Survey Nonconsent Rate -- Survey Breakoff Rates -- Effect of Survey Breakoff on Sample Characteristics -- Conclusions -- Chapter Ten: Service Member Tolerance of the RAND Form: Complaint Rates -- Harm to Victims -- Benefits of the New RAND Survey Using Explicit Questions to Measure Sexual Assault -- Conclusions -- Chapter Eleven: Conclusions and Recommendations for Future Administration -- s of the WGRA: Measurement Approach -- Sample Frame -- Sampling Plan -- Sample Weighting -- Improving Response Rates -- Further Study of Nonresponse Bias and Survey Error -- Frequency of WGRA Administration -- Appendixes: A. Phone Survey Script -- B. Mail Survey (Male and Female Respondent Versions) -- C. Supplementary Tables for Chapter Three -- D. Supplementary Tables for Chapter Seven -- Abbreviations -- References
    Note: "March 16, 2016"--Table of contents page , Includes bibliographical references (pages 237-240)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    ISBN: 9780833094292 , 083309579X , 0833094297 , 9780833095794
    Language: English
    Pages: 1 Online-Ressource (xxii, 102 pages)
    Series Statement: Research report RR-1175-OSD
    Keywords: United States Personnel management ; United States Appropriations and expenditures ; United States ; United States ; Soldiers Services for ; Costs ; Families of military personnel Services for ; Costs ; Organizational change Management ; Soldiers ; Families of military personnel ; Organizational change ; United States ; POLITICAL SCIENCE ; International Relations ; Treaties ; Armed Forces ; Cost effectiveness ; Expenditures, Public ; Organizational change ; Management ; Personnel management ; United States ; United States Armed Forces ; Cost effectiveness ; United States ; Electronic books
    Abstract: "The Department of Defense (DoD) routinely seeks ways to become more efficient and reduce costs. Each military service provides its members and their families with a wide range of services supported by resources that are paid for using congressionally appropriated funding (APF), nonappropriated funding (NAF), or a combination thereof. DoD was interested in determining whether any administrative NAF activities could be consolidated -- and, if so, whether consolidation would save costs. DoD created a task force to explore these issues and identified several areas for improvement, ranging from contracting to information technology. DoD Military Community and Family Policy asked the RAND National Defense Research Institute to review the work of the task force and provide an independent assessment of specific recommendations. In collaboration with the sponsor, RAND provided intensive analysis of recommendations in two areas for improvement that the task force identified. Researchers determined that application of consolidation could achieve improvement and savings in some NAF accounting activities, but that there is considerably less potential in the case of NAF employee benefits"--Publisher's description
    Description / Table of Contents: Preface -- Figures and Tables -- Summary -- Acknowledgments -- Abbreviations -- . 1. Introduction: Study Purpose and Focus -- Organization of the Report -- 2. Program Area Descriptions: NAF Accounting and NAF Employee Benefits: NAF Accounting -- NAF Employee Benefits -- 3. Eight Guidelines for Managing Change: Insight from Expert Literature and Case Studies: Organizational Change Literature -- Eight Guidelines for Organizational Change -- Case Studies Demonstrating Eight Change-Management Guidelines -- Lessons Learned from Case Studies -- 4. Managing Change: Analysis and Ways Forward for NAF Accounting and NAF Employee Benefits: Applying the Eight Guidelines: NAF Accounting -- Applying the Eight Guidelines: NAF Employee Benefits -- 5. NAF Accounting Consolidation: Cost Analysis and Results: NAF Accounting: Goals and Courses of Action -- Approach to Cost Estimation -- Data Collection -- Methodology -- Analysis -- Results: Costs and Savings for NAF Accounting RIE Courses of Action -- 6. NAF Employee Benefits Efficiency: Cost Analysis and Results: NAF Employee Benefits: Setting Coordination Goals -- Approach to Cost Estimation -- Data Sources -- Methodology -- Results of Cost Estimation for NAF Employee Benefits RIE Recommendations -- Total Costs for NAF Employee Benefits RIE Recommendations -- 7. Conclusions and Recommendations: Accounting -- Benefits Recommendations -- APPENDIXES: A. Semistructured Discussion Guide -- B. NAF Employee Benefits Data Gathering -- C. Background Information for Case Studies -- D. NAF Accounting Cost Detail -- References.
    Note: "May 31, 2016"--Table of contents page , Includes bibliographical references (pages 97-102)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    ISBN: 9780833095299 , 0833095293
    Language: English
    Pages: 1 Online-Ressource (13 pages)
    Series Statement: Research report RR-1478-RC
    DDC: 338.4/76292
    Keywords: Autonomous vehicles Decision making ; Autonomous vehicles ; Traffic safety ; Intelligent control systems ; Automobile industry and trade ; Motor vehicles ; Traffic safety ; Intelligent control systems ; Automobile industry and trade Technological innovations ; Motor vehicles Automatic control ; Automated vehicles Decision making ; Traffic safety ; United States ; Automobile industry and trade ; Technological innovations ; Intelligent control systems ; Motor vehicles ; Automatic control ; Electronic books
    Abstract: "How safe are autonomous vehicles? The answer is crucial for developing sound policies to govern their deployment. One proposal to assess safety is to test-drive autonomous vehicles in real traffic, observe their performance, and make statistical comparisons to human driver performance. This approach is logical, but it is practical? In this report, we calculate the number of miles that would need to be driven to provide clear statistical evidence of autonomous vehicle safety. Given that current traffic fatalities and injuries are rare events compared with vehicle miles traveled, we show that fully autonomous vehicles would have to be driven hundreds of millions of miles and sometimes hundreds of billions of miles to demonstrate their safety in terms of fatalities and injuries. Under even aggressive testing assumptions, existing fleets would take tens and sometimes hundreds of years to drive these miles--an impossible proposition if the aim is to demonstrate performance prior to releasing them for consumer use. Our findings demonstrate that developers of this technology and third-party testers cannot simply drive their way to safety. Instead, they will need to develop innovative methods of demonstrating safety and reliability. And yet, it may still not be possible to establish with certainty the safety of autonomous vehicles. Therefore, it is imperative that autonomous vehicle regulations are adaptive--designed from the outset to evolve with the technology so that society can better harness the benefits and manage the risks of these rapidly evolving and potentially transformative technologies"--Publisher's description
    Description / Table of Contents: Key Findings -- HOW MANY MILES WOULD AUTONOMOUS VEHICLES HAVE TO BE DRIVEN WITHOUT FAILURE TO DEMONSTRATE THAT THEIR FAILURE RATE IS BELOW SOME BENCHMARK? -- HOW MANY MILES WOULD AUTONOMOUS VEHICLES HAVE TO BE DRIVEN TO DEMONSTRATE THEIR FAILURE R ATE TO A PARTICULAR DEGREE OF PRECISION? -- HOW MANY MILES WOULD AUTONOMOUS VEHICLES HAVE TO BE DRIVEN TO DEMONSTRATE THAT THEIR FAILURE RATE IS STATISTICALLY SIGNIFICANTLY LOWER THAN THE HUMAN DRIVER FAILURE RATE? -- DISCUSSION AND CONCLUSIONS -- REFERENCES -- About the Authors.
    Note: "April 12, 2016"--Table of contents page , Includes bibliographical references (pages 12-13)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    ISBN: 9780833096272 , 0833096273 , 9780833094582 , 0833094580 , 0833096273 , 0833094580 , 9780833096272 , 9780833094582
    Language: English
    Pages: 1 Online-Ressource (xvi, 72 pages)
    Series Statement: Research report RR-1453/1-DHS
    DDC: 363
    Keywords: Natural disasters Social aspects ; Global warming ; Climate and civilization ; Infrastructure (Economics) Risk assessment ; Infrastructure (Economics) Security measures ; Climatic changes Effect of human beings on ; Natural disasters ; Global warming ; Climate and civilization ; Infrastructure (Economics) ; Infrastructure (Economics) ; Climatic changes ; Global warming ; Natural disasters ; Social aspects ; United States ; Climate and civilization ; Climatic changes ; Effect of human beings on ; Electronic book
    Abstract: "The United States relies on a number of infrastructure systems--roads, the electric grid, ports, telecommunications networks, refineries, and the like--for carrying out basic social and economic functions. Disruptions of these systems could impose potentially significant economic, social, environmental and national security consequences. This report serves as the technical documentation and reference document for the data, methods, and analytic approach used in the analysis of national exposures to infrastructure from natural disasters. The analysis includes 11 natural hazards and five infrastructure sectors. Analytic findings about current and future exposures of infrastructure in the United States drawn from this data analysis are documented in a separate report. The report documents how each infrastructure type and hazard is represented in data sets to act as a reference for any use of the data. For each analyzed hazard, this report includes a brief background that describes potential infrastructure impacts, and relevant metrics; a list of sources used in compiling hazard data; an overview of existing methods and applications or modifications used to analyze regional exposure to varying levels of hazard severity. When analyzing infrastructure exposures with this data, it is important to understand this information to ensure that the analysis results reflect the scope, precision, and completeness of the data. Failure to appropriately use the data could result in analysis that misrepresents exposures. The report also provides an overview of all hazard and infrastructure data used to complete this analysis. Analytic findings about current and future exposures of infrastructure in the United States drawn from this data analysis are documented in a separate report"--Publisher's description
    Description / Table of Contents: Chapter 1. Introduction -- Chapter 2. Climate-adjusted hazards Coastal flooding -- Extreme temperature -- Meteorological drought -- Wildfires -- Chapter 3. Hazards without climate adjustment -- Earthquakes -- Hurricane winds -- Ice storms -- Riverine flooding -- Tsunamis -- Tornadoes -- Landslides -- Chapter 4. Infrastructure data collection process -- Chapter 5. Approach to characterizing infrastructure vulnerability to hazards.
    Description / Table of Contents: Preface -- Figures -- Tables -- Summary -- Acknowledgments -- Abbreviations -- Chapter 1. Introduction: 1.1. References -- Chapter 2. Climate-Adjusted Hazards: 2.1. Coastal Flooding: 2.1.1. Data Sources -- 2.1.2. Analysis Methods -- 2.1.3. References -- 2.2. Extreme Temperature: 2.2.1. Data Sources -- 2.2.2. Analysis Methods -- 2.2.3. References -- 2.3. Meteorological Drought: 2.3.1. Data Sources -- 2.3.2. Analysis Methods -- 2.3.3. References -- 2.4. Wildfires: 2.4.1. Data Sources -- 2.4.2. Analysis Methods -- 2.4.3. References -- Chapter 3. Hazards Without Climate Adjustment: 3.1. Earthquakes: 3.1.1. Data Sources -- 3.1.2. Analysis Methods -- 3.1.3. References -- 3.2. Hurricane Winds: 3.2.1. Data Sources -- 3.2.2. Analysis Methods -- 3.2.3. References -- 3.3. Ice Storms: 3.3.1. Data Sources -- 3.3.2. Analysis Methods -- 3.4. Riverine Flooding: 3.4.1. Data Sources -- 3.4.2. Analysis Methods -- 3.4.3. References -- 3.5. Tsunamis: 3.5.1. Data Sources: 3.5.2. Analysis Methods -- 3.5.3. References -- 3.6. Tornadoes: 3.6.1. Data Sources: 3.6.2. Analysis Methods -- 3.6.3. References -- 3.7. Landslides: 3.7.1. Data Sources -- 3.7.2. Analysis Methods -- 3.7.3. References -- Chapter 4. Infrastructure Data Collection Process -- Chapter 5. Approach to Characterizing Infrastructure Vulnerability to Hazards.
    Note: "July 12, 2016"--Table of contents page , Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    ISBN: 9780833091512 , 0833091549 , 0833091514 , 9780833091543
    Language: English
    Pages: 1 Online-Ressource (35 pages)
    Series Statement: Strategic rethink
    Series Statement: Research reports RR-1223-RC
    Keywords: Terrorism Prevention 21st century ; International cooperation ; Civil-military relations 21st century ; Security, International 21st century ; Strategic planning 21st century ; National security 21st century ; Terrorism ; Civil-military relations ; Security, International ; Strategic planning ; National security ; Security, International ; Strategic planning ; Terrorism ; Prevention ; International cooperation ; POLITICAL SCIENCE ; Terrorism ; Armed Forces ; Appropriations and expenditures ; Armed Forces ; Operational readiness ; United States ; Civil-military relations ; National security ; United States Armed Forces ; Operational readiness ; United States Foreign relations 21st century ; Decision making ; United States Armed Forces ; Appropriations and expenditures ; United States ; United States ; United States ; Electronic book
    Abstract: "This report is the second in RAND's ongoing Strategic Rethink series, in which RAND experts explore the elements of a national strategy for the conduct of U.S. foreign and security policy in this administration and the next. The report analyzes defense options available to the United States in responding to the re-emergence of a belligerent Russia, the seizure of significant territory in Iraq and Syria by violent extremists, growing Chinese military power and assertiveness, and other threats to U.S. security and interests. It focuses on ways that the United States might adapt military instruments to meet these emerging challenges, assessing in broad terms the cost of defense investments commensurate with the interests at stake. The report argues that currently projected levels of defense spending are insufficient to meet the demands of an ambitious national security strategy"--Publisher's description
    Description / Table of Contents: Preface -- Acknowledgments -- America's Security Deficiit -- Changing Demands on Defense -- Readiness -- Enhancing Allied Defenses -- Choices for Sizing the Defense Budget -- Abbreviations -- References -- Figures -- Tables.
    Note: Includes bibliographical references (pages 33-35)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    ISBN: 9780833092663 , 0833092669 , 9780833092038 , 0833092030
    Language: English
    Pages: 1 Online-Ressource (xxviii, 186 pages)
    Series Statement: Research report (Rand Corporation) RR-1103-USMC
    Parallel Title: Print version Schaefer, Agnes Gereben Implications of integrating women into the Marine Corps infantry
    Keywords: United States Personnel management ; United States ; Women and the military ; Women soldiers ; Women in combat ; Women marines ; Women and the military ; Women soldiers ; Women in combat ; Women marines ; Women marines ; Armed Forces ; Personnel management ; Women and the military ; Women in combat ; United States ; HISTORY ; Military ; Other ; Women soldiers ; TECHNOLOGY & ENGINEERING ; Military Science ; United States ; Electronic books
    Abstract: This study for the U.S. Marine Corps consisted of four tasks: (1) review the literature on the integration of women in ground combat and other physically demanding occupations, (2) conduct interviews with representatives of organizations that have integrated women into physically demanding occupations, (3) estimate the costs of potential initiatives to promote successful gender integration, and (4) develop an approach for monitoring implementation of gender integration of the infantry. RAND researchers present a historical overview of the integration of women into the U.S. military and explore the importance of cohesion and what influences it. The gender integration experiences of foreign militaries, as well as those of domestic police and fire departments, are examined for insights on effective policies. The potential one-time and recurring costs associated with integration are estimated as well. The report culminates in a summary of previous monitoring efforts and broad strategic monitoring issues, as well as recommendations to the Marine Corps for implementation
    Abstract: This study for the U.S. Marine Corps consisted of four tasks: (1) review the literature on the integration of women in ground combat and other physically demanding occupations, (2) conduct interviews with representatives of organizations that have integrated women into physically demanding occupations, (3) estimate the costs of potential initiatives to promote successful gender integration, and (4) develop an approach for monitoring implementation of gender integration of the infantry. RAND researchers present a historical overview of the integration of women into the U.S. military and explore the importance of cohesion and what influences it. The gender integration experiences of foreign militaries, as well as those of domestic police and fire departments, are examined for insights on effective policies. The potential one-time and recurring costs associated with integration are estimated as well. The report culminates in a summary of previous monitoring efforts and broad strategic monitoring issues, as well as recommendations to the Marine Corps for implementation
    Note: "RAND National Defense Research Institute"--PDF back cover page , Includes bibliographical references (pages 173-186)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    ISBN: 9780833089007 , 083309338X , 0833089005 , 9780833093387
    Language: English
    Pages: 1 Online-Ressource (xi, 62 pages)
    Series Statement: Research reports RR-1007-AF
    Parallel Title: Erscheint auch als Snyder, Don, 1962- Improving the cybersecurity of U.S. Air Force military systems throughout their life cycles
    Keywords: United States Rules and practice ; United States ; Computer networks Security measures ; Cyberspace Security measures ; Cyberinfrastructure Security measures ; Evaluation ; Risk assessment ; Cyberterrorism Prevention 21st century ; National security 21st century ; Computer networks ; Cyberspace ; Cyberinfrastructure ; Risk assessment ; Cyberterrorism ; National security ; HISTORY ; Military ; Aviation ; Computer networks ; Security measures ; Cyberterrorism ; Prevention ; National security ; Risk assessment ; Telecommunications ; Electrical & Computer Engineering ; Engineering & Applied Sciences ; United States ; United States ; Rules ; Electronic books
    Abstract: "There is increasing concern that Air Force systems containing information technology are vulnerable to intelligence exploitation and offensive attack through cyberspace. In this report, the authors analyze how the Air Force acquisition/life-cycle management community can improve cybersecurity throughout the life cycle of its military systems. The focus is primarily on the subset of procured systems for which the Air Force has some control over design, architectures, protocols, and interfaces (e.g., weapon systems, platform information technology), as opposed to commercial, off-the-shelf information technology and business systems. The main themes in the authors' findings are that cybersecurity laws and policies were created to manage commercial, off-the-shelf information technology and business systems and do not adequately address the challenges of securing military systems. Nor do they adequately capture the impact to operational missions. Cybersecurity is mainly added on to systems, not designed in. The authors recommend 12 steps that the Air Force can take to improve the cybersecurity of its military systems throughout their life cycles"--Publisher's description
    Description / Table of Contents: Preface -- Figures -- Summary -- Acknowledgments -- 1. Cybersecurity Management: Introduction -- What Should Cybersecurity in Acquisition Achieve? -- Managing Cybersecurity Risk -- Challenges for Managing Cybersecurity -- Principles for Managing Cybersecurity -- Principles for Managing Cybersecurity -- Summary -- 2. Cybersecurity Laws and Policies -- Introduction -- Legislation and Federal Cybersecurity Policy -- Department of Defense Cybersecurity Policy -- Cybersecurity and Air Force Life-Cycle Management -- Conclusion -- 3. Findings and Recommendations: Findings -- Discussion -- Recommendations -- Closing Remarks -- Abbreviations -- References.
    Note: "October 27, 2015"--Table of contents page
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    ISBN: 9780833089090 , 0833093355 , 0833089099 , 9780833093356
    Language: English
    Pages: 1 Online-Ressource (xxiii, 99 pages)
    Series Statement: Research report RR-974-AF
    Parallel Title: Erscheint auch als Morgan, Forrest E Confronting Emergent Nuclear-Armed Regional Adversaries
    Keywords: Deterrence (Strategy) ; Conflict management 21st century ; Security, International 21st century ; Military planning 21st century ; Nuclear weapons Government policy 21st century ; Escalation (Military science) ; Nuclear arms control Government policy 21st century ; Deterrence (Strategy) ; Conflict management ; Security, International ; Military planning ; Nuclear weapons ; Escalation (Military science) ; Nuclear arms control ; Deterrence (Strategy) ; Escalation (Military science) ; Military planning ; Military policy ; Nuclear arms control ; Government policy ; Nuclear weapons ; Government policy ; Security, International ; Military Science - General ; Military & Naval Science ; Law, Politics & Government ; HISTORY ; Military ; Aviation ; United States ; Conflict management ; United States Military policy 21st century ; United States ; Electronic book
    Abstract: "Risks are increasing that the United States will find itself in confrontations with nuclear-armed regional adversaries--that is, hostile states with small nuclear arsenals. This research seeks to help the U.S. Air Force understand and prepare for such confrontations. The authors explore circumstances in which the United States might be able to neutralize a regional opponent's nuclear capabilities, and describe how and in what circumstances the United States can manage escalation while defeating nuclear-armed opponents in conventional conflict. The analysis finds that there is probably no case in which U.S. forces could neutralize an opponent's nuclear capabilities with a high enough probability of success that U.S. leaders would let them attempt it. However, U.S. forces should be able to manage escalation in some conventional conflicts, as long as the United States does not threaten the survival of the enemy regime or its nuclear deterrent forces. U.S. leaders must deter the adversary from escalating above critical U.S. thresholds and manage U.S. forces to avoid inadvertent and accidental escalation. The authors recommend that the Air Force continue research and development on methods and capabilities to find, fix, track, target, and assess enemy nuclear weapons capabilities; continue research and development on ballistic and cruise missile defenses; and conduct research on how to rebalance the force to better enable posturing airpower to conduct conventional strike operations from afar, in order to defeat a nuclear-armed regional adversary's conventional forces while operating from bases beyond the range of its conventional and nuclear strike capabilities"--Publisher's description
    Description / Table of Contents: In Memoriam -- Preface -- Figures and Table -- Summary -- Acknowledgments -- 1. An Emerging National Security Challenge: Introduction -- Purpose of This Research -- Research Methodology -- How This Report Is Organized -- 2. Bringing the Challenge into Focus: The Blurred Nuclear Threshold -- Third-Party Considerations -- These Factors Increase Risks of Conflict Escalation -- Dilemmas for U.S. Decisionmakers -- 3. Assessing the Neutralization Options: The Adversary's Range of Options -- Potential Ways to Neutralize an Adversary's Nuclear Capabilities -- Concluding Observations 4. Managing Escalation in Crisis and War -- The Principles of Threshold Management -- Managing Escalation in Three Geostrategic Challenges -- Looking at the Larger Picture -- 5. Meeting the Challenge -- The Regional Nuclear Paradox -- Crafting Strategies for Escalation Management -- Putting These Observations in Today's Geostrategic Context -- Recommendations for the U.S. Air Force -- Appendix A. The Second Nuclear Age -- Appendix B. The Inadequacy of Cold War Concepts -- Abbreviations -- References.
    Note: "October 27, 2015"--Table of contents page , Includes bibliographical references (pages 89-99)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    ISBN: 9780833091017 , 0833091018 , 9780833091024 , 0833091034 , 0833091026 , 0833089110 , 9780833089113 , 9780833091031
    Language: English
    Pages: 1 Online-Ressource (xxv, 135 pages)
    Series Statement: [Research Report] RR-1024-JNI
    Parallel Title: Erscheint auch als Libicki, Martin C Defender's dilemma
    Keywords: Computer networks Security measures ; Government policy ; Computer networks Security measures ; Industries Security measures ; Computer networks ; Computer networks ; Industries ; COMPUTERS ; Internet ; Security ; Computer networks ; Security measures ; Computer networks ; Security measures ; Government policy ; Industries ; Security measures ; United States
    Abstract: Cybersecurity is a constant, and, by all accounts growing, challenge. Although software products are gradually becoming more secure and novel approaches to cybersecurity are being developed, hackers are becoming more adept, their tools are better, and their markets are flourishing. The rising tide of network intrusions has focused organizations' attention on how to protect themselves better. This report, the second in a multiphase study on the future of cybersecurity, reveals perspectives and perceptions from chief information security officers; examines the development of network defense measures, and the countermeasures that attackers create to subvert those measures; and explores the role of software vulnerabilities and inherent weaknesses. A heuristic model was developed to demonstrate the various cybersecurity levers that organizations can control, as well as exogenous factors that organizations cannot control. Among the report's findings were that cybersecurity experts are at least as focused on preserving their organizations' reputations as protecting actual property. Researchers also found that organizational size and software quality play significant roles in the strategies that defenders may adopt. Finally, those who secure networks will have to pay increasing attention to the role that smart devices might otherwise play in allowing hackers in. Organizations could benefit from better understanding their risk posture from various actors (threats), protection needs (vulnerabilities), and assets (impact). Policy recommendations include better defining the role of government, and exploring information sharing responsibilities
    Abstract: Cover; Title Page; Copyright; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One: Introduction; Organization of This Report; Chapter Two: Chief Information Security Officers Surveyed; Common Knowledge Confirmed; Reasonable Suppositions Validated; Surprises; Some Conclusions; Chapter Three: The Efficacy of Security Systems; Measures and Countermeasures to Mitigate the Likelihood of an Attack; Attackers and Defenders Often Employ the Same Tools and Techniques; Security Product Development Has Sped Up
    Abstract: Some Conclusions Chapter Five: A Heuristic Cybersecurity Model; Model Structure; Results; Sensitivity Analyses; Conclusions; Chapter Six: Lessons for Organizations and Public Policy; Lessons for Organizations; Lessons for Public Policy; Some Conclusions; APPENDIXES; A. Questionnaire; B. Model Specification; C. Baseline Parameters; Bibliography
    Abstract: The Shift from Signature-Only to Behavior-Based Detection Having More-Sophisticated Tools Do Not Necessarily Equate to Smaller Error Rates; Measures and Countermeasures Developed to Mitigate the Impact of an Attack; Human Element Continues to Be a Great Weakness; A Cycle of Market Offerings; Ideal Solutions Can Depend on the Size of an Organization; Some Conclusions; Chapter Four: Improving Software; When Vulnerabilities Matter; Markets for Zero-Days; In the Short Run, Vulnerability Discovery Might Worsen Matters; Can Software Become Good Enough?; A Wave of (Connected) Gadgets
    Abstract: Cybersecurity is a constant, and, by all accounts growing, challenge. Although software products are gradually becoming more secure and novel approaches to cybersecurity are being developed, hackers are becoming more adept, their tools are better, and their markets are flourishing. The rising tide of network intrusions has focused organizations' attention on how to protect themselves better. This report, the second in a multiphase study on the future of cybersecurity, reveals perspectives and perceptions from chief information security officers; examines the development of network defense measures, and the countermeasures that attackers create to subvert those measures; and explores the role of software vulnerabilities and inherent weaknesses. A heuristic model was developed to demonstrate the various cybersecurity levers that organizations can control, as well as exogenous factors that organizations cannot control. Among the report's findings were that cybersecurity experts are at least as focused on preserving their organizations' reputations as protecting actual property. Researchers also found that organizational size and software quality play significant roles in the strategies that defenders may adopt. Finally, those who secure networks will have to pay increasing attention to the role that smart devices might otherwise play in allowing hackers in. Organizations could benefit from better understanding their risk posture from various actors (threats), protection needs (vulnerabilities), and assets (impact). Policy recommendations include better defining the role of government, and exploring information sharing responsibilities
    Note: "Prepared for Juniper Networks, Inc , At head of title: RAND National Security Research Division , Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...