Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Online Resource  (5)
  • E-Resource
  • Unknown
  • 2015-2019  (5)
  • 1965-1969
  • 1950-1954
  • Rand Corporation  (5)
  • National security 21st century  (5)
  • 1
    Online Resource
    Online Resource
    Santa Monica, Calif : RAND
    ISBN: 9780833094537 , 0833094351 , 083309453X , 9780833094353
    Language: English
    Pages: 1 Online-Ressource (ix, 57 pages)
    Series Statement: Perspectives PE-192-RC
    Keywords: Terrorism Risk assessment 21st century ; Intelligence service Methodology ; Terrorism Prevention 21st century ; Civil-military relations ; National security 21st century ; Terrorism ; Intelligence service ; Terrorism ; Civil-military relations ; National security ; POLITICAL SCIENCE ; Security (National & International) ; Administrative agencies ; Reorganization ; Executive advisory bodies ; Interagency coordination ; Military readiness ; Decision making ; National security ; Decision making ; United States ; Electronic book
    Abstract: "Every president needs a decisionmaking system that harnesses the full capabilities and accumulated wisdom of the U.S. government and the nation's many stakeholders. Yet national security professionals--the officials who must advise the president on the most-difficult decisions -- cite a range of structural problems that hinder effective policymaking. While a more focused and timely decisionmaking process will not necessarily improve outcomes for the United States, poor choices could be calamitous. This Perspective analyzes a range of management challenges in the national security system and presents eight recommendations for strengthening U.S. decisionmaking and oversight of policy implementation. Among the conclusions: The National Security Council staff size should be reduced to better focus on high-priority areas. Civil-military operations should be planned by a new joint office at the State Department with a military general officer as deputy. Red-team and lessons-learned efforts would help ensure that the system is adaptive and responsive. Better integration of intelligence insights and secondments of senior officials across agencies can improve the quality and coherence of decisionmaking. And the use of special envoys, or "czars," should be limited"--Publisher's description
    Description / Table of Contents: Foreword -- Acknowledgments -- Chapter 1: Introduction: Evolution of Strategies and Systems -- Chapter 2: Why Process Matters -- Chapter 3: How Did the National Security System Evolve? -- How Do Other Nations Make Decisions? -- Chapter 4: Previous Attempts at Reform -- Chapter 5: Changing Environment -- Chapter 6: Recommendations for the National Security Decision Structure -- NSC Staff Size -- Civil-Military Cooperation and Resource Sharing -- Decline of Disciplined, Organizational Messaging Systems -- Including the Right Agencies -- Integrating Intelligence Insights -- Groupthink and Embedded Assumptions -- Continuity, Integration, and Professional Staff Development -- Overuse of Czars -- Chapter 7: Conclusion: Strategizing, Decisionmaking, and Policy Implementation -- Abbreviations -- Bibliography -- About the Author.
    Note: "April 5, 2016"--Table of contents page , Includes bibliographical references (pages 51-56)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Santa Monica, Calif : RAND
    ISBN: 9780833092403 , 0833093703 , 0833092405 , 9780833093707
    Language: English
    Pages: 1 Online-Ressource (xxi, 172 pages)
    Series Statement: Research report RR-1232-OSD
    Parallel Title: Erscheint auch als McNerney, Michael J. (Michael Joseph) Defense institution building in Africa
    Keywords: Security sector 21st century ; National security 21st century ; Security sector ; National security ; Military policy ; National security ; Security sector ; Säkerhetspolitik ; Försvarspolitik ; Säkerhetssektorer ; Försvarsorganisation ; Africa ; POLITICAL SCIENCE ; International Relations ; Treaties ; Africa Military policy 21st century ; Africa ; Electronic book
    Abstract: This report assesses U.S. efforts in defense institution building (DIB) in Africa and suggests possible improvements to planning and execution. It first defines DIB and reviews some best practices from DIB and security sector reform experiences. It also highlights how DIB activities serve U.S. official strategic guidance for Africa. The report then examines how DIB is currently planned and executed in Africa and describes the range of programs that are available to U.S. planners for that purpose. It also provides a structured approach to aid in the prioritization of such programs. The report then analyzes DIB efforts in two African nations--Liberia and Libya. Finally, it examines how other institutions and countries undertake DIB by taking a closer look at the DIB activities of DoD's regional centers, as well as the relatively extensive experience of two key U.S. allies--the United Kingdom and France--in this domain"--Publisher's description
    Abstract: This report assesses U.S. efforts in defense institution building (DIB) in Africa and suggests possible improvements to planning and execution. It first defines DIB and reviews some best practices from DIB and security sector reform experiences. It also highlights how DIB activities serve U.S. official strategic guidance for Africa. The report then examines how DIB is currently planned and executed in Africa and describes the range of programs that are available to U.S. planners for that purpose. It also provides a structured approach to aid in the prioritization of such programs. The report then analyzes DIB efforts in two African nations--Liberia and Libya. Finally, it examines how other institutions and countries undertake DIB by taking a closer look at the DIB activities of DoD's regional centers, as well as the relatively extensive experience of two key U.S. allies--the United Kingdom and France--in this domain"--Publisher's description
    Note: Includes bibliographical references (pages 161-172)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9780833090874 , 0833093479 , 0833090879 , 9780833093479
    Language: English
    Pages: 1 Online-Ressource (xi, 60 pages)
    Series Statement: Research Report RR-1069-MCIA
    Parallel Title: Print version Connable, Ben From negative to positive stability
    Keywords: Forced migration ; Humanitarian assistance ; National security 21st century ; International relief ; Emigration and immigration law ; Refugees ; Forced migration ; Humanitarian assistance ; National security ; International relief ; Emigration and immigration law ; Refugees ; Economic history ; Emigration and immigration law ; Forced migration ; Humanitarian assistance ; International relief ; National security ; Refugees ; Social conditions ; Civil War (Syria : 2011- ) ; Jordan ; Syria ; POLITICAL SCIENCE ; Human Rights ; History ; Jordan Economic conditions 21st century ; Jordan Social conditions 21st century ; Syria History Civil War, 2011- ; Jordan ; Jordan ; Syria ; Electronic book
    Abstract: "As of late 2014, many American and Jordanian experts believe Jordan to be stable. Yet while Jordan is stable, it faces a range of existing and emerging challenges. These include chronic unemployment, sporadic political unrest, budget deficits, a water shortage, and geographically isolated yet troubling internal security concerns. The Syrian refugee crisis both exacerbates these challenges and offers opportunities to the government of Jordan. If the Syrian refugees remain relatively content and continue to assimilate into northern and central Jordan, they might directly benefit the Jordanian economy by stimulating growth. Donors and lenders have increased their support to Jordan, in turn offering the government an opportunity to improve the lives of both Syrian refugees and Jordanian citizens. Most important, Jordan benefits from what one expert terms negative stability: Jordanian citizens might be dissatisfied with many aspects of their government, but the chaos in neighboring states has thus far dissuaded Jordanians from pursuing civil or violent actions that might destabilize Jordan. Jordanians do not want their country to look like Syria, Iraq, or Egypt. Jordan is likely to undergo further and perhaps unforeseen challenges in 2015 and 2016, but it has the opportunity to alleviate many of its enduring challenges. If Jordan wisely invests forthcoming international refugee support, it has the opportunity to shift popular outlook from negative to positive--and more optimistic--stability. This report's analytic forecasts should help the United States determine how to support Jordan as it faces the Syrian refugee crisis"--Publisher's description
    Description / Table of Contents: Preface -- Figures and Table -- Summary -- Chapter One: Introduction to the Status of Syrian Refugees as of Late 2014: Geographic Orientation and Syrian Refugees as of Late 2014 -- Syrian Refugees in Jordan: Late 2014 -- Methodology -- Organization of This Report -- Chapter Two: Assessment of Stability and Strategic Challenges: Late 2014: Jordan's Stability as of Late 2014 -- Security from External and Internal Threats -- Political Turmoil and the Impact of the Arab Spring -- Water Shortages Contribute to Economic and Social Unease -- Economic and Financial Dependencies -- Existing Refugee and Nonnational Worker Populations -- Summary of Stability Issues as of Late 2014 -- Chapter Three: Economic Factors and Forecasted Impact: Current Economic Status and Economic Integration of Syrian Refugees -- Forecast: The Impact of Syrian Refugees on Jordan's Economic Stability -- Chapter Four: Social Factors and Forecasted Impact: Assessing Late-2014 Social Integration and Social Impacts of Syrian Refugees -- Forecast: Impact of Syrian Refugees on Jordan's Social Stability -- Chapter Five: Security Assessment and Forecasted Impact: Impact of Syrian Refugees on Jordanian Security as of Late 2014 -- Forecast: The Impact of Syrian Refugees on Jordan's Security -- Chapter Six: Conclusion, Summary Forecast, and Black Swan Warnings: Black Swans -- Abbreviations -- Bibliography.
    Note: "November 30, 2015"--Table of contents page , Includes bibliographical references (pages 39-60)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    ISBN: 9780833091512 , 0833091549 , 0833091514 , 9780833091543
    Language: English
    Pages: 1 Online-Ressource (35 pages)
    Series Statement: Strategic rethink
    Series Statement: Research reports RR-1223-RC
    Keywords: Terrorism Prevention 21st century ; International cooperation ; Civil-military relations 21st century ; Security, International 21st century ; Strategic planning 21st century ; National security 21st century ; Terrorism ; Civil-military relations ; Security, International ; Strategic planning ; National security ; Security, International ; Strategic planning ; Terrorism ; Prevention ; International cooperation ; POLITICAL SCIENCE ; Terrorism ; Armed Forces ; Appropriations and expenditures ; Armed Forces ; Operational readiness ; United States ; Civil-military relations ; National security ; United States Armed Forces ; Operational readiness ; United States Foreign relations 21st century ; Decision making ; United States Armed Forces ; Appropriations and expenditures ; United States ; United States ; United States ; Electronic book
    Abstract: "This report is the second in RAND's ongoing Strategic Rethink series, in which RAND experts explore the elements of a national strategy for the conduct of U.S. foreign and security policy in this administration and the next. The report analyzes defense options available to the United States in responding to the re-emergence of a belligerent Russia, the seizure of significant territory in Iraq and Syria by violent extremists, growing Chinese military power and assertiveness, and other threats to U.S. security and interests. It focuses on ways that the United States might adapt military instruments to meet these emerging challenges, assessing in broad terms the cost of defense investments commensurate with the interests at stake. The report argues that currently projected levels of defense spending are insufficient to meet the demands of an ambitious national security strategy"--Publisher's description
    Description / Table of Contents: Preface -- Acknowledgments -- America's Security Deficiit -- Changing Demands on Defense -- Readiness -- Enhancing Allied Defenses -- Choices for Sizing the Defense Budget -- Abbreviations -- References -- Figures -- Tables.
    Note: Includes bibliographical references (pages 33-35)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    ISBN: 9780833089007 , 083309338X , 0833089005 , 9780833093387
    Language: English
    Pages: 1 Online-Ressource (xi, 62 pages)
    Series Statement: Research reports RR-1007-AF
    Parallel Title: Erscheint auch als Snyder, Don, 1962- Improving the cybersecurity of U.S. Air Force military systems throughout their life cycles
    Keywords: United States Rules and practice ; United States ; Computer networks Security measures ; Cyberspace Security measures ; Cyberinfrastructure Security measures ; Evaluation ; Risk assessment ; Cyberterrorism Prevention 21st century ; National security 21st century ; Computer networks ; Cyberspace ; Cyberinfrastructure ; Risk assessment ; Cyberterrorism ; National security ; HISTORY ; Military ; Aviation ; Computer networks ; Security measures ; Cyberterrorism ; Prevention ; National security ; Risk assessment ; Telecommunications ; Electrical & Computer Engineering ; Engineering & Applied Sciences ; United States ; United States ; Rules ; Electronic books
    Abstract: "There is increasing concern that Air Force systems containing information technology are vulnerable to intelligence exploitation and offensive attack through cyberspace. In this report, the authors analyze how the Air Force acquisition/life-cycle management community can improve cybersecurity throughout the life cycle of its military systems. The focus is primarily on the subset of procured systems for which the Air Force has some control over design, architectures, protocols, and interfaces (e.g., weapon systems, platform information technology), as opposed to commercial, off-the-shelf information technology and business systems. The main themes in the authors' findings are that cybersecurity laws and policies were created to manage commercial, off-the-shelf information technology and business systems and do not adequately address the challenges of securing military systems. Nor do they adequately capture the impact to operational missions. Cybersecurity is mainly added on to systems, not designed in. The authors recommend 12 steps that the Air Force can take to improve the cybersecurity of its military systems throughout their life cycles"--Publisher's description
    Description / Table of Contents: Preface -- Figures -- Summary -- Acknowledgments -- 1. Cybersecurity Management: Introduction -- What Should Cybersecurity in Acquisition Achieve? -- Managing Cybersecurity Risk -- Challenges for Managing Cybersecurity -- Principles for Managing Cybersecurity -- Principles for Managing Cybersecurity -- Summary -- 2. Cybersecurity Laws and Policies -- Introduction -- Legislation and Federal Cybersecurity Policy -- Department of Defense Cybersecurity Policy -- Cybersecurity and Air Force Life-Cycle Management -- Conclusion -- 3. Findings and Recommendations: Findings -- Discussion -- Recommendations -- Closing Remarks -- Abbreviations -- References.
    Note: "October 27, 2015"--Table of contents page
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...