Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • 2010-2014  (29)
  • 1940-1944
  • Rand Corporation  (26)
  • Yidan, Zhang
  • Terrorism  (15)
  • United States Procurement  (14)
Datasource
Material
Language
Years
Year
  • 1
    ISBN: 9781844643929 , 1844643921
    Language: English
    Pages: Online Ressource
    Series Statement: China international analysis and evaluation reports
    Uniform Title: K@ong bu zhu yi su yuan 〈English〉
    Parallel Title: Erscheint auch als
    DDC: 303.625
    Keywords: Terrorism Political aspects ; Terrorism ; International relations and terrorism ; Terrorism Political aspects ; International relations and terrorism ; Terrorism -- Political aspects ; Terrorism ; SOCIAL SCIENCE ; General ; POLITICAL SCIENCE ; Political Freedom & Security ; Terrorism ; Electronic books ; Electronic books
    Abstract: The rise of terrorism has become a major factor in the destabilization of global structures since the end of the Cold War. Large-scale, high-impact terrorist attacks have occurred nearly every year since the 1990s. Many countries, regardless of their stability or volatility, have been hit by this new wave of terrorist tactics. This book argues that, in considering the increasing threat that global terrorism poses, it is necessary for us to know what terrorism is - not only its theoretical definitions, but its major features and its possible development trends in the future. The book discusses
    Note: Includes bibliographical references. - Description based on online resource; title from PDF title page (Ebsco, viewed July 8, 2014)
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [UK] : Paths International Ltd
    ISBN: 1844643921 , 9781844643929
    Language: English
    Pages: 1 online resource
    Series Statement: China international analysis and evaluation reports
    Uniform Title: Kong bu zhu yi su yuan
    DDC: 303.625
    Keywords: SOCIAL SCIENCE / General ; POLITICAL SCIENCE / Political Freedom & Security / Terrorism ; International relations and terrorism ; Terrorism ; Terrorism / Political aspects ; International relations and terrorism ; Terrorism / Political aspects ; Terrorism ; Politik ; Terrorismus ; Terrorism ; Terrorism Political aspects ; International relations and terrorism
    Description / Table of Contents: Cover; Title Page; Contents; 1 Definitions of Terrorism; 1.1 Definitions of Terrorism; 1.1.1 Major manifestations of terrorism; 1.1.2 Terror and terrorism; 1.1.3 The definition of terrorism; 1.2 The historical origins and dynamics of terrorism; 1.3 Characteristics and Root Causes of Terrorism; 1.3.1 The characteristics of terrorist behavior; 1.3.2 The reasons for the emergence of terrorism; 1.3.3 The ideology of terrorism; 1.4 Terrorism and International Relations; 1.4.1 Terrorism's impact on international and domestic political process; 1.4.2 The development trends of terrorism
    Description / Table of Contents: 2 Types of Contemporary Terrorism2.1 Extreme Nationalism; 2.2 Terrorism Stemming from Religious Extremism; 2.2.1 Terrorism in extreme Islamic fundamentalist organizations; 2.2.2 Jewish extremist terrorism; 2.2.3 The religious background of US far-right terrorists; 2.3 Cult-Based terrorism; 2.4 Far-right terrorism; 2.5 Other Types of Terrorism; 2.5.1 Ultra-left Terrorism; 2.5.2 Terrorism of the criminal underworld; 2.5.3 Other terrorist groups with smaller influence rising in some developed capitalistcountries; 3 The North-South Income Gap and Terrorism
    Description / Table of Contents: 3.1 The North-South income gap in globalization3.1.1 The Gap between the North and the South is expanding; 3.1.2 Expropriation within prosperity, exclusion within growth; 3.1.3 Globalization highlights the Gap between the North and the South.; 3.2 The North-South income gap and its inner conflicts in theworld's economy; 3.2.1 World economic structure and unbalanced development; 3.2.2 The systems of states that preserve the gap between the north and south; 3.2.3 The absence of global income distribution regulatory mechanisms; 3.3 Why a rise in international terrorism?
    Description / Table of Contents: 3.3.1 Conventional resistance movement fell into the lowest point3.3.2 Western powers and the North-South imbalance; 3.3.3 The weakening of nationhood and national legality; 3.4 Summary: Reconstruction or Extermination?; 3.4.1 Wealthy countries sharing their fortune with poor countries to adjust the income gap between the North and the South; 3.4.2 Letting the gap expand as usual
    Description / Table of Contents: The rise of terrorism has become a major factor in the destabilization of global structures since the end of the Cold War. Large-scale, high-impact terrorist attacks have occurred nearly every year since the 1990s. Many countries, regardless of their stability or volatility, have been hit by this new wave of terrorist tactics. This book argues that, in considering the increasing threat that global terrorism poses, it is necessary for us to know what terrorism is - not only its theoretical definitions, but its major features and its possible development trends in the future. The book discusses
    Note: Description based on online resource; title from PDF title page (Ebsco, viewed July 8, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 1844643921 , 9781844643929
    Language: English
    Pages: Online-Ressource
    Edition: Online-Ausg.
    Series Statement: China international analysis and evaluation reports
    Uniform Title: Kong bu zhu yi su yuan. 〈engl.〉
    Parallel Title: Print version On Terrorism: Chinese Perspectives
    DDC: 303.625
    Keywords: Terrorism Political aspects ; Terrorism ; International relations and terrorism ; Terrorism -- Political aspects ; International relations and terrorism ; Terrorism ; Political aspects ; Terrorism ; Electronic books
    Abstract: The rise of terrorism has become a major factor in the destabilization of global structures since the end of the Cold War. Large-scale, high-impact terrorist attacks have occurred nearly every year since the 1990s. Many countries, regardless of their stability or volatility, have been hit by this new wave of terrorist tactics. This book argues that, in considering the increasing threat that global terrorism poses, it is necessary for us to know what terrorism is - not only its theoretical definitions, but its major features and its possible development trends in the future. The book discusses
    Description / Table of Contents: Cover; Title Page; Contents; 1 Definitions of Terrorism; 1.1 Definitions of Terrorism; 1.1.1 Major manifestations of terrorism; 1.1.2 Terror and terrorism; 1.1.3 The definition of terrorism; 1.2 The historical origins and dynamics of terrorism; 1.3 Characteristics and Root Causes of Terrorism; 1.3.1 The characteristics of terrorist behavior; 1.3.2 The reasons for the emergence of terrorism; 1.3.3 The ideology of terrorism; 1.4 Terrorism and International Relations; 1.4.1 Terrorism's impact on international and domestic political process; 1.4.2 The development trends of terrorism
    Description / Table of Contents: 2 Types of Contemporary Terrorism2.1 Extreme Nationalism; 2.2 Terrorism Stemming from Religious Extremism; 2.2.1 Terrorism in extreme Islamic fundamentalist organizations; 2.2.2 Jewish extremist terrorism; 2.2.3 The religious background of US far-right terrorists; 2.3 Cult-Based terrorism; 2.4 Far-right terrorism; 2.5 Other Types of Terrorism; 2.5.1 Ultra-left Terrorism; 2.5.2 Terrorism of the criminal underworld; 2.5.3 Other terrorist groups with smaller influence rising in some developed capitalistcountries; 3 The North-South Income Gap and Terrorism
    Description / Table of Contents: 3.1 The North-South income gap in globalization3.1.1 The Gap between the North and the South is expanding; 3.1.2 Expropriation within prosperity, exclusion within growth; 3.1.3 Globalization highlights the Gap between the North and the South.; 3.2 The North-South income gap and its inner conflicts in theworld's economy; 3.2.1 World economic structure and unbalanced development; 3.2.2 The systems of states that preserve the gap between the north and south; 3.2.3 The absence of global income distribution regulatory mechanisms; 3.3 Why a rise in international terrorism?
    Description / Table of Contents: 3.3.1 Conventional resistance movement fell into the lowest point3.3.2 Western powers and the North-South imbalance; 3.3.3 The weakening of nationhood and national legality; 3.4 Summary: Reconstruction or Extermination?; 3.4.1 Wealthy countries sharing their fortune with poor countries to adjust the income gap between the North and the South; 3.4.2 Letting the gap expand as usual
    Note: Includes bibliographical references
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    ISBN: 9780833083869 , 0833083872 , 0833083864 , 9780833083876
    Language: English
    Pages: 1 Online-Ressource (31 pages)
    Parallel Title: Print version Jackson, Brian A., 1972- How do we know what information sharing is really worth?
    Keywords: Selective dissemination of information ; Intelligence service ; Information policy ; Communication in law enforcement ; Government information Access control ; Terrorism Prevention ; Domestic intelligence ; Exchange of government information ; Selective dissemination of information ; Intelligence service ; Information policy ; Communication in law enforcement ; Government information ; Terrorism ; Domestic intelligence ; Exchange of government information ; Selective dissemination of information ; Terrorism ; Prevention ; United States ; COMPUTERS ; Internet ; Security ; Communication in law enforcement ; Domestic intelligence ; Exchange of government information ; Government information ; Access control ; Information policy ; Intelligence service ; Electronic books
    Abstract: Since the terrorist attacks of September 11, 2001, the sharing of intelligence and law enforcement information has been a central part of U.S. domestic security efforts. Though much of the public debate about such sharing focuses on addressing the threat of terrorism, organizations at all levels of government routinely share varied types of information through multiagency information systems, collaborative groups, and other links. Given resource constraints, there are concerns about the effectiveness of information-sharing and fusion activities and, therefore, their value relative to the public funds invested in them. Solid methods for evaluating these efforts are lacking, however, limiting the ability to make informed policy decisions. Drawing on a substantial literature review and synthesis, this report lays out the challenges of evaluating information-sharing efforts that frequently seek to achieve multiple goals simultaneously; reviews past evaluations of information-sharing programs; and lays out a path to improving the evaluation of such efforts going forward
    Note: "RAND Homeland Security and Defense Center , "This research was conducted within the RAND Homeland Security and Defense Center ... a joint center of two research divisions: RAND Justice, Infrastructure, and Environment, and the RAND National Security Research Division"--Back cover , "RAND Corporation research report series."--Web Page (PDF) , "RR-380-OSD"--Page 31 , Caption title , Includes bibliographical references (pages 27-30)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    ISBN: 9780833082305 , 0833082078 , 0833082302 , 9780833082077
    Language: English
    Pages: 1 Online-Ressource (xix, 51 pages)
    Parallel Title: Print version Moore, Nancy Y., 1947- Small business and strategic sourcing
    Keywords: United States Procurement ; United States ; Small business ; Strategic planning ; Government contractors ; Government purchasing ; Defense contracts ; Small business ; Strategic planning ; Government contractors ; Government purchasing ; Defense contracts ; Small business ; Strategic planning ; United States ; BUSINESS & ECONOMICS ; Outsourcing ; Armed Forces ; Procurement ; Defense contracts ; United States ; Government contractors ; Government purchasing ; Electronic books
    Abstract: The Department of Defense (DoD) may face challenges as it attempts to maintain its goal of spending about 23 percent of its prime-contract dollars for goods and services with small businesses and at the same time apply strategic-sourcing practices to reduce total costs and improve performance in ways that will not conflict with small-business goals while making DoD purchasing more effective and efficient. Strategic sourcing practices, for example, recommend consolidation of the supply base to reduce total costs, which can lead to fewer, larger, longer-term contracts with fewer and, often, larger suppliers
    Abstract: The Department of Defense (DoD) may face challenges as it attempts to maintain its goal of spending about 23 percent of its prime-contract dollars for goods and services with small businesses and at the same time apply strategic-sourcing practices to reduce total costs and improve performance in ways that will not conflict with small-business goals while making DoD purchasing more effective and efficient. Strategic sourcing practices, for example, recommend consolidation of the supply base to reduce total costs, which can lead to fewer, larger, longer-term contracts with fewer and, often, larger suppliers
    Note: "RAND National Defense Research Institute , "Prepared for the Office of the Secretary of Defense , "This research was conducted within the Acquisition and Technology Policy Center of the RAND National Defense Research Institute"--Preface , Includes bibliographical references (pages 47-51)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    ISBN: 9780833087348 , 0833090097 , 0833087347 , 9780833090096
    Language: English
    Pages: 1 Online-Ressource (xxvii, 112 pages)
    Keywords: United States Procurement ; Cost control ; United States ; POLITICAL SCIENCE ; Political Freedom ; Armed Forces ; Procurement ; Cost control ; United States ; Electronic books
    Abstract: The report presents the results of two studies: The first compares the capabilities and development approaches used in the Joint Tactical Radio System wideband networking waveform (WNW) and the commercial long-term evolution waveform, and the second analyzes military acquisition programs that have repeatedly exceeded certain cost thresholds. The first study compares differences in system designs, technical requirements, intellectual property protection schemes, and cost in the development of WNW. It also examined how technical risks and challenging requirements contributed to schedule and cost increases. The second study attempts to identify unique characteristics of programs that overrun their budgets more than once
    Note: "Prepared for the Office of the Secretary of Defense , "This research was sponsored by the Performance Assessments and Root Cause Analysis (PARCA) office, in the Office of the Assistant Secretary of Defense for Acquisition, and conducted within the Acquisition and Technology Policy Center of the RAND National Defense Research Institute"--Preface , "RAND National Defense Research Institute , Includes bibliographical references (pages 109-112)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    ISBN: 9780833087393 , 0833090089 , 0833087398 , 9780833090089
    Language: English
    Pages: 1 Online-Ressource (xxvi, 108 pages)
    Parallel Title: Print version Arena, Mark V Management perspectives pertaining to root cause analyses of Nunn-McCurdy breaches. Volume 6 : Contractor motivations and anticipating breaches
    Keywords: United States Procurement ; United States ; Government contractors ; Motivation (Psychology) ; Defense contracts Cost effectiveness ; Government contractors ; Motivation (Psychology) ; Defense contracts ; Government contractors ; United States ; Motivation (Psychology) ; Military & Naval Science ; United States ; Law, Politics & Government ; Armed Forces ; Procurement ; Armies ; POLITICAL SCIENCE ; Political Freedom ; Electronic books
    Abstract: With an eye to making defense acquisition more effective and efficient, the authors explore defense contractor motivations in pursuing defense contracts and identify mechanisms that might more closely align those incentives with Department of Defense goals. They enumerate several motivations that drive contractors, most of which center on the financial aspects of running an enterprise. Then, they turn to the other side of the negotiating table and identify areas of influence or levers that the government can use to align the contracting process more closely with contractor motivations. They also analyze major defense acquisition programs to determine if it is possible to identify programs that might incur a future Nunn-McCurdy breach by reviewing a number of acquisition programs that have incurred breaches in the past and analyzing them for common characteristics. Their analytic framework enables oversight officials to identify programs with a greater risk of incurring a critical cost breach, which enables officials to focus more intently on a smaller set of programs and which provides hypotheses about what to look for in these programs
    Abstract: With an eye to making defense acquisition more effective and efficient, the authors explore defense contractor motivations in pursuing defense contracts and identify mechanisms that might more closely align those incentives with Department of Defense goals. They enumerate several motivations that drive contractors, most of which center on the financial aspects of running an enterprise. Then, they turn to the other side of the negotiating table and identify areas of influence or levers that the government can use to align the contracting process more closely with contractor motivations. They also analyze major defense acquisition programs to determine if it is possible to identify programs that might incur a future Nunn-McCurdy breach by reviewing a number of acquisition programs that have incurred breaches in the past and analyzing them for common characteristics. Their analytic framework enables oversight officials to identify programs with a greater risk of incurring a critical cost breach, which enables officials to focus more intently on a smaller set of programs and which provides hypotheses about what to look for in these programs
    Note: "RAND National Defense Research Institute , "This research was sponsored by OSD PARCA and conducted within the Acquisition and Technology Policy Center of the RAND National Defense Research Institute"--Preface , "Prepared for the Office of the Secretary of Defense , Includes bibliographical references (pages 103-108)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    ISBN: 9780833084033 , 0833086022 , 0833084038 , 9780833086020
    Language: English
    Pages: 1 Online-Ressource (23 pages)
    Parallel Title: Print version Silberglitt, R.S. (Richard S.) Soldier-portable battery supply
    Keywords: United States Procurement ; United States ; Business logistics ; Lithium cells ; Battery industry ; Business logistics ; Lithium cells ; Battery industry ; Battery industry ; Business logistics ; United States ; Lithium cells ; TECHNOLOGY & ENGINEERING ; Military Science ; Armed Forces ; Procurement ; Electronic books
    Abstract: Batteries are a ubiquitous presence in equipment carried by soldiers and critical to the performance of electronic devices such as radios, computers, night-vision goggles, and laser range finders. These batteries are supplied by a variety of firms, and mostly assembled from cells that are acquired through a supply chain that is driven by commercial applications to mobile phones, laptop computers, tablets, and other electronic devices, and is predominately based in Asia. RAND found that government researchers and program managers and representatives of military battery suppliers have concerns associated with this foreign-dependent supply chain. The report discusses alternative policy options to address these concerns, without evaluating the benefits versus costs of these policy options
    Note: "RAND Corporation , "RR-500-OSD"--Page 4 of cover , "This study was ... conducted within the Acquisition and Technology Policy Center of the RAND National Defense Research Institute"--Back cover , Caption title , Includes bibliographical references (pages 20-22)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    ISBN: 9780833086198 , 0833086367 , 0833086197 , 9780833086365
    Language: English
    Pages: 1 Online-Ressource (16 pages)
    Parallel Title: Print version LaTourrette, Tom, 1963- Impact on federal spending of allowing the terrorism risk insurance act to expire
    Keywords: United States Evaluation ; United States ; Risk management ; National security ; Terrorism Risk assessment ; Risk (Insurance) ; Terrorism insurance Evaluation ; Risk management ; National security ; Terrorism ; Risk (Insurance) ; Terrorism insurance ; National security ; Risk (Insurance) ; Risk management ; United States ; SOCIAL SCIENCE ; Disasters & Disaster Relief ; Evaluation ; Terrorism Risk Insurance Act of 2002 (United States) ; Electronic books
    Abstract: Congress enacted the Terrorism Risk Insurance Act (TRIA) in 2002, in response to terrorism insurance becoming unavailable or, when offered, extremely costly in the wake of the 9/11 attacks. The law creates an incentive for a functioning private terrorism insurance market by providing a government reinsurance backstop for catastrophic terrorist attack losses. Extended first in 2005 and again in 2007, TRIA is set to expire at the end of 2014, and Congress is again considering the appropriate government role in terrorism insurance markets. This policy brief examines the potential federal spending implications of allowing TRIA to expire. Combining information on federal spending through TRIA, the influence of TRIA on the availability of terrorism insurance coverage, and the relationship between uninsured losses and federal disaster assistance spending, the authors find that, in the absence of a terrorist attack, TRIA costs taxpayers relatively little, and in the event of a terrorist attack comparable to any experienced before, it is expected to save taxpayers money
    Note: "RAND Corporation , "Policy Brief , "This work was conducted within RAND Center for Catastrophic Risk Management and Compensation ... part of RAND Justice, Infrastructure, and Environment"--Back cover , Caption title , Includes bibliographical references (pages 14-16)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    ISBN: 9780833085382 , 0833085387 , 9780833085351 , 0833085352
    Language: English
    Pages: 1 Online-Ressource (21 pages)
    Parallel Title: Erscheint auch als Willis, Henry H National security perspectives on terrorism risk insurance in the United States
    Keywords: United States Evaluation ; United States ; Terrorism History 21st century ; Terrorism Risk assessment ; Risk management Evaluation ; Risk (Insurance) Evaluation ; Terrorism insurance Evaluation ; Terrorism ; Terrorism ; Risk management ; Risk (Insurance) ; Terrorism insurance ; BUSINESS & ECONOMICS ; Insurance ; General ; United States ; History ; Evaluation ; Risk management ; Evaluation ; Terrorism Risk Insurance Act of 2002 (United States) ; Terrorism ; Electronic books
    Abstract: Congress enacted the Terrorism Risk Insurance Act (TRIA) in 2002, in response to terrorism insurance becoming unavailable or, when offered, extremely costly in the wake of the 9/11 attacks. The law provides a government reinsurance backstop in the case of a terrorist attack by providing mechanisms for avoiding an immediate drawdown of capital for insured losses or possibly covering the most extreme losses. Extended first in 2005 and again in 2007, TRIA is set to expire at the end of 2014, and Congress is again reconsidering the appropriate government role in terrorism insurance markets. This policy brief examines the potential national security implications of allowing TRIA to expire. Examining the history of terrorism in the United States since the passage of TRIA and reviewing counterterrorism studies, the authors find that terrorism remains a real national security threat, but one that is very difficult for insurers to model the risk of. They also find that terrorism risk insurance can contribute to making communities more resilient to terrorism events, so, to the extent that terrorism insurance is more available with TRIA than without it, renewing the legislation would contribute to improved national security
    Note: "Policy Brief , "This work was conducted within the RAND Center for Catastrophic Risk Management and Compensation ... part of RAND Justice, Infrastructure, and Environment"--Back cover , "RAND Corporation , Caption title , Includes bibliographical references (pages 19-21)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    ISBN: 9780833080929 , 0833083368 , 083308092X , 9780833083364
    Language: English
    Pages: 1 Online-Ressource (xliii, 258 pages)
    Parallel Title: Available in another form
    Parallel Title: Available in another form
    Keywords: Violence Forecasting ; Criminal behavior Research ; Methodology ; Terrorists Psychology ; Terrorists Social conditions ; Criminal behavior, Prediction of ; Terrorism Prevention ; Violence ; Criminal behavior ; Terrorists ; Terrorists ; Criminal behavior, Prediction of ; Terrorism ; Behavioral Research ; Behavioral Sciences ; Crime ; Criminology ; Disciplines and Occupations ; Natural Science Disciplines ; Psychiatry and Psychology ; Research ; Science ; Social Problems ; Social Sciences ; Sociology ; Terrorism ; Violence ; Anthropology, Education, Sociology and Social Phenomena ; Behavioral Disciplines and Activities ; Criminal behavior, Prediction of ; Social Welfare & Social Work ; Social Sciences ; SOCIAL SCIENCE ; Criminology ; Criminology, Penology & Juvenile Delinquency ; Terrorists ; Psychology ; Criminal behavior ; Research ; Methodology ; Terrorism ; Prevention ; Violence ; Forecasting ; Electronic books
    Abstract: Government organizations have put substantial effort into detecting and thwarting terrorist and insurgent attacks by observing suspicious behaviors of individuals at transportation checkpoints and elsewhere. This report reviews the scientific literature relating to observable, individual-level behavioral indicators that might-along with other information-help detect potential violent attacks. The report focuses on new or nontraditional technologies and methods, most of which exploit (1) data on communication patterns, (2) "pattern-of-life" data, and/or (3) data relating to body movement and physiological state. To help officials set priorities for special attention and investment, the report proposes an analytic framework for discussion and evaluation; it also urges investment in cost-effectiveness analysis and more vigorous, routine, and sustained efforts to measure real-world effectiveness of methods. One cross-cutting conclusion is that methods for behavioral observation are typically not reliable enough to stand alone; success in detection will depend on information fusion across types of behaviors and time. How to accomplish such fusion is understudied. Finally, because many aspects of using behavioral observations are highly controversial, both scientifically and because of privacy and civil-liberties concerns, the report sharpens the underlying perspectives and suggests ways to resolve some of the controversy while significantly mitigating problems that definitely exist
    Abstract: Government organizations have put substantial effort into detecting and thwarting terrorist and insurgent attacks by observing suspicious behaviors of individuals at transportation checkpoints and elsewhere. This report reviews the scientific literature relating to observable, individual-level behavioral indicators that might-along with other information-help detect potential violent attacks. The report focuses on new or nontraditional technologies and methods, most of which exploit (1) data on communication patterns, (2) "pattern-of-life" data, and/or (3) data relating to body movement and physiological state. To help officials set priorities for special attention and investment, the report proposes an analytic framework for discussion and evaluation; it also urges investment in cost-effectiveness analysis and more vigorous, routine, and sustained efforts to measure real-world effectiveness of methods. One cross-cutting conclusion is that methods for behavioral observation are typically not reliable enough to stand alone; success in detection will depend on information fusion across types of behaviors and time. How to accomplish such fusion is understudied. Finally, because many aspects of using behavioral observations are highly controversial, both scientifically and because of privacy and civil-liberties concerns, the report sharpens the underlying perspectives and suggests ways to resolve some of the controversy while significantly mitigating problems that definitely exist
    Note: "RAND National Security Research Division , "The research was conducted within the International Security and Defense Policy Center of the RAND National Defense Research Institute"--Title page verso , Includes bibliographical references (pages 225-258)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    ISBN: 9780833082091 , 0833083465 , 0833082094 , 9780833083463
    Language: English
    Pages: 1 Online-Ressource (19 pages)
    Series Statement: Rand Corporation research report series RR-415-OSD
    Keywords: Qaeda in the Islamic Maghreb ; Qaeda in the Islamic Maghreb ; Terrorism ; Terrorism ; Terrorism ; North Africa ; Qaeda in the Islamic Maghreb ; HISTORY ; Africa ; North ; Electronic books
    Abstract: Since the 9/11 attacks, America's understanding of Al Qaeda has evolved along with the organization itself. In recent years attention to Al Qaeda's so called "affiliates" in Iraq, Yemen, Somalia, and most recently Syria has overtaken concern about Al Qaeda's core in Pakistan. The North African terrorist organization Al Qaeda in the Islamic Maghreb (AQIM) is one such affiliate. Many Americans first became familiar with AQIM when media reports linked it loosely to the attacks on the U.S. diplomatic compounds in Benghazi, Libya on 9/11/12 that killed U.S. Ambassador to Libya Chris Stevens. The horrific hostage crisis at an Algerian gas facility in January 2013, which was far more closely linked to the group, further increased concern about the threat it posed and played into anxieties about what many viewed as a resurgent Al Qaeda threat. This assessment of the threat from AQIM is based on an analysis of available open-source documentation. The authors find that although AQIM is a serious regional problem, its similarity to the Al Qaeda of Osama Bin Laden should not be exaggerated, as AQIM does not currently seem bent on global jihad. In most situations, the wisest policy responses to the AQIM threat will focus on supporting local actors and U.S. allies in Europe
    Abstract: Since the 9/11 attacks, America's understanding of Al Qaeda has evolved along with the organization itself. In recent years attention to Al Qaeda's so called "affiliates" in Iraq, Yemen, Somalia, and most recently Syria has overtaken concern about Al Qaeda's core in Pakistan. The North African terrorist organization Al Qaeda in the Islamic Maghreb (AQIM) is one such affiliate. Many Americans first became familiar with AQIM when media reports linked it loosely to the attacks on the U.S. diplomatic compounds in Benghazi, Libya on 9/11/12 that killed U.S. Ambassador to Libya Chris Stevens. The horrific hostage crisis at an Algerian gas facility in January 2013, which was far more closely linked to the group, further increased concern about the threat it posed and played into anxieties about what many viewed as a resurgent Al Qaeda threat. This assessment of the threat from AQIM is based on an analysis of available open-source documentation. The authors find that although AQIM is a serious regional problem, its similarity to the Al Qaeda of Osama Bin Laden should not be exaggerated, as AQIM does not currently seem bent on global jihad. In most situations, the wisest policy responses to the AQIM threat will focus on supporting local actors and U.S. allies in Europe
    Note: Includes bibliographical references (pages 17-19)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    ISBN: 9780833081650 , 0833084674 , 0833081659 , 9780833084675
    Language: English
    Pages: 1 Online-Ressource (xv, 27 pages)
    Series Statement: Research report
    Keywords: United States Weapons systems ; Maintenance and repair ; United States Equipment ; Maintenance and repair ; United States Operational readiness ; United States Procurement ; United States ; United States ; United States ; United States ; F-35 (Military aircraft) Maintenance and repair ; F-35 (Military aircraft) ; Armed Forces ; Equipment and supplies ; Maintenance and repair ; Armed Forces ; Operational readiness ; Armed Forces ; Procurement ; Armed Forces ; Weapons systems ; Maintenance and repair ; Military & Naval Science ; Law, Politics & Government ; Air Forces ; United States ; TRANSPORTATION ; Aviation ; Repair & Maintenance ; Electronic books
    Abstract: "The U.S. Air Force has long struggled to incorporate new weapon system logistics requirements and support system design considerations into its broader sustainment enterprise early in the acquisition process. To help inform Air Force decisionmaking with regard to sustainment sourcing, RAND Project AIR FORCE researchers explored and adapted lessons from the transaction cost accounting literature. The result is a powerful economic-based framework that has three primary benefits when it comes to addressing sustainment planning challenges: It is a repeatable, analytically driven decision tool that does not require large amounts of data; it considers repair source decisionmaking in the context of the broader Air Force enterprise; and it is potentially applicable to other aspects of sustainment planning, such as managing government-mandated repair sourcing mixes and informing other Air Force sustainment community responsibilities. This report demonstrates how the framework can be used to select among depot maintenance strategies by applying it to the F-35 Joint Strike Fighter, the largest acquisition program in U.S. Department of Defense history. Although the U.S. government will retain the capability to perform the range of depot-level repairs for the F-35, 40 percent of the workload -- known as "above core" -- can be considered for sourcing to an organic Air Force facility, another military service's facility, a foreign partner, or the private sector. The framework helps planners visualize program data and compare new acquisition programs with legacy Air Force systems. In this way, it offers the Air Force additional leverage in responding to technology developments and vetting contractors's engineering, reliability, and maintainability projections for new weapon systems."--Page 4 of cover
    Abstract: "The U.S. Air Force has long struggled to incorporate new weapon system logistics requirements and support system design considerations into its broader sustainment enterprise early in the acquisition process. To help inform Air Force decisionmaking with regard to sustainment sourcing, RAND Project AIR FORCE researchers explored and adapted lessons from the transaction cost accounting literature. The result is a powerful economic-based framework that has three primary benefits when it comes to addressing sustainment planning challenges: It is a repeatable, analytically driven decision tool that does not require large amounts of data; it considers repair source decisionmaking in the context of the broader Air Force enterprise; and it is potentially applicable to other aspects of sustainment planning, such as managing government-mandated repair sourcing mixes and informing other Air Force sustainment community responsibilities. This report demonstrates how the framework can be used to select among depot maintenance strategies by applying it to the F-35 Joint Strike Fighter, the largest acquisition program in U.S. Department of Defense history. Although the U.S. government will retain the capability to perform the range of depot-level repairs for the F-35, 40 percent of the workload -- known as "above core" -- can be considered for sourcing to an organic Air Force facility, another military service's facility, a foreign partner, or the private sector. The framework helps planners visualize program data and compare new acquisition programs with legacy Air Force systems. In this way, it offers the Air Force additional leverage in responding to technology developments and vetting contractors's engineering, reliability, and maintainability projections for new weapon systems."--Page 4 of cover
    Note: "RAND Project Air Force , Includes bibliographical references (pages 25-27)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    ISBN: 9780833080608 , 0833084801 , 0833080601 , 9780833084804
    Language: English
    Pages: 1 Online-Ressource (44 pages)
    Keywords: United States Appropriations and expenditures ; United States Procurement ; Costs ; Evaluation ; Methodology ; United States ; United States ; Weapons systems Costs ; Forecasting ; Systems integration Risk assessment ; Methodology ; Weapons systems ; Systems integration ; TECHNOLOGY & ENGINEERING ; Military Science ; United States ; United States ; Expenditures, Public ; United States Armed Forces ; Weapons systems ; Costs ; Evaluation ; Methodology ; United States ; Electronic books
    Abstract: Implementing risk management principles to manage large defense acquisition programs is a priority for the U.S. defense acquisition community. To assist those decisionmakers responsible for identifying the risk associated with major weapons programs, RAND researchers developed a methodology and accompanying Excel, information-based risk tool (the ⁰́Assessor Tool⁰́₊). The Assessor Tool offers an Office of the Secretary of Defense (OSD)-level approach to the evaluation and measurement of system integration risk. That is, it is meant for assessors, such as OSD personnel, who may not be especially familiar with the specific program under evaluation but still may need to make judgments about the program⁰́₉s risk. It is based on a tractable and comprehensive set of questions that can help evaluate integration risk at each point in the acquisition process. More specifically, the tool enables users to see how well integration risk is being managed by providing a standards-based valuation of integration issues that can lead to cost growth, schedule growth, and program performance. The users⁰́₉ manual for the Assessor Tool is available in a companion document, An Excel Tool to Assess Acquisition Program Risk (by Lauren A. Fleishman-Mayer, Mark V. Arena, and Michael E. McMahon, TL-113-OSD, 2013). The Assessor Tool and its methodology may also be generalizable to an entire set of information-based risk assessment applications. Overall, the methodology and tool have many strengths, including being based on well-grounded theories, allowing for reproducibility and traceability, and the extensive flexibility to be used to evaluate risk for many different types of programs. To provide a benchmarking and validation of the risk scores calculated by the tool, future work could include the tool⁰́₉s validation by tracking its output against a program⁰́₉s performance
    Abstract: Implementing risk management principles to manage large defense acquisition programs is a priority for the U.S. defense acquisition community. To assist those decisionmakers responsible for identifying the risk associated with major weapons programs, RAND researchers developed a methodology and accompanying Excel, information-based risk tool (the ⁰́Assessor Tool⁰́₊). The Assessor Tool offers an Office of the Secretary of Defense (OSD)-level approach to the evaluation and measurement of system integration risk. That is, it is meant for assessors, such as OSD personnel, who may not be especially familiar with the specific program under evaluation but still may need to make judgments about the program⁰́₉s risk. It is based on a tractable and comprehensive set of questions that can help evaluate integration risk at each point in the acquisition process. More specifically, the tool enables users to see how well integration risk is being managed by providing a standards-based valuation of integration issues that can lead to cost growth, schedule growth, and program performance. The users⁰́₉ manual for the Assessor Tool is available in a companion document, An Excel Tool to Assess Acquisition Program Risk (by Lauren A. Fleishman-Mayer, Mark V. Arena, and Michael E. McMahon, TL-113-OSD, 2013). The Assessor Tool and its methodology may also be generalizable to an entire set of information-based risk assessment applications. Overall, the methodology and tool have many strengths, including being based on well-grounded theories, allowing for reproducibility and traceability, and the extensive flexibility to be used to evaluate risk for many different types of programs. To provide a benchmarking and validation of the risk scores calculated by the tool, future work could include the tool⁰́₉s validation by tracking its output against a program⁰́₉s performance
    Note: "This research was conducted within the Acquisition and Technology Policy Center of the RAND National Defense Research Institute"--Preface , "RAND National Security Research Division , Includes bibliographical references (pages 25-26) , Title from title screen (viewed on October 24, 2013)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    ISBN: 9780833074560 , 0833084887 , 0833074563 , 9780833084880
    Language: English
    Pages: 1 Online-Ressource (xxv, 51 pages)
    Parallel Title: Erscheint auch als Lorell, Mark A., 1947- Do joint fighter programs save money?
    Keywords: United States Procurement ; Costs ; United States ; F-35 (Military aircraft) ; Fighter planes Costs ; Life cycle costing ; F-35 (Military aircraft) ; Fighter planes ; Life cycle costing ; Law, Politics & Government ; United States ; F-35 (Military aircraft) ; Fighter planes ; Costs ; Life cycle costing ; United States ; HISTORY ; Military ; Aviation ; Air Forces ; Armed Forces ; Procurement ; Costs ; Military & Naval Science ; Electronic books
    Abstract: In the past 50 years, the U.S. Department of Defense has pursued numerous joint aircraft programs, the largest and most recent of which is the F-35 Joint Strike Fighter (JSF). Joint aircraft programs are thought to reduce Life Cycle Cost (LCC) by eliminating duplicate research, development, test, and evaluation efforts and by realizing economies of scale in procurement, operations, and support. But the need to accommodate different service requirements in a single design or common design family can lead to greater program complexity, increased technical risk, and common functionality or increased weight in excess of that needed for some variants, potentially leading to higher overall cost, despite these efficiencies. To help Air Force leaders (and acquisition decisionmakers in general) select an appropriate acquisition strategy for future combat aircraft, this report analyzes the costs and savings of joint aircraft acquisition programs. The project team examined whether historical joint aircraft programs have saved LCC compared with single-service programs. In addition, the project team assessed whether JSF is on track to achieving the joint savings originally anticipated at the beginning of full-scale development. Also examined were the implications of joint fighter programs for the health of the industrial base and for operational and strategic risk
    Abstract: In the past 50 years, the U.S. Department of Defense has pursued numerous joint aircraft programs, the largest and most recent of which is the F-35 Joint Strike Fighter (JSF). Joint aircraft programs are thought to reduce Life Cycle Cost (LCC) by eliminating duplicate research, development, test, and evaluation efforts and by realizing economies of scale in procurement, operations, and support. But the need to accommodate different service requirements in a single design or common design family can lead to greater program complexity, increased technical risk, and common functionality or increased weight in excess of that needed for some variants, potentially leading to higher overall cost, despite these efficiencies. To help Air Force leaders (and acquisition decisionmakers in general) select an appropriate acquisition strategy for future combat aircraft, this report analyzes the costs and savings of joint aircraft acquisition programs. The project team examined whether historical joint aircraft programs have saved LCC compared with single-service programs. In addition, the project team assessed whether JSF is on track to achieving the joint savings originally anticipated at the beginning of full-scale development. Also examined were the implications of joint fighter programs for the health of the industrial base and for operational and strategic risk
    Note: "RAND Project Air Force , Includes bibliographical references (pages 41-51)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    ISBN: 9780833079190 , 0833083201
    Language: English
    Pages: 1 Online-Ressource (xxi, 88 pages)
    DDC: 303.6/2501
    Keywords: Terrorism ; Terrorism ; Insurgency ; Electronic books
    Abstract: Introduction -- Specifying the Model -- Implementation in a High-Level Language -- Looking Ahead to Exploratory Analysis Under Uncertainty -- Using the Model for Knowledge Elicitation, Discussion, and Diagnosis -- Appendix A: Primer on Factor Trees (a reprint) -- Appendix B: Verification and Validation -- Appendix C: Eliciting Factor Values -- Appendix D: Mathematics for "And" and "Or" Relationships
    URL: Volltext  (Kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    ISBN: 9780833080585 , 0833083260 , 083308058X , 9780833083265
    Language: English
    Pages: 1 Online-Ressource (xx, 73 pages)
    Series Statement: Rand Corporation research report series RR-110-OSD
    Parallel Title: Erscheint auch als Gates, Susan M., 1968- Analyses of the Department of Defense acquisition workforce
    Keywords: United States Procurement ; United States Personnel management ; United States ; United States ; Civil service ; Civil service ; Military & Naval Science ; Law, Politics & Government ; Military Administration ; United States ; COMPUTERS ; Data Modeling & Design ; Armed Forces ; Procurement ; Civil service ; Personnel management ; United States ; Electronic books
    Abstract: The organic defense acquisition workforce consists of military personnel and Department of Defense civilian personnel who provide the management, technical, and business capabilities needed to oversee defense acquisition programs from start to finish. This workforce must itself be managed so that the right numbers of the right personnel are in the right positions at the right time. Since 2006, RAND has been helping develop data-based tools to support analysis of this workforce. This volume updates a 2008 report by documenting revisions to methods, providing descriptive information on the workforce through fiscal year 2011, and providing a user's manual for a model that can help managers project workforce needs through 2021 under different assumptions about the future. The report illustrates the use of the model
    Abstract: The organic defense acquisition workforce consists of military personnel and Department of Defense civilian personnel who provide the management, technical, and business capabilities needed to oversee defense acquisition programs from start to finish. This workforce must itself be managed so that the right numbers of the right personnel are in the right positions at the right time. Since 2006, RAND has been helping develop data-based tools to support analysis of this workforce. This volume updates a 2008 report by documenting revisions to methods, providing descriptive information on the workforce through fiscal year 2011, and providing a user's manual for a model that can help managers project workforce needs through 2021 under different assumptions about the future. The report illustrates the use of the model
    Note: "National Defense Research Institute , "Prepared for the Office of the Secretary of Defense , Includes bibliographical references (pages 71-73)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    ISBN: 9780833079329 , 0833084879 , 0833079328 , 9780833084873
    Language: English
    Pages: 1 Online-Ressource (xviii, 66 pages)
    Series Statement: RAND Corporation monograph series MG1225z1
    Parallel Title: Erscheint auch als Lorell, Mark A Do joint fighter programs save money?
    Keywords: United States Procurement ; United States ; Fighter planes Costs ; Fighter planes ; Law, Politics & Government ; TECHNOLOGY & ENGINEERING ; Military Science ; Armed Forces ; Procurement ; United States ; Fighter planes ; Costs ; Air Forces ; Military & Naval Science ; United States ; Electronic books
    Abstract: Appendix A: Calculation of Theoretical Maximum Joint Aircraft Acquisition Program Savings -- Appendix B: Calculation of the Joint Acquisition Cost-Growth Premium from Historical Aircraft Programs -- Appendix C: Calculation of Maximum Joint O&S Savings from an "Ideal" Joint Fighter Program -- Appendix D: Exploring the Magnitude of Joint O&S Savings Needed to Offset Joint Acquisition Cost-Growth Premium -- Appendix E: Primary Methodology for Comparing JSF Costs with Those of Three Notional Single-Service Fighters -- Appendix F: Alternative Procurement Methodology and Results for Comparing JSF Costs with Those of Three Notional Single-Service Fighters
    Abstract: Appendix A: Calculation of Theoretical Maximum Joint Aircraft Acquisition Program Savings -- Appendix B: Calculation of the Joint Acquisition Cost-Growth Premium from Historical Aircraft Programs -- Appendix C: Calculation of Maximum Joint O&S Savings from an "Ideal" Joint Fighter Program -- Appendix D: Exploring the Magnitude of Joint O&S Savings Needed to Offset Joint Acquisition Cost-Growth Premium -- Appendix E: Primary Methodology for Comparing JSF Costs with Those of Three Notional Single-Service Fighters -- Appendix F: Alternative Procurement Methodology and Results for Comparing JSF Costs with Those of Three Notional Single-Service Fighters
    Note: Includes bibliographical references (pages 55-66)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    ISBN: 9780833082053 , 0833083791 , 0833082051 , 9780833083791
    Language: English
    Pages: 1 Online-Ressource (xxx, 115 pages)
    Parallel Title: Print version Arena, Mark V Management perspectives pertaining to root cause analyses of Nunn-McCurdy breaches Vol. 4
    Keywords: United States Procurement ; Costs ; United States ; Defense contracts ; Defense contracts ; Law, Politics & Government ; United States ; Armed Forces ; Weapons systems ; Costs ; United States ; Armies ; Military & Naval Science ; POLITICAL SCIENCE ; Political Freedom ; Armed Forces ; Procurement ; Costs ; Defense contracts ; United States Armed Forces ; Equipment ; Costs ; United States Armed Forces ; Weapons systems ; Costs ; United States ; United States ; Electronic books
    Abstract: Concern with cost overruns in major defense acquisition programs led Congress to direct investigation of the root causes of overruns in programs that have breached Nunn-McCurdy thresholds. The authors calculate program manager tenure to determine whether tenures have lengthened since policy guidance was issued in 2005 and 2007. They also address the question of whether existing decentralized systems used to track the cost growth and performance of acquisition category II programs are sufficient or whether additional centralized guidance and control from the Office of the Secretary of Defense are warranted. A third question deals with the management of cost and schedule risk and whether the identification of key assumptions, which the authors call framing assumptions, could be a useful risk management tool
    Abstract: Concern with cost overruns in major defense acquisition programs led Congress to direct investigation of the root causes of overruns in programs that have breached Nunn-McCurdy thresholds. The authors calculate program manager tenure to determine whether tenures have lengthened since policy guidance was issued in 2005 and 2007. They also address the question of whether existing decentralized systems used to track the cost growth and performance of acquisition category II programs are sufficient or whether additional centralized guidance and control from the Office of the Secretary of Defense are warranted. A third question deals with the management of cost and schedule risk and whether the identification of key assumptions, which the authors call framing assumptions, could be a useful risk management tool
    Note: "RAND National Defense Research Institute , Includes bibliographical references (pages 109-115)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    ISBN: 9780833080233 , 0833083732 , 0833080237 , 9780833083739
    Language: English
    Pages: 1 Online-Ressource (xv, 41 pages)
    Keywords: United States Procurement ; United States Management ; United States Appropriations and expenditures ; United States ; United States ; United States ; Airplanes, Military Costs ; Airplanes, Military ; Armed Forces ; Appropriations and expenditures ; Armed Forces ; Management ; Armed Forces ; Procurement ; Military & Naval Science ; Law, Politics & Government ; Air Forces ; United States ; United States ; HISTORY ; Military ; Aviation ; Airplanes, Military ; Costs ; Electronic books
    Abstract: The U.S. Air Force is facing a number of challenges as a result of the current defense budget downturn along with the uncertainty of its timing and magnitude. RAND examined the challenge of modernizing the Air Force's aircraft fleet while trying to sustain the industrial base with limited funding. Complicating this challenge is that the pattern of Air Force spending has shifted dramatically away from new aircraft procurement, and a competitor with significant technical and economic capability has emerged. There is a need for careful strategic management of investment choices--and this goes beyond just aircraft. The Air Force will first need to define its capability priorities that fit within budget constraints, then use those priorities to shape a budget strategy. RAND considered six budget strategies for aircraft procurement: from a new high-tech fleet to sustaining and modifying the existing one. Each strategy under a constrained spending future results in challenges and issues for the industrial base. The Air Force will need to help mitigate industrial base problems that result from their chosen budget strategy--but some issues may be beyond their control. There are lessons from foreign acquisitions that the Air Force can leverage to avoid pitfalls. Most importantly, shortfalls in both industry and government skill bases can cause significant problems later during execution. Finding ways to sustain key skills during a spending downturn will be important for the future and potentially produce longer-term savings
    Abstract: The U.S. Air Force is facing a number of challenges as a result of the current defense budget downturn along with the uncertainty of its timing and magnitude. RAND examined the challenge of modernizing the Air Force's aircraft fleet while trying to sustain the industrial base with limited funding. Complicating this challenge is that the pattern of Air Force spending has shifted dramatically away from new aircraft procurement, and a competitor with significant technical and economic capability has emerged. There is a need for careful strategic management of investment choices--and this goes beyond just aircraft. The Air Force will first need to define its capability priorities that fit within budget constraints, then use those priorities to shape a budget strategy. RAND considered six budget strategies for aircraft procurement: from a new high-tech fleet to sustaining and modifying the existing one. Each strategy under a constrained spending future results in challenges and issues for the industrial base. The Air Force will need to help mitigate industrial base problems that result from their chosen budget strategy--but some issues may be beyond their control. There are lessons from foreign acquisitions that the Air Force can leverage to avoid pitfalls. Most importantly, shortfalls in both industry and government skill bases can cause significant problems later during execution. Finding ways to sustain key skills during a spending downturn will be important for the future and potentially produce longer-term savings
    Note: "RAND Project Air Force , Includes bibliographical references (pages 39-41)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    Santa Monica, Calif : RAND
    ISBN: 9780833076878 , 0833083597 , 0833076876 , 9780833083593
    Language: English
    Pages: 1 Online-Ressource (xxii, 85 pages)
    Series Statement: Rand Corporation technical report series TR-1286-OSD
    Parallel Title: Print version Assessment of the civilian acquisition workforce personnel demonstration project
    Keywords: United States Procurement ; Management ; United States Personnel management ; Evaluation ; United States ; United States ; Human capital Government policy ; Civil service Personnel management ; Human capital ; Civil service ; Civil service ; Personnel management ; Human capital ; Government policy ; Personnel management ; Evaluation ; Military & Naval Science ; Law, Politics & Government ; Military Administration ; United States ; United States ; BUSINESS & ECONOMICS ; Decision-Making & Problem Solving ; Armed Forces ; Procurement ; Management ; Electronic books
    Abstract: "The vast majority of U.S. Department of Defense (DoD) and federal civilian employees work on the General Schedule (GS) personnel system. However, some concerns have been raised about the GS system, including perceptions that poorly performing employees are tolerated for extended periods of time and that monetary rewards are not directly linked to performance. In response to concerns of this nature, Congress has authorized some demonstration projects, in which additional flexibilities are provided, intending to produce better outcomes than if the employees were in the GS system. One such demonstration project, the DoD Civilian Acquisition Workforce Personnel Demonstration Project (AcqDemo), is the subject of this report. Implemented on February 7, 1999, AcqDemo is an effort to reengineer the civilian personnel system to meet the needs of the acquisition workforce and to facilitate the fulfillment of the DoD acquisition mission. Congress required an independent assessment of the program against 12 criteria by September 30, 2012. This report is that legislatively mandated assessment
    Note: "National Defense Research Institute , Includes bibliographical references (pages 83-85)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    ISBN: 9780833078551 , 0833083481 , 0833078550 , 9780833083487
    Language: English
    Pages: 1 Online-Ressource (xxiii, 78 pages)
    Series Statement: Technical report TR-1294-NAVY
    Parallel Title: Print version Porche, Isaac, 1968- Rapid acquisition and fielding for information assurance and cyber security in the Navy
    Keywords: United States Planning ; United States Information technology ; United States Procurement ; United States ; United States ; United States ; Government purchasing Law and legislation ; Computer security ; Cyberterrorism Prevention ; Computer software Purchasing ; Computers Purchasing ; Defense contracts ; Government purchasing ; Computer security ; Cyberterrorism ; Computer software ; Computers ; Defense contracts ; Defense contracts ; Government purchasing ; Law and legislation ; Armed Forces ; Planning ; Military & Naval Science ; Law, Politics & Government ; Naval Science - General ; United States ; COMPUTERS ; Internet ; Security ; Armed Forces ; Procurement ; Computer security ; Computer software ; Purchasing ; United States ; Computers ; Purchasing ; Cyberterrorism ; Prevention ; Electronic books
    Abstract: Identifying an agile and adaptable acquisition process that can field new information technology capabilities and services in relatively short and responsive time frames is a pressing issue for the U.S. Navy. Damaging malware can mutate within hours or days, requiring a defense that is sufficiently responsive to mitigate each variant. The Navy's Program Manager, Warfare (PMW) 130, an office in the Navy's Program Executive Office for Command, Control, Communications, Computers, and Intelligence, is focused on rapidly and proactively fielding innovative capabilities to stay ahead of cyber threats. It requires an acquisition and fielding cycle that can deliver hardware security products within 12-18 months, software security products within six to 12 months, and incremental development for both hardware and software every three months. These time frames are far shorter than the Navy's traditional acquisition cycle time, which can be 36 months from concept approval to initial operational capability or eight to ten years for full operational capability. With a focus on these goals, a RAND study sought to identify ways to accelerate or bypass the traditional acquisition process in response to the unique demands of PMW 130 information technology and cyber programs, with lessons derived from and recommendations applicable to programs across the U.S. Department of Defense
    Abstract: Identifying an agile and adaptable acquisition process that can field new information technology capabilities and services in relatively short and responsive time frames is a pressing issue for the U.S. Navy. Damaging malware can mutate within hours or days, requiring a defense that is sufficiently responsive to mitigate each variant. The Navy's Program Manager, Warfare (PMW) 130, an office in the Navy's Program Executive Office for Command, Control, Communications, Computers, and Intelligence, is focused on rapidly and proactively fielding innovative capabilities to stay ahead of cyber threats. It requires an acquisition and fielding cycle that can deliver hardware security products within 12-18 months, software security products within six to 12 months, and incremental development for both hardware and software every three months. These time frames are far shorter than the Navy's traditional acquisition cycle time, which can be 36 months from concept approval to initial operational capability or eight to ten years for full operational capability. With a focus on these goals, a RAND study sought to identify ways to accelerate or bypass the traditional acquisition process in response to the unique demands of PMW 130 information technology and cyber programs, with lessons derived from and recommendations applicable to programs across the U.S. Department of Defense
    Note: "Prepared for the United States Navy , "National Defense Research Institute , Includes bibliographical references (pages 73-78)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    ISBN: 9780833076854 , 0833079743 , 083307685X , 9780833079749
    Language: English
    Pages: 1 Online-Ressource (xxii, 146 pages)
    Series Statement: RAND Corporation monograph series MG1241
    Parallel Title: Print version Modeling terrorism risk to the air transportation system
    Keywords: United States Rules and practice ; Evaluation ; United States ; Terrorism Prevention ; Aeronautics Safety measures ; Evaluation ; Aeronautics, Commercial Security measures ; Evaluation ; Risk management Mathematical models ; Terrorism ; Aeronautics ; Aeronautics, Commercial ; Risk management ; Social Welfare & Social Work ; Social Sciences ; Criminology, Penology & Juvenile Delinquency ; United States ; POLITICAL SCIENCE ; Political Freedom ; Risk management ; Mathematical models ; Terrorism ; Prevention ; United States ; Electronic book
    Abstract: RAND evaluated a terrorism risk modeling tool developed by the Transportation Security Administration and Boeing to help guide program planning for aviation security. This tool, the Risk Management Analysis Tool, or RMAT, is used by TSA to estimate the terrorism risk-reduction benefits attributable to new and existing security programs, technologies, and procedures. RMAT simulates terrorist behavior and success in attacking vulnerabilities in the domestic commercial air transportation system, drawing on estimates of terrorist resources, capabilities, preferences, decision processes, intelligence collection, and operational planning. It describes how the layers of security protecting the air transportation system are likely to perform when confronted by more than 60 types of attacks, drawing on detailed blast and other physical modeling to understand the damage produced by different weapons and attacks, and calculating expected loss of life and the direct and indirect economic consequences of that damage. This report describes RAND's conclusions about the validity of RMAT for TSA's intended uses and its recommendations for how TSA should perform cost-benefit analyses of its security programs
    Abstract: RAND evaluated a terrorism risk modeling tool developed by the Transportation Security Administration and Boeing to help guide program planning for aviation security. This tool, the Risk Management Analysis Tool, or RMAT, is used by TSA to estimate the terrorism risk-reduction benefits attributable to new and existing security programs, technologies, and procedures. RMAT simulates terrorist behavior and success in attacking vulnerabilities in the domestic commercial air transportation system, drawing on estimates of terrorist resources, capabilities, preferences, decision processes, intelligence collection, and operational planning. It describes how the layers of security protecting the air transportation system are likely to perform when confronted by more than 60 types of attacks, drawing on detailed blast and other physical modeling to understand the damage produced by different weapons and attacks, and calculating expected loss of life and the direct and indirect economic consequences of that damage. This report describes RAND's conclusions about the validity of RMAT for TSA's intended uses and its recommendations for how TSA should perform cost-benefit analyses of its security programs
    Note: At head of title: RAND Homeland Security and Defense Center , Includes bibliographical references (pages 135-146)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    ISBN: 9780833076526 , 0833079700 , 0833076523 , 9780833079701
    Language: English
    Pages: 1 Online-Ressource (xxv, 155 pages)
    Series Statement: Rand Corporation monograph series
    Parallel Title: Print version Jackson, Brian A., 1972- Efficient aviation security
    Keywords: Terrorism Prevention ; Aeronautics Security measures ; Terrorism ; Aeronautics ; BUSINESS & ECONOMICS ; Industries ; Transportation ; Terrorism ; Prevention ; Aeronautics ; Security measures ; United States ; Electronic books
    Abstract: In the decade since the September 11, 2001, terrorist attacks, aviation security has remained a policy area at the forefront of the national policy agenda. Al-Qa'ida has maintained its focus on the U.S. aviation system, and a number of attempted attacks on aircraft have been thwarted in the succeeding years. Internationally, there have been successful attacks on aircraft and airports, and continued adaptation and innovation by terrorist groups has presented aviation planners with a shifting risk environment. The frequent adjustments and systematic tightening of security around the aviation system that have occurred since 9/11 have also put the collateral and intangible effects of security efforts into the national spotlight, with significant controversy about the intrusiveness of security, and have stimulated both analysis and debate about whether the benefits of new security measures outweigh their costs. This document seeks to contribute to the national debate on aviation security by examining a set of issues that are either overlooked or not well captured in analyses of the costs and benefits of security measures. Our effort is motivated by the position that the goal of aviation security is not just to reduce risk in the aviation system, but to do so efficiently, particularly in an era when fiscal constraints require difficult choices between spending resources on security or other important national priorities. We present a series of distinct analyses focused on tools and approaches we believed were missing and therefore hurting efforts to develop efficient security strategies, implement tactics, and get the best outcomes for the resources spent to ensure aviation security
    Abstract: In the decade since the September 11, 2001, terrorist attacks, aviation security has remained a policy area at the forefront of the national policy agenda. Al-Qa'ida has maintained its focus on the U.S. aviation system, and a number of attempted attacks on aircraft have been thwarted in the succeeding years. Internationally, there have been successful attacks on aircraft and airports, and continued adaptation and innovation by terrorist groups has presented aviation planners with a shifting risk environment. The frequent adjustments and systematic tightening of security around the aviation system that have occurred since 9/11 have also put the collateral and intangible effects of security efforts into the national spotlight, with significant controversy about the intrusiveness of security, and have stimulated both analysis and debate about whether the benefits of new security measures outweigh their costs. This document seeks to contribute to the national debate on aviation security by examining a set of issues that are either overlooked or not well captured in analyses of the costs and benefits of security measures. Our effort is motivated by the position that the goal of aviation security is not just to reduce risk in the aviation system, but to do so efficiently, particularly in an era when fiscal constraints require difficult choices between spending resources on security or other important national priorities. We present a series of distinct analyses focused on tools and approaches we believed were missing and therefore hurting efforts to develop efficient security strategies, implement tactics, and get the best outcomes for the resources spent to ensure aviation security
    Note: "MG-1220-RC."--Page 4 of cover , "RAND Homeland Security and Defense Center , Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    [Santa Monica, Calif.] : Rand Corp
    ISBN: 9780833077363 , 0833077368 , 9780833077028 , 083307735X , 0833077023 , 9780833077356
    Language: English
    Pages: 1 Online-Ressource (11, [1] pages)
    Series Statement: Occasional paper OP-390-RC (2012)
    Parallel Title: Print version Jenkins, Brian Michael Aviation security
    DDC: 363.28760973
    Keywords: Aeronautics Safety measures ; Terrorism Prevention ; Aeronautics, Commercial Security measures ; Airline passenger security screening ; Airports Security measures ; Aeronautics ; Terrorism ; Aeronautics, Commercial ; Airline passenger security screening ; Airports ; TRANSPORTATION ; Aviation ; General ; BUSINESS & ECONOMICS ; Industries ; Transportation ; Aeronautics, Commercial ; Security measures ; Aeronautics ; Safety measures ; Airline passenger security screening ; Airports ; Security measures ; Terrorism ; Prevention ; United States ; POLITICAL SCIENCE ; Political Freedom & Security ; Law Enforcement ; Electronic books
    Abstract: "Aviation security is costly, controversial, and contentious; no other security measures directly affect such a large portion of the country's population. Because of the nature of the threat, aviation security is the most intrusive form of security, pushing hard on the frontier of civil liberties. And the threat is real: Terrorists remain obsessed with attacking airplanes. At the same time, passenger loads are increasing, while security budgets are likely to decline. Performance suffers. Meanwhile, public tolerance and cooperation are beginning to fray. But the Transportation Security Administration is often blamed for things beyond its control. And post-catastrophe reviews can push us in the wrong direction, usually resulting in new security measures rather than a reexamination of strategy. After 40 years of focus on tactical measures, it is time for a sweeping review of aviation security. Instead of forming the usual federal commission to undertake this task, several non-government research institutions could be selected to independently design an optimal aviation security system, beginning not with the four decades of accumulated security measures currently in place but with a clean slate. The competing models would be reviewed and the best ideas or combination of ideas would be put forward. Even if the results turn out to resemble what is already in place, at least the process offers some comfort that we are pretty close to getting it right."--"Overview", p. [1]
    Abstract: "Aviation security is costly, controversial, and contentious; no other security measures directly affect such a large portion of the country's population. Because of the nature of the threat, aviation security is the most intrusive form of security, pushing hard on the frontier of civil liberties. And the threat is real: Terrorists remain obsessed with attacking airplanes. At the same time, passenger loads are increasing, while security budgets are likely to decline. Performance suffers. Meanwhile, public tolerance and cooperation are beginning to fray. But the Transportation Security Administration is often blamed for things beyond its control. And post-catastrophe reviews can push us in the wrong direction, usually resulting in new security measures rather than a reexamination of strategy. After 40 years of focus on tactical measures, it is time for a sweeping review of aviation security. Instead of forming the usual federal commission to undertake this task, several non-government research institutions could be selected to independently design an optimal aviation security system, beginning not with the four decades of accumulated security measures currently in place but with a clean slate. The competing models would be reviewed and the best ideas or combination of ideas would be put forward. Even if the results turn out to resemble what is already in place, at least the process offers some comfort that we are pretty close to getting it right."--"Overview", p. [1]
    Note: "RAND Homeland Security and Defense Center , Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    ISBN: 9780833059635 , 0833059637
    Language: English
    Pages: 1 Online-Ressource (xiii, 100 pages)
    Series Statement: Technical report TR-923-ANT
    Parallel Title: Erscheint auch als Clutterbuck, Lindsay Exploring Patterns of Behaviour in Violent Jihadist Terrorists : An analysis of six significant terrorist conspiracies in the UK
    Keywords: Jihad ; Terrorists Social networks ; Terrorists Conduct of life ; Terrorists Case studies ; Jihad ; Terrorists ; Terrorists ; Terrorists ; Terrorism ; Terrorism Religious aspects ; Islam ; SOCIAL SCIENCE ; Reference ; POLITICAL SCIENCE ; Terrorism ; Jihad ; Terrorists ; SOCIAL SCIENCE ; Essays ; Case studies ; Terrorism ; Terrorism ; Religious aspects ; Islam ; Great Britain ; Electronic books
    Abstract: The aim of this research was to see whether the groups/cells and their 38 core individuals who had taken part in the six most serious terrorist conspiracies and attacks in the UK between 2004 and 2007, all of which were driven by the ideology of violent Jihadism as espoused by Al Qaeda, exhibited any specific types of behaviour. In each case the terrorists successfully launched or unsuccessfully attempted an attack, or were arrested and convicted of conspiring to carry out a terrorist attack. The research provides a detailed examination of the behaviours exhibited by violent Jihadist groups/cells and the individuals within them. The report outlines the history and background before examining the organisation, characteristics and behaviour of the groups/cells involved. It also examines individual behaviours carried out on behalf of the group/cell and individual behaviour more broadly. It demonstrates there are certain distinctive behavioural characteristics displayed with their planning, preparation and implementation of an act of terrorism. The six UK case studies show three categories of behaviours, from "radicalisation" into "transition to violent Jihad" and finally to "terrorist attack planning and preparation
    Abstract: The aim of this research was to see whether the groups/cells and their 38 core individuals who had taken part in the six most serious terrorist conspiracies and attacks in the UK between 2004 and 2007, all of which were driven by the ideology of violent Jihadism as espoused by Al Qaeda, exhibited any specific types of behaviour. In each case the terrorists successfully launched or unsuccessfully attempted an attack, or were arrested and convicted of conspiring to carry out a terrorist attack. The research provides a detailed examination of the behaviours exhibited by violent Jihadist groups/cells and the individuals within them. The report outlines the history and background before examining the organisation, characteristics and behaviour of the groups/cells involved. It also examines individual behaviours carried out on behalf of the group/cell and individual behaviour more broadly. It demonstrates there are certain distinctive behavioural characteristics displayed with their planning, preparation and implementation of an act of terrorism. The six UK case studies show three categories of behaviours, from "radicalisation" into "transition to violent Jihad" and finally to "terrorist attack planning and preparation
    Note: "Prepared for the Airey Neave Trust , Includes bibliographical references (pages 57-62) , Title from PDF title page (viewed July 18, 2011)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    ISBN: 9780833059031 , 0833059033 , 9780833077561 , 0833077562 , 9780833058966 , 0833058967
    Language: English
    Pages: 1 Online-Ressource (xxxi, 121 pages)
    DDC: 623.82574
    Keywords: United States Procurement ; Seawolf (Submarine) ; United States ; Seawolf (Submarine) ; Nuclear submarines Design and construction ; Shipbuilding industry Management ; Nuclear submarines Planning ; Nuclear submarines ; Shipbuilding industry ; Nuclear submarines ; United States ; Seawolf (Submarine) ; United States ; Armed Forces ; Procurement ; Shipbuilding industry ; Management ; Electronic books
    Abstract: Large, complex submarine design and construction programs demand personnel with unique skills and capabilities supplemented with practical experiences in their areas of expertise. Recognizing the importance of past experiences for successful program management, the U.S. Navy asked the RAND Corporation to develop a set of lessons learned from previous submarine programs that could help inform future program managers. This volume presents lessons from three submarine programs. The RAND team looked at how the programs were managed, the issues that affected management decisions, and the outcomes of those decisions. All three submarine programs had tenuous beginnings. Each experienced cost overruns and schedule delays in the construction of its first-of-class submarine. The Ohio and Virginia programs made corrections, and both are viewed as generally successful. Seawolf, probably due to the changing threat and budgetary environment, was terminated before changes could be made to correct early missteps. An overarching lesson from the three programs is the importance of program stability. Stability applies in many areas--funding consistency, a long-term build strategy, fixed operational requirements, program management, and an integrated partnership between the Navy and the shipbuilders
    Abstract: Large, complex submarine design and construction programs demand personnel with unique skills and capabilities supplemented with practical experiences in their areas of expertise. Recognizing the importance of past experiences for successful program management, the U.S. Navy asked the RAND Corporation to develop a set of lessons learned from previous submarine programs that could help inform future program managers. This volume presents lessons from three submarine programs. The RAND team looked at how the programs were managed, the issues that affected management decisions, and the outcomes of those decisions. All three submarine programs had tenuous beginnings. Each experienced cost overruns and schedule delays in the construction of its first-of-class submarine. The Ohio and Virginia programs made corrections, and both are viewed as generally successful. Seawolf, probably due to the changing threat and budgetary environment, was terminated before changes could be made to correct early missteps. An overarching lesson from the three programs is the importance of program stability. Stability applies in many areas--funding consistency, a long-term build strategy, fixed operational requirements, program management, and an integrated partnership between the Navy and the shipbuilders
    Note: "This research was conducted within the Acquisition and Technology Policy Center of the RAND National Defense Research Institute"--Pg. IV , "RAND National Defense Research Institute , Includes bibliographical references (pages 117-121)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    ISBN: 9780833051035 , 0833051121 , 0833051032 , 9780833051127
    Language: English
    Pages: 1 Online-Ressource (xli, 133 pages)
    Series Statement: Rand Corporation monograph series MG-1031-NIJ
    Parallel Title: Print version Long-term effects of law enforcement's post-9/11 focus on counterterrorism and homeland security
    Keywords: Civil defense ; National security ; Law enforcement ; Terrorism Prevention ; Police training Costs ; Civil defense ; National security ; Law enforcement ; Terrorism ; Police training ; Civil defense ; Law enforcement ; National security ; Terrorism ; Prevention ; United States ; POLITICAL SCIENCE ; Political Freedom & Security ; Law Enforcement ; POLITICAL SCIENCE ; Law Enforcement ; Electronic books
    Abstract: Since the 9/11 terrorist attacks, the need for increased counterterrorism (CT) and homeland security (HS) efforts at the federal, state, and local levels has taken the spotlight in public safety efforts. In the immediate aftermath of 9/11, many law enforcement agencies (LEAs) shifted more resources toward developing CT and HS capabilities, and the federal government continues to support these efforts with grants provided through the Department of Homeland Security. This monograph examines the long-term adjustments that large urban LEAs have made to accommodate the focus on CT and HS, as well as the advantages and challenges associated with it. The study relies primarily on in-depth case studies of five large urban LEAs, as well as a review of federal HS grant programs and a quantitative analysis of the potential costs associated with shifting law enforcement personnel from traditional policing to focus on HS and CT functions. Major trends among the five case study LEAs include the creation of specialized departments and units, as well as an increased emphasis on information-sharing, which, nationwide, has led to the creation of fusion centers that serve as formal hubs for regional information-sharing networks. LEAs' HS and CT efforts are also greatly influenced by the restrictions and requirements associated with federal HS grant funding. Finally, using cost-of-crime estimates, it is possible to partially quantify the costs associated with LEAs' shifting of personnel away from traditional crime prevention toward CT and HS -- there are also clear benefits associated with law enforcement's focus on CT and HS, but they are difficult to quantify, and this is posing a challenge for LEAs as the economic downturn puts pressure on public budgets
    Abstract: Since the 9/11 terrorist attacks, the need for increased counterterrorism (CT) and homeland security (HS) efforts at the federal, state, and local levels has taken the spotlight in public safety efforts. In the immediate aftermath of 9/11, many law enforcement agencies (LEAs) shifted more resources toward developing CT and HS capabilities, and the federal government continues to support these efforts with grants provided through the Department of Homeland Security. This monograph examines the long-term adjustments that large urban LEAs have made to accommodate the focus on CT and HS, as well as the advantages and challenges associated with it. The study relies primarily on in-depth case studies of five large urban LEAs, as well as a review of federal HS grant programs and a quantitative analysis of the potential costs associated with shifting law enforcement personnel from traditional policing to focus on HS and CT functions. Major trends among the five case study LEAs include the creation of specialized departments and units, as well as an increased emphasis on information-sharing, which, nationwide, has led to the creation of fusion centers that serve as formal hubs for regional information-sharing networks. LEAs' HS and CT efforts are also greatly influenced by the restrictions and requirements associated with federal HS grant funding. Finally, using cost-of-crime estimates, it is possible to partially quantify the costs associated with LEAs' shifting of personnel away from traditional crime prevention toward CT and HS -- there are also clear benefits associated with law enforcement's focus on CT and HS, but they are difficult to quantify, and this is posing a challenge for LEAs as the economic downturn puts pressure on public budgets
    Note: Includes bibliographical references (pages 121-133)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    Santa Monica, CA : RAND
    ISBN: 9780833049766 , 0833049860 , 0833049763 , 9780833049865
    Language: English
    Pages: 1 Online-Ressource (xxi, 185 pages)
    Series Statement: Rand Corporation monograph series MG-982-RC
    Parallel Title: Print version Jones, Seth G., 1972- Counterinsurgency in Pakistan
    Keywords: Counterinsurgency ; Terrorism Prevention ; Counterinsurgency ; Terrorism ; Politics and government ; Terrorism ; Prevention ; counterinsurgency ; Pakistan ; HISTORY ; POLITICAL SCIENCE ; Terrorism ; Pakistan ; Counterinsurgency ; Pakistan Politics and government 1988- ; Pakistan ; Electronic books
    Abstract: This document examines the evolution of militancy in Pakistan, assesses Pakistan's efforts to counter militants, and offers a range of policy recommendations. It is based on detailed research in Pakistan and an examination of the quantitative and qualitative literatures on counterinsurgency and counterterrorism
    Abstract: This document examines the evolution of militancy in Pakistan, assesses Pakistan's efforts to counter militants, and offers a range of policy recommendations. It is based on detailed research in Pakistan and an examination of the quantitative and qualitative literatures on counterinsurgency and counterterrorism
    Note: Includes bibliographical references (pages 145-167) and index
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...