Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • 2010-2014  (28)
  • 1995-1999  (1)
  • Rand Corporation  (29)
  • Social Sciences  (17)
  • National security  (12)
Datasource
Material
Language
Years
Year
  • 1
    ISBN: 9780833084934 , 0833085298 , 0833084933 , 9780833085290
    Language: English
    Pages: 1 Online-Ressource (xxvii, 124 pages)
    Series Statement: RAND Corporation research report series RR-564-BJA
    Parallel Title: Print version How effective is correctional education, and where do we go from here?
    Keywords: Educational evaluation ; Prisoners Education ; Evaluation ; Juvenile delinquents Education ; Evaluation ; Educational evaluation ; Prisoners ; Juvenile delinquents ; EDUCATION ; Evaluation & Assessment ; Prisoners ; Education ; Evaluation ; Educational evaluation ; Criminology, Penology & Juvenile Delinquency ; Juvenile delinquents ; Education ; Evaluation ; United States ; Social Sciences ; Social Welfare & Social Work ; SOCIAL SCIENCE ; Penology ; Electronic books
    Abstract: "More than 2 million adults are incarcerated in U.S. prisons, and each year more than 700,000 leave federal and state prisons and return to communities. Unfortunately, within three years, 40 percent will be reincarcerated. One reason for this is that ex-offenders lack the knowledge, training, and skills to support a successful return to communities. Trying to reduce such high recidivism rates is partly why states devote resources to educating and training individuals in prison. This raises the question of how effective -- and cost-effective -- correctional education is: an even more salient question given the funding environment states face from the 2008 recession and its continuing aftermath. With funding from the Second Chance Act of 2007, the Bureau of Justice Assistance, U.S. Department of Justice, asked RAND to help answer this question as part of a comprehensive examination of the current state of correctional education for incarcerated adults and juveniles. The RAND team conducted a systematic review of correctional education programs for incarcerated adults and juveniles. This included a meta-analysis on correctional education's effects on recidivism and postrelease employment outcomes for incarcerated adults, as well as a synthesis of evidence on programs for juveniles. The study also included a nationwide survey of state correctional education directors to understand how correctional education is provided today and the recession's impact. The authors also compared the direct costs of correctional education with those of reincarceration to put the recidivism findings into a broader context."--Provided by publisher
    Abstract: "More than 2 million adults are incarcerated in U.S. prisons, and each year more than 700,000 leave federal and state prisons and return to communities. Unfortunately, within three years, 40 percent will be reincarcerated. One reason for this is that ex-offenders lack the knowledge, training, and skills to support a successful return to communities. Trying to reduce such high recidivism rates is partly why states devote resources to educating and training individuals in prison. This raises the question of how effective -- and cost-effective -- correctional education is: an even more salient question given the funding environment states face from the 2008 recession and its continuing aftermath. With funding from the Second Chance Act of 2007, the Bureau of Justice Assistance, U.S. Department of Justice, asked RAND to help answer this question as part of a comprehensive examination of the current state of correctional education for incarcerated adults and juveniles. The RAND team conducted a systematic review of correctional education programs for incarcerated adults and juveniles. This included a meta-analysis on correctional education's effects on recidivism and postrelease employment outcomes for incarcerated adults, as well as a synthesis of evidence on programs for juveniles. The study also included a nationwide survey of state correctional education directors to understand how correctional education is provided today and the recession's impact. The authors also compared the direct costs of correctional education with those of reincarceration to put the recidivism findings into a broader context."--Provided by publisher
    Note: "RR-564-BJA."--Page 4 of printed paper wrapper , Includes bibliographical references (pages 117-124)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9780833084415 , 0833084410 , 9780833084439 , 0833084437 , 9780833084422 , 9780833084408
    Language: English
    Pages: 1 Online-Ressource (191 pages)
    Parallel Title: Erscheint auch als Paul, Christopher, 1971- Mexico is not Colombia
    Keywords: Drug control ; Internal security ; Insurgency ; Drug traffic ; Violent crimes ; Violence ; Drug control ; Internal security ; Insurgency ; Drug traffic ; Violent crimes ; Violence ; SOCIAL SCIENCE ; General ; SOCIAL SCIENCE ; Criminology ; Drug control ; Drug traffic ; Insurgency ; Internal security ; Violence ; Violent crimes ; Substance Abuse ; Social Welfare & Social Work ; Social Sciences ; Mexico ; BUSINESS & ECONOMICS ; Infrastructure ; Electronic books
    Abstract: "Despite the scope of the threat they pose to Mexico's security, violent drug-trafficking organizations are not well understood, and optimal strategies to combat them have not been identified. While there is no perfectly analogous case from history, Mexico stands to benefit from historical lessons and efforts that were correlated with improvement in countries facing similar challenges related to violence and corruption"--Provided by publisher
    Note: Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9780833089908 , 0833089900 , 9780833086914
    Language: English
    Pages: 1 Online-Ressource (xxi, 62 pages)
    Parallel Title: Print version Hunt, Priscilla Evaluation of the Shreveport predictive policing experiment
    Keywords: Forecasting Statistical methods ; Social prediction ; Crime prevention ; Offenses against property Prevention ; Regression analysis ; Police administration Case studies ; Law enforcement ; Forecasting ; Social prediction ; Crime prevention ; Offenses against property ; Regression analysis ; Police administration ; Law enforcement ; Law enforcement ; Offenses against property ; Prevention ; Police administration ; Regression analysis ; Social prediction ; Social Welfare & Social Work ; Social Sciences ; Criminology, Penology & Juvenile Delinquency ; Louisiana ; Shreveport ; MATHEMATICS ; Probability & Statistics ; Regression Analysis ; Case studies ; Crime prevention ; Forecasting ; Statistical methods ; Electronic books
    Abstract: "Even though there is a growing interest in predictive policing, to date there have been few, if any, formal evaluations of these programs. This report documents an assessment of a predictive policing effort in Shreveport, Louisiana, in 2012, which was conducted to evaluate the crime reduction effects of policing guided by statistical predictions. RAND researchers led multiple interviews and focus groups with the Shreveport Police Department throughout the course of the trial to document the implementation of the statistical predictive and prevention models. In addition to a basic assessment of the process, the report shows the crime impacts and costs directly attributable to the strategy. It is hoped that this will provide a fuller picture for police departments considering if and how a predictive policing strategy should be adopted. There was no statistically significant change in property crime in the experimental districts that applied the predictive models compared with the control districts; therefore, overall, the intervention was deemed to have no effect. There are both statistical and substantive possibilities to explain this null effect. In addition, it is likely that the predictive policing program did not cost any more than the status quo."--"Abstract" on web page
    Abstract: "Even though there is a growing interest in predictive policing, to date there have been few, if any, formal evaluations of these programs. This report documents an assessment of a predictive policing effort in Shreveport, Louisiana, in 2012, which was conducted to evaluate the crime reduction effects of policing guided by statistical predictions. RAND researchers led multiple interviews and focus groups with the Shreveport Police Department throughout the course of the trial to document the implementation of the statistical predictive and prevention models. In addition to a basic assessment of the process, the report shows the crime impacts and costs directly attributable to the strategy. It is hoped that this will provide a fuller picture for police departments considering if and how a predictive policing strategy should be adopted. There was no statistically significant change in property crime in the experimental districts that applied the predictive models compared with the control districts; therefore, overall, the intervention was deemed to have no effect. There are both statistical and substantive possibilities to explain this null effect. In addition, it is likely that the predictive policing program did not cost any more than the status quo."--"Abstract" on web page
    Note: "RAND Corporation research report series , "RR-531-NIJ."--Page 4 of cover , "The research described in this report was sponsored by the National Institute of Justice and was conducted in the Safety and Justice Program within RAND Justice, Infrastructure, and Environment."--Title page verso , Includes bibliographical references (pages 61-62)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    ISBN: 9780833087256 , 0833089609 , 0833087258 , 9780833089601
    Language: English
    Pages: 1 Online-Ressource (xxi, 106 pages)
    Parallel Title: Print version Steele, Jennifer L Competency-based education in three pilot programs
    Keywords: Competency-based education ; Educational evaluation ; Competency-based education ; Educational evaluation ; United States ; Education ; Educational evaluation ; Education, Special Topics ; EDUCATION ; Evaluation & Assessment ; Social Sciences ; Competency-based education ; Electronic books
    Abstract: In 2011, the Bill & Melinda Gates Foundation created the Project Mastery grant program to support competency-based education initiatives in large school systems that serve a high proportion of disadvantaged youth. Competency-based education meets students where they are academically, provides students with opportunities for choice, and awards credit for evidence of learning, not for the time students spend studying a subject. The Foundation asked RAND to evaluate these efforts in terms of implementation, students' experiences, and student performance. This report presents final results from that evaluation, offering an overview of competency-based education and the Project Mastery grant projects and describing the implementation of competency-based educational features under each project. The report concludes with six lessons for policy, partnerships, and practice
    Note: "Prepared for the Bill & Melinda Gates Foundation , "RAND Education , Includes bibliographical references (pages 103-106)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    ISBN: 9780833089342 , 083308948X , 083308738X , 083308934X , 9780833087386 , 9780833089489
    Language: English
    Pages: 1 Online-Ressource (xxv, 144 pages)
    Parallel Title: Print version Gonzalez, Gabriella Transforming an urban school system
    Keywords: Scholarships ; College-school cooperation ; Educational change Evaluation ; Public schools Evaluation ; Incentive awards ; Community and school ; Motivation in education ; Scholarships ; College-school cooperation ; Educational change ; Public schools ; Incentive awards ; Community and school ; Motivation in education ; Education ; Social Sciences ; History of Education ; Connecticut ; New Haven ; Connecticut ; EDUCATION ; Teaching Methods & Materials ; Arts & Humanities ; College-school cooperation ; Community and school ; Educational change ; Evaluation ; Incentive awards ; Motivation in education ; Public schools ; Evaluation ; Scholarships ; Electronic books
    Abstract: In 2009, the City of New Haven and New Haven Public Schools (NHPS) announced a sweeping K-12 educational reform, New Haven School Change. The district had three primary goals for School Change: (1) close the gap between the performance of NHPS students' and Connecticut students' averages on state tests, (2) cut the high school dropout rate in half, and (3) ensure that every graduating student has the academic ability and the financial resources to attend and succeed in college. Concurrent with School Change, the City of New Haven partnered with the Community Foundation for Greater New Haven, NHPS, and Yale University in 2010 to create New Haven Promise, a scholarship program that aims to improve the college-going culture in the city and postsecondary enrollment and graduation rates of NHPS graduates as a way to enhance the economic development of the city, attract more residents to New Haven, reduce crime and incarceration, and improve residents' quality of life. The 2010-2011 school year marked the first year of a staged implementation for both efforts. In June 2013, the New Haven Promise Board of Directors asked the RAND Corporation to conduct a study to document and describe baseline conditions and early progress of these programs. Researchers worked with state and district data and conducted interviews with Promise Scholars and parents to document early trends and possible areas for improvement. This report and its companion volume document the resulting study
    Note: "RAND Education , Includes bibliographical references (pages 139-144)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    ISBN: 9780833085801 , 0833085808 , 9780833084552 , 0833085816 , 0833084550 , 9780833085818
    Language: English
    Pages: 1 Online-Ressource (xix, 44 pages)
    Series Statement: RAND Corporation research report series
    Parallel Title: Print version Groves, David G Strengthening coastal planning
    Keywords: Coastal zone management ; Shore protection Planning ; Planning Technique ; Coastal engineering Planning ; Coastal zone management ; Shore protection ; Planning ; Coastal engineering ; Coastal zone management ; Planning ; Technique ; Shore protection ; Planning ; Sociology & Social History ; Social Sciences ; Communities - Urban Groups ; United States ; Louisiana ; BUSINESS & ECONOMICS ; Real Estate ; General ; NATURE ; Natural Disasters ; Electronic book
    Abstract: Cover; Title Page; Copyright; Preface; Contents; Figures; Summary; Acknowledgments; Abbreviations; Chapter One: Introduction; Forces at Work on the Louisiana Coast; A Modified River Runs Through It; Business as Usual Will Not Halt the Land Loss; The Risk of Coastal Flooding Is Rising; Economic and Social Implications of a Coast at Risk; Challenges in Creating a Master Plan; Diverse Range and Large Number of Possible Solutions; The Future Is Uncertain; A Diverse Region Seeking Different and Sometimes Conflicting Outcomes; Need for Coordination Across Jurisdictions.
    Abstract: Determining How To Allocate Funds Across Project TypesStriking a Balance Between Near-Term and Long-Term Outcomes; Balancing Among Different Planning Objectives; Ensuring Robustness for the Uncertain Future; Louisiana's 2012 Comprehensive Master Plan for a Sustainable Coast; Next Steps for Louisiana; Chapter Four: Reducing Coastal Risk Through Integrated Planning; Growing Vulnerability of Coastal Regions; Costs of Coastal Flooding; Strengthening Coastal Resilience Requires a Comprehensive Planning Process; Coastal Risks Are Increasing, but in Uncertain Ways.
    Abstract: Evolution of the Master Planning ProcessChapter Two: Analytical Support for the Development of Louisiana's 50-Year Comprehensive Plan; New Analytical Capabilities Informed the Planning Framework; Accounting for Deep Uncertainty Using Scenarios; Systems Models, CLARA, and Innovative Flood Risk Modeling; The Planning Tool and Innovative Decisionmaking; Supporting CPRA Decisionmaking with Analysis; Chapter Three: Using the Planning Tool to Support the Development of a Comprehensive Plan for Louisiana; Planning Tool Analysis Supported Deliberations; Comparing Projects on an Even Playing Field.
    Abstract: This report highlights RAND's contributions to the Louisiana Coastal Protection and Restoration Authority's Master Plan. Its purpose is to help policymakers in other coastal regions understand the value of a solid technical foundation to support decisionmaking on strategies to reduce flood risk, rebuild or restore coastal environments, and increase the resilience of developed coastal regions
    Abstract: There Are Many Different Types of Strategies to Consider to Reduce Risks and Restore Coastal LandscapesSolutions Will Be Implemented by Local, Regional, State, and Federal Agencies; Principles for Integrated Coastal Planning; Public Participation Is Essential Throughout the Planning Process; Technical Analysis Is Meant to Inform Deliberations and Value Judgments by Decisionmakers; A Sustainable Long-Term Strategy Must Be Robust and Adaptive; Building on Louisiana's Planning Experience; Appendix: A Brief Description of Robust Decision Making; References.
    Note: Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Santa Monica, CA : RAND
    ISBN: 9780833085047 , 0833089994 , 0833085042 , 9780833089991
    Language: English
    Pages: 1 Online-Ressource (xxxii, 296 pages)
    Parallel Title: Erscheint auch als Acosta, Joie D Mental health stigma in the military
    Keywords: Stigma (Social psychology) ; Soldiers Mental health services ; Evaluation ; Mental health policy ; Stigma (Social psychology) ; Soldiers ; Mental health policy ; Analytical, Diagnostic and Therapeutic Techniques and Equipment ; Anthropology, Education, Sociology and Social Phenomena ; Behavior and Behavior Mechanisms ; Behavior ; Behavioral Disciplines and Activities ; Delivery of Health Care ; Evaluation Studies as Topic ; Health Care Economics and Organizations ; Health Care Evaluation Mechanisms ; Health Care Facilities, Manpower, and Services ; Health Care Quality, Access, and Evaluation ; Health Services ; Investigative Techniques ; Mental Health Services ; Military Personnel ; Named Groups ; Occupational Groups ; Persons ; Policy ; Psychiatry and Psychology ; Public Policy ; Quality of Health Care ; Social Behavior ; Social Control Policies ; Social Control, Formal ; Social Sciences ; Social Stigma ; Sociology ; Law, Politics & Government ; Military Administration ; Military & Naval Science ; United States ; HISTORY ; Military ; Veterans ; Mental health policy ; Stigma (Social psychology) ; United States Armed Forces ; Mental health services ; Evaluation ; United States ; Electronic books
    Abstract: Despite the efforts of both the U.S. Department of Defense and the Veterans Health Administration to enhance mental health services, many service members are not regularly seeking needed care when they have mental health problems. Without appropriate treatment, these mental health problems can have wide-ranging and negative impacts on the quality of life and the social, emotional, and cognitive functioning of affected service members. The services have been actively engaged in developing policies, programs, and campaigns designed to reduce stigma and increase service members' help-seeking behavior. However, there has been no comprehensive assessment of these efforts' effectiveness and the extent to which they align with service members' needs or evidence-based practices. The goal of this research was to assess DoD's approach to stigma reduction, how well it is working and how it might be improved. To address these questions, RAND researchers used five complementary methods: (1) literature review, (2) a microsimulation modeling of costs, (3) interviews with program staff, (4) prospective policy analysis, and (5) an expert panel. The priorities outlined in this report identify ways in which program and policy development and research and evaluation can improve understanding of how best to efficiently and effectively provide needed treatment to service members with mental illness
    Abstract: Despite the efforts of both the U.S. Department of Defense and the Veterans Health Administration to enhance mental health services, many service members are not regularly seeking needed care when they have mental health problems. Without appropriate treatment, these mental health problems can have wide-ranging and negative impacts on the quality of life and the social, emotional, and cognitive functioning of affected service members. The services have been actively engaged in developing policies, programs, and campaigns designed to reduce stigma and increase service members' help-seeking behavior. However, there has been no comprehensive assessment of these efforts' effectiveness and the extent to which they align with service members' needs or evidence-based practices. The goal of this research was to assess DoD's approach to stigma reduction, how well it is working and how it might be improved. To address these questions, RAND researchers used five complementary methods: (1) literature review, (2) a microsimulation modeling of costs, (3) interviews with program staff, (4) prospective policy analysis, and (5) an expert panel. The priorities outlined in this report identify ways in which program and policy development and research and evaluation can improve understanding of how best to efficiently and effectively provide needed treatment to service members with mental illness
    Note: "RR-426-OSD"--Page 4 of cover , Includes bibliographical references (pages 231-296)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    ISBN: 9780833086198 , 0833086367 , 0833086197 , 9780833086365
    Language: English
    Pages: 1 Online-Ressource (16 pages)
    Parallel Title: Print version LaTourrette, Tom, 1963- Impact on federal spending of allowing the terrorism risk insurance act to expire
    Keywords: United States Evaluation ; United States ; Risk management ; National security ; Terrorism Risk assessment ; Risk (Insurance) ; Terrorism insurance Evaluation ; Risk management ; National security ; Terrorism ; Risk (Insurance) ; Terrorism insurance ; National security ; Risk (Insurance) ; Risk management ; United States ; SOCIAL SCIENCE ; Disasters & Disaster Relief ; Evaluation ; Terrorism Risk Insurance Act of 2002 (United States) ; Electronic books
    Abstract: Congress enacted the Terrorism Risk Insurance Act (TRIA) in 2002, in response to terrorism insurance becoming unavailable or, when offered, extremely costly in the wake of the 9/11 attacks. The law creates an incentive for a functioning private terrorism insurance market by providing a government reinsurance backstop for catastrophic terrorist attack losses. Extended first in 2005 and again in 2007, TRIA is set to expire at the end of 2014, and Congress is again considering the appropriate government role in terrorism insurance markets. This policy brief examines the potential federal spending implications of allowing TRIA to expire. Combining information on federal spending through TRIA, the influence of TRIA on the availability of terrorism insurance coverage, and the relationship between uninsured losses and federal disaster assistance spending, the authors find that, in the absence of a terrorist attack, TRIA costs taxpayers relatively little, and in the event of a terrorist attack comparable to any experienced before, it is expected to save taxpayers money
    Note: "RAND Corporation , "Policy Brief , "This work was conducted within RAND Center for Catastrophic Risk Management and Compensation ... part of RAND Justice, Infrastructure, and Environment"--Back cover , Caption title , Includes bibliographical references (pages 14-16)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    ISBN: 9780833085887 , 0833086340 , 0833085883 , 9780833086341
    Language: English
    Pages: 1 Online-Ressource (31 pages)
    Series Statement: RAND Corporation research report series RR-449-RC
    Parallel Title: Print vversion Davis, Lynn E. (Lynn Etheridge), 1943- Armed and dangerous?
    Keywords: Technology Risk assessment ; National security ; Military art and science Technological innovations ; Arms control ; Drone aircraft Risk assessment ; Technology ; National security ; Military art and science ; Arms control ; Drone aircraft ; Technology ; Risk assessment ; United States ; Military art and science ; Technological innovations ; POLITICAL SCIENCE ; International Relations ; Arms Control ; Arms control ; National security ; Electronic books
    Abstract: Armed drones are making the headlines, especially in their role in targeted killings. In this report, RAND researchers stepped back and asked whether these weapons are transformative. The answer is no, though they offer significant capabilities to their users, especially in counterterrorism operations as has been the case for the United States. Will they proliferate? Yes, but upon a closer look at the types of systems, only a few rich countries will be in a position to develop the higher technology and longer range systems. U.S. adversaries and others will likely find weapons such as aircraft and air defenses more cost and militarily effective. Their proliferation will not create the kinds of global dangers that call for new arms control efforts, but the risks to regional stability cannot be dismissed entirely, as is the case of any conventional weapon. How the United States will use these weapons today and into the future will be important in shaping a broader set of international norms that discourage their misuse by others
    Note: "RAND Corporation , Caption title , Includes bibliographical references (pages 26-30)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    ISBN: 9780833088062 , 0833089323 , 0833088068 , 9780833089328
    Language: English
    Pages: 1 Online-Ressource (xvii, 84 pages)
    Keywords: Competency-based education ; Competency-based education ; Competency-based education ; Education ; Social Sciences ; Theory & Practice of Education ; EDUCATION ; Evaluation & Assessment ; Electronic books
    Abstract: Efforts to prepare students for college, careers, and civic engagement have traditionally emphasized academic skills, but a growing body of research suggests that interpersonal and intrapersonal competencies, such as communication and resilience, are important predictors of postsecondary success and citizenship. One of the major challenges in designing educational interventions to support these outcomes is a lack of high-quality measures that could help educators, students, parents, and others understand how students perform and monitor their development over time. This report provides guidelines to promote thoughtful development of practical, high-quality measures of interpersonal and intrapersonal competencies that practitioners and policymakers can use to improve valued outcomes for students
    Note: "RAND Education , Includes bibliographical references (pages 81-84)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    ISBN: 9780833087379 , 0833089587 , 0833087371 , 9780833089588
    Language: English
    Pages: 1 Online-Ressource (xxi, 62 pages + database)
    Series Statement: Report RR-736-AF
    Keywords: Database of U.S. security treaties and agreements ; Database of U.S. security treaties and agreements ; Information storage and retrieval systems Treaties ; Information storage and retrieval systems Status of forces agreements ; Status of forces agreements Databases ; National security Law and legislation ; Legal research ; Information storage and retrieval systems ; Information storage and retrieval systems ; Status of forces agreements ; National security ; Information storage and retrieval systems ; Status of forces agreements ; Law - U.S ; Law, Politics & Government ; Law - U.S. - General ; POLITICAL SCIENCE ; International Relations ; Treaties ; United States ; Diplomatic relations ; Databases ; Treaties ; United States Treaties Foreign relations ; United States Databases Foreign relations ; United States ; United States ; Electronic books
    Abstract: Treaties and agreements are powerful foreign policy tools that the United States uses to build and solidify relationships with partners and to influence the behavior of other states. As a result, the overall U.S. portfolio of treaties and agreements can offer insight into the distribution and depth of U.S. commitments internationally, including its military commitments and 'presence' in a given country or region. However, despite their importance, there is currently no comprehensive record of current or historical security-related treaties signed by the United States that can be used for empirical analysis. To address the shortcomings in existing datasets and indexes to contribute to the study of U.S. security treaties and agreements, we have developed a new, more comprehensive treaty database that will enhance the ability of researchers to study the full portfolio of U.S. security agreements. This report discusses our approach to data collection and coding and also presents a summary of the database's content. Its appendixes define each individual variable used in the analysis. The database was developed as part of a larger project focused on estimating the economic value of U.S. military presence overseas. In the context of this larger project, the treaty database provided an alternative way to measure 'military presence.' In addition to using numbers of troops as a measure of presence, we also used numbers of security-related agreements, drawing on the information in the treaty database described in this report. This measure provided us with additional insight into the value and role of U.S. engagement and operations in overseas areas
    Abstract: Treaties and agreements are powerful foreign policy tools that the United States uses to build and solidify relationships with partners and to influence the behavior of other states. As a result, the overall U.S. portfolio of treaties and agreements can offer insight into the distribution and depth of U.S. commitments internationally, including its military commitments and 'presence' in a given country or region. However, despite their importance, there is currently no comprehensive record of current or historical security-related treaties signed by the United States that can be used for empirical analysis. To address the shortcomings in existing datasets and indexes to contribute to the study of U.S. security treaties and agreements, we have developed a new, more comprehensive treaty database that will enhance the ability of researchers to study the full portfolio of U.S. security agreements. This report discusses our approach to data collection and coding and also presents a summary of the database's content. Its appendixes define each individual variable used in the analysis. The database was developed as part of a larger project focused on estimating the economic value of U.S. military presence overseas. In the context of this larger project, the treaty database provided an alternative way to measure 'military presence.' In addition to using numbers of troops as a measure of presence, we also used numbers of security-related agreements, drawing on the information in the treaty database described in this report. This measure provided us with additional insight into the value and role of U.S. engagement and operations in overseas areas
    Note: "The accompanying CD ... contains an actual Excel database of treaties. The database does not include text, but includes titles, dates, and other classifications."--Email from author , "Prepared for the United States Air Force , "RAND Project AIR FORCE , Includes bibliographical references (pages 59-62)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    ISBN: 9780833085139 , 0833086499 , 0833085131 , 9780833086495
    Language: English
    Pages: 1 Online-Ressource (xxxiii, 152 pages)
    Parallel Title: Print version Hanauer, Larry Evaluating the impact of the Department of Defense Regional Centers for Security Studies
    Keywords: United States Management ; Evaluation ; United States ; National security International cooperation ; Military assistance, American ; National security ; Military assistance, American ; National security ; International cooperation ; Military & Naval Science ; Law, Politics & Government ; Armies ; POLITICAL SCIENCE ; International Relations ; Treaties ; Management ; Evaluation ; Military assistance, American ; United States ; Electronic books
    Abstract: The five U.S. Department of Defense (DoD) Regional Centers for Security Studies have been helping partner nations build strategic capacity for almost 20 years. However, recent DoD budget constraints have put pressure on the regional centers (RCs) to increase efficiency. The Office of the Secretary of Defense (OSD) asked RAND to conduct a study on the overall impact of the RCs, their effectiveness in advancing DoD policy priorities, the ways in which they assess their programs, and ways in which they could improve their impact and efficiency and the resulting outcomes. The RAND study team found that centers have had great success at the missions they have undertaken. They are high-impact components of U.S. security cooperation and engagement efforts, despite their relatively small budgets. The team identified 24 ways in which the centers advance U.S. interests, including building partner capacity, building relationships, fostering pro-U.S. outlooks, offering unique opportunities for engagement, and promoting regional dialogue that reduces tensions. However, RCs should improve impact-oriented data collection and analysis for improved assessment, methodically collecting such data over time. OSD and the combatant commands should improve their oversight and management of the RCs to ensure alignment with department- and theater-level objectives. In addition, OSD should maintain the RCs' focus on regional security challenges rather than refashioning them to address specific threats. Options to consider for greater impact include evaluating the balance between core residential courses and in-region workshops and determining whether and to what extent the centers should develop customized programs for DoD components so as to secure funds beyond the core budget they receive from OSD
    Abstract: The five U.S. Department of Defense (DoD) Regional Centers for Security Studies have been helping partner nations build strategic capacity for almost 20 years. However, recent DoD budget constraints have put pressure on the regional centers (RCs) to increase efficiency. The Office of the Secretary of Defense (OSD) asked RAND to conduct a study on the overall impact of the RCs, their effectiveness in advancing DoD policy priorities, the ways in which they assess their programs, and ways in which they could improve their impact and efficiency and the resulting outcomes. The RAND study team found that centers have had great success at the missions they have undertaken. They are high-impact components of U.S. security cooperation and engagement efforts, despite their relatively small budgets. The team identified 24 ways in which the centers advance U.S. interests, including building partner capacity, building relationships, fostering pro-U.S. outlooks, offering unique opportunities for engagement, and promoting regional dialogue that reduces tensions. However, RCs should improve impact-oriented data collection and analysis for improved assessment, methodically collecting such data over time. OSD and the combatant commands should improve their oversight and management of the RCs to ensure alignment with department- and theater-level objectives. In addition, OSD should maintain the RCs' focus on regional security challenges rather than refashioning them to address specific threats. Options to consider for greater impact include evaluating the balance between core residential courses and in-region workshops and determining whether and to what extent the centers should develop customized programs for DoD components so as to secure funds beyond the core budget they receive from OSD
    Note: "Prepared for the Office of the Secretary of Defense , "RR-388-OSD"--Page 4 of cover , "National Defense Research Institute , Includes bibliographical references (pages 145-152)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    ISBN: 9780833085412 , 0833085417 , 9780833085740 , 0833085743 , 9780833087119 , 012415817X , 0833087118 , 9780124158177
    Language: English
    Pages: 1 Online-Ressource (xv, 65 pages)
    Parallel Title: Print version Ablon, Lillian Markets for cybercrime tools and stolen data
    DDC: 364.168
    Keywords: Hacking ; Computer crimes Economic aspects ; Black market ; Data protection ; Hacking ; Computer crimes ; Black market ; Data protection ; Hacking ; Schwarzmarkt ; Datensicherung ; Internetkriminalität ; Computerkriminalität ; Criminology, Penology & Juvenile Delinquency ; Social Sciences ; Social Welfare & Social Work ; COMPUTERS ; Internet ; Security ; Grässe ; SOCIAL SCIENCE ; Criminology ; Black market ; Data protection ; Electronic books
    Abstract: Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report, part of a multiphase study on the future security environment, describes the fundamental characteristics of these markets and how they have grown into their current state to explain how their existence can harm the information security environment. Understanding the current and predicted landscape for these markets lays the groundwork for follow-on exploration of options to minimize the potentially harmful influence these markets impart. Experts agree that the coming years will bring more activity in darknets, more use of crypto-currencies, greater anonymity capabilities in malware, and more attention to encrypting and protecting communications and transactions; that the ability to stage cyberattacks will likely outpace the ability to defend against them; that crime will increasingly have a networked or cyber component, creating a wider range of opportunities for black markets; and that there will be more hacking for hire, as-a-service offerings, and brokers. Experts disagree, however, on who will be most affected by the growth of the black market (e.g., small or large businesses, individuals), what products will be on the rise (e.g., fungible goods, such as data records and credit card information; non-fungible goods, such as intellectual property), or which types of attacks will be most prevalent (e.g., persistent, targeted attacks; opportunistic, mass "smash-and-grab" attacks)
    Abstract: Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report, part of a multiphase study on the future security environment, describes the fundamental characteristics of these markets and how they have grown into their current state to explain how their existence can harm the information security environment. Understanding the current and predicted landscape for these markets lays the groundwork for follow-on exploration of options to minimize the potentially harmful influence these markets impart. Experts agree that the coming years will bring more activity in darknets, more use of crypto-currencies, greater anonymity capabilities in malware, and more attention to encrypting and protecting communications and transactions; that the ability to stage cyberattacks will likely outpace the ability to defend against them; that crime will increasingly have a networked or cyber component, creating a wider range of opportunities for black markets; and that there will be more hacking for hire, as-a-service offerings, and brokers. Experts disagree, however, on who will be most affected by the growth of the black market (e.g., small or large businesses, individuals), what products will be on the rise (e.g., fungible goods, such as data records and credit card information; non-fungible goods, such as intellectual property), or which types of attacks will be most prevalent (e.g., persistent, targeted attacks; opportunistic, mass "smash-and-grab" attacks)
    Note: "RR-610-JNI."--Page 4 of cover , "The research described in this report was sponsored by Juniper Networks and conducted within the Acquisition and Technology Policy Center of the RAND National Security Research Division"--Title page verso , Includes bibliographical references (pages 53-65)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    ISBN: 9780833080981 , 0833084607 , 0833080989 , 9780833084606
    Language: English
    Pages: 1 Online-Ressource (57 pages)
    Parallel Title: Erscheint auch als Paul, Christopher, 1971- RAND security cooperation prioritization and propensity matching tool
    Keywords: Security, International ; Decision making Data processing ; Military assistance, American Planning ; National security International cooperation ; Security, International ; Decision making ; Military assistance, American ; National security ; Security, International ; United States ; Law, Politics & Government ; International Relations ; Military policy ; POLITICAL SCIENCE ; Security (National & International) ; Decision making ; Data processing ; Diplomatic relations ; National security ; International cooperation ; United States Foreign relations 1989- ; United States Military policy ; United States ; United States ; Electronic books
    Abstract: Security cooperation is the umbrella term used to describe a wide range of programs and activities with such goals as building relationships between the United States and partner countries, developing these countries' security capabilities, and facilitating contingency and peacetime access by U.S. forces. With increased pressure on defense spending, the scope and budget for these activities are likely to decrease. Therefore, it will be important for the U.S. Department of Defense to scrutinize and, perhaps, reevaluate current and proposed security cooperation efforts, ensuring that expected benefits align with costs and corresponding policy priorities. Recent RAND research identified practices and contextual factors associated with greater or lesser degrees of success in security cooperation, using 29 historical case studies of U.S. efforts to build partner capacity since the end of the Cold War. The RAND Security Cooperation Prioritization and Propensity Matching Tool applies these findings and results from other existing research to all current and potential security cooperation partners. This customizable diagnostic tool, built in Microsoft Excel®, will help planners preliminarily identify mismatches between the importance of a country to U.S. interests, funding for initiatives, and the propensity for successful U.S. security cooperation with a given country. For each of the world's 195 countries, the tool produces an overall security cooperation propensity score. Planners can then compare these scores with available funding and security cooperation priorities. The tool has the virtues of being systematic, being based on global data, and not relying on subjective assessments. Strategic thinking and nuanced understanding of individual countries remain important, but the tool is useful in helping to identify which countries to scrutinize
    Abstract: Security cooperation is the umbrella term used to describe a wide range of programs and activities with such goals as building relationships between the United States and partner countries, developing these countries' security capabilities, and facilitating contingency and peacetime access by U.S. forces. With increased pressure on defense spending, the scope and budget for these activities are likely to decrease. Therefore, it will be important for the U.S. Department of Defense to scrutinize and, perhaps, reevaluate current and proposed security cooperation efforts, ensuring that expected benefits align with costs and corresponding policy priorities. Recent RAND research identified practices and contextual factors associated with greater or lesser degrees of success in security cooperation, using 29 historical case studies of U.S. efforts to build partner capacity since the end of the Cold War. The RAND Security Cooperation Prioritization and Propensity Matching Tool applies these findings and results from other existing research to all current and potential security cooperation partners. This customizable diagnostic tool, built in Microsoft Excel®, will help planners preliminarily identify mismatches between the importance of a country to U.S. interests, funding for initiatives, and the propensity for successful U.S. security cooperation with a given country. For each of the world's 195 countries, the tool produces an overall security cooperation propensity score. Planners can then compare these scores with available funding and security cooperation priorities. The tool has the virtues of being systematic, being based on global data, and not relying on subjective assessments. Strategic thinking and nuanced understanding of individual countries remain important, but the tool is useful in helping to identify which countries to scrutinize
    Note: "RAND National Defense Research Institute , "This research was ... conducted within the International Security and Defense Policy Center of the RAND National Defense Research Institute"--Preface , Includes bibliographical references (pages 51-57)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    ISBN: 9780833085405 , 0833085409 , 9780833081490 , 0833084712 , 0833081497 , 9780833084712
    Language: English
    Pages: 1 Online-Ressource (x, 71 pages)
    Series Statement: Rand Corporation research report RR378
    Parallel Title: Print version Speier, Richard Penaid nonproliferation
    Keywords: Ballistic missile defenses ; Weapons of mass destruction ; National security ; Ballistic missile defenses ; Weapons of mass destruction ; National security ; National security ; Weapons of mass destruction ; TECHNOLOGY & ENGINEERING ; Military Science ; United States ; HISTORY ; Military ; Weapons ; Ballistic missile defenses ; Military readiness ; United States Defenses ; United States ; Electronic books
    Abstract: An attacker's missile-borne countermeasures to ballistic missile defenses are known as penetration aids, or penaids. To support efforts to prevent the proliferation of penaid-related items, this research recommends controls on potential exports according to the structure of the international Missile Technology Control Regime
    Abstract: An attacker's missile-borne countermeasures to ballistic missile defenses are known as penetration aids, or penaids. To support efforts to prevent the proliferation of penaid-related items, this research recommends controls on potential exports according to the structure of the international Missile Technology Control Regime
    Note: "National Defense Research Institute , "RR-378-DTRA"--Page 4 of cover , "Prepared for the Naval Postgraduate School, Project on Advanced Systems and Concepts for Combating WMD , Includes bibliographical references (pages 69-71)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    ISBN: 9780833079312 , 0833083783 , 083307931X , 9780833083784
    Language: English
    Pages: 1 Online-Ressource (xiii, 56 pages)
    Series Statement: Rand Corporation research report series RR-100-AF
    Series Statement: RAND Project AIR FORCE series on resiliency
    Keywords: United States Airmen ; Religious life ; United States Civilian employees ; Religious life ; United States ; United States ; Resilience (Personality trait) ; Families of military personnel Religious life ; Resilience (Personality trait) ; Families of military personnel ; MEDICAL ; Preventive Medicine ; Resilience (Personality trait) ; Social Sciences ; Psychology ; United States ; United States ; Electronic books
    Abstract: This report is one of a series designed to support Air Force leaders in promoting resilience among its Airmen, civilian employees, and Air Force families. It examines the relationship between spiritual fitness and resilience, using key constructs found in the scientific literature: a spiritual worldview, personal religious or spiritual practices, support from a spiritual community, and spiritual coping. The literature shows that possessing a sense of meaning and purpose in life is strongly positively related to quality of life and improved health and functioning. The authors find that diverse types of spiritual interventions are linked to improved resilience and well-being. These interventions focus mainly on the individual, but some address the military unit, the family, and the community
    Abstract: This report is one of a series designed to support Air Force leaders in promoting resilience among its Airmen, civilian employees, and Air Force families. It examines the relationship between spiritual fitness and resilience, using key constructs found in the scientific literature: a spiritual worldview, personal religious or spiritual practices, support from a spiritual community, and spiritual coping. The literature shows that possessing a sense of meaning and purpose in life is strongly positively related to quality of life and improved health and functioning. The authors find that diverse types of spiritual interventions are linked to improved resilience and well-being. These interventions focus mainly on the individual, but some address the military unit, the family, and the community
    Note: "RAND Project AIR FORCE , "Prepared for the United States Air Force , Includes bibliographical references (pages 43-56)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    ISBN: 9780833080929 , 0833083368 , 083308092X , 9780833083364
    Language: English
    Pages: 1 Online-Ressource (xliii, 258 pages)
    Parallel Title: Available in another form
    Parallel Title: Available in another form
    Keywords: Violence Forecasting ; Criminal behavior Research ; Methodology ; Terrorists Psychology ; Terrorists Social conditions ; Criminal behavior, Prediction of ; Terrorism Prevention ; Violence ; Criminal behavior ; Terrorists ; Terrorists ; Criminal behavior, Prediction of ; Terrorism ; Behavioral Research ; Behavioral Sciences ; Crime ; Criminology ; Disciplines and Occupations ; Natural Science Disciplines ; Psychiatry and Psychology ; Research ; Science ; Social Problems ; Social Sciences ; Sociology ; Terrorism ; Violence ; Anthropology, Education, Sociology and Social Phenomena ; Behavioral Disciplines and Activities ; Criminal behavior, Prediction of ; Social Welfare & Social Work ; Social Sciences ; SOCIAL SCIENCE ; Criminology ; Criminology, Penology & Juvenile Delinquency ; Terrorists ; Psychology ; Criminal behavior ; Research ; Methodology ; Terrorism ; Prevention ; Violence ; Forecasting ; Electronic books
    Abstract: Government organizations have put substantial effort into detecting and thwarting terrorist and insurgent attacks by observing suspicious behaviors of individuals at transportation checkpoints and elsewhere. This report reviews the scientific literature relating to observable, individual-level behavioral indicators that might-along with other information-help detect potential violent attacks. The report focuses on new or nontraditional technologies and methods, most of which exploit (1) data on communication patterns, (2) "pattern-of-life" data, and/or (3) data relating to body movement and physiological state. To help officials set priorities for special attention and investment, the report proposes an analytic framework for discussion and evaluation; it also urges investment in cost-effectiveness analysis and more vigorous, routine, and sustained efforts to measure real-world effectiveness of methods. One cross-cutting conclusion is that methods for behavioral observation are typically not reliable enough to stand alone; success in detection will depend on information fusion across types of behaviors and time. How to accomplish such fusion is understudied. Finally, because many aspects of using behavioral observations are highly controversial, both scientifically and because of privacy and civil-liberties concerns, the report sharpens the underlying perspectives and suggests ways to resolve some of the controversy while significantly mitigating problems that definitely exist
    Abstract: Government organizations have put substantial effort into detecting and thwarting terrorist and insurgent attacks by observing suspicious behaviors of individuals at transportation checkpoints and elsewhere. This report reviews the scientific literature relating to observable, individual-level behavioral indicators that might-along with other information-help detect potential violent attacks. The report focuses on new or nontraditional technologies and methods, most of which exploit (1) data on communication patterns, (2) "pattern-of-life" data, and/or (3) data relating to body movement and physiological state. To help officials set priorities for special attention and investment, the report proposes an analytic framework for discussion and evaluation; it also urges investment in cost-effectiveness analysis and more vigorous, routine, and sustained efforts to measure real-world effectiveness of methods. One cross-cutting conclusion is that methods for behavioral observation are typically not reliable enough to stand alone; success in detection will depend on information fusion across types of behaviors and time. How to accomplish such fusion is understudied. Finally, because many aspects of using behavioral observations are highly controversial, both scientifically and because of privacy and civil-liberties concerns, the report sharpens the underlying perspectives and suggests ways to resolve some of the controversy while significantly mitigating problems that definitely exist
    Note: "RAND National Security Research Division , "The research was conducted within the International Security and Defense Policy Center of the RAND National Defense Research Institute"--Title page verso , Includes bibliographical references (pages 225-258)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    ISBN: 9780833082107 , 0833084658 , 0833082108 , 9780833084651
    Language: English
    Pages: 1 Online-Ressource (xxix, 196 pages)
    Series Statement: Rand Corporation research report series RR-413-OSD
    Keywords: Nation-building Evaluation ; National security International cooperation ; Evaluation ; Nation-building ; National security ; Law, Politics & Government ; International Relations ; United States ; POLITICAL SCIENCE ; Political Freedom ; Electronic books
    Abstract: Security cooperation has long been an important instrument of the U.S. government and the Department of Defense for advancing national security objectives vis-à-vis allies and partner countries, including building critical relationships, securing peacetime and contingency access, and building partner capacity (BPC). One of the key challenges for policymakers and combatant commands is gaining a more complete understanding of the real value of BPC activities. Assessments of prior and ongoing BPC activities, in particular, have become increasingly important given the current fiscal climate and budgetary limitations. But it is no easy task to assess the value of what are essentially qualitative activities, and data limitations severely hinder assessments. The tools available -- such as resources, authorities, programs, processes, and organizational relationships -- may or may not be the optimal ones for the delivery of BPC activities to partner countries. This report characterizes security cooperation mechanisms used by combatant commands for BPC, produces a detailed database of the mechanism elements, develops and applies a preliminary means of evaluating the effectiveness and efficiency of select mechanisms, and draws on the analysis from the case studies to recommend ways to improve the effectiveness and efficiency of those mechanisms in the future
    Abstract: Security cooperation has long been an important instrument of the U.S. government and the Department of Defense for advancing national security objectives vis-à-vis allies and partner countries, including building critical relationships, securing peacetime and contingency access, and building partner capacity (BPC). One of the key challenges for policymakers and combatant commands is gaining a more complete understanding of the real value of BPC activities. Assessments of prior and ongoing BPC activities, in particular, have become increasingly important given the current fiscal climate and budgetary limitations. But it is no easy task to assess the value of what are essentially qualitative activities, and data limitations severely hinder assessments. The tools available -- such as resources, authorities, programs, processes, and organizational relationships -- may or may not be the optimal ones for the delivery of BPC activities to partner countries. This report characterizes security cooperation mechanisms used by combatant commands for BPC, produces a detailed database of the mechanism elements, develops and applies a preliminary means of evaluating the effectiveness and efficiency of select mechanisms, and draws on the analysis from the case studies to recommend ways to improve the effectiveness and efficiency of those mechanisms in the future
    Note: "National Defense Research Institute , "Prepared for the Joint Staff and OSD/CAPE , Includes bibliographical references (pages 193-196)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    ISBN: 9780833081223 , 0833081225 , 9780833080301 , 083308030X
    Language: English
    Pages: 1 Online-Ressource (xiii, 30 pages)
    Parallel Title: Print version Price, Carter C Economic impact of Medicaid expansion on Pennsylvania
    Keywords: United States ; United States ; Insurance ; Federal government ; Medicaid Economic aspects ; Insurance ; Federal government ; Medicaid ; Patient Protection and Affordable Care Act ; Insurance, Health ; Medicaid economics ; Government ; Insurance ; Appalachian Region ; Social Sciences ; United States ; Public Assistance ; Anthropology, Education, Sociology and Social Phenomena ; Organizations ; Financing, Organized ; Social Control, Formal ; Health Care Economics and Organizations ; Financing, Government ; North America ; Delivery of Health Care ; Americas ; Geographic Locations ; Geographicals ; Economics ; Federal Government ; Medical Assistance ; Legislation as Topic ; Insurance Coverage ; Public Health ; Health & Biological Sciences ; Medical Care Plans ; Pennsylvania ; MEDICAL ; Medicaid & Medicare ; Patient Protection and Affordable Care Act (United States) ; Federal government ; Insurance ; Medicaid ; Economic aspects ; Pennsylvania ; Electronic book
    Abstract: The Affordable Care Act is a substantial reform of the U.S. health care insurance system. Using the RAND COMPARE model, researchers assessed the act's potential economic effects on Pennsylvania, factoring in an optional expansion of Medicaid, and found the state would enjoy significant net benefits. With or without the expansion of Medicaid, the act will increase insurance coverage to hundreds of thousands of Pennsylvanians, but the COMPARE model estimates that the expansion of Medicaid eligibility would cover an additional 350,000 people and bring more than 2 billion dollars in federal spending into the state annually than if the state did not expand. Should the state expand Medicaid, the additional spending will add more than 3 billion dollars a year to the state's GDP and support 35,000 jobs. But Medicaid expansion is not without cost for the state; the estimated cumulative effect on Pennsylvania's Medicaid spending will be 180 million dollars higher with the expansion than without between 2014 and 2020. Substantial reductions in uncompensated care costs for hospitals are possible even without expansion, but savings to hospitals for uncompensated care funding are even larger with the Medicaid expansion, amounting to 550 million dollars or more each year
    Note: "RAND Health , Includes bibliographical references (pages 29-30)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    ISBN: 9780833076854 , 0833079743 , 083307685X , 9780833079749
    Language: English
    Pages: 1 Online-Ressource (xxii, 146 pages)
    Series Statement: RAND Corporation monograph series MG1241
    Parallel Title: Print version Modeling terrorism risk to the air transportation system
    Keywords: United States Rules and practice ; Evaluation ; United States ; Terrorism Prevention ; Aeronautics Safety measures ; Evaluation ; Aeronautics, Commercial Security measures ; Evaluation ; Risk management Mathematical models ; Terrorism ; Aeronautics ; Aeronautics, Commercial ; Risk management ; Social Welfare & Social Work ; Social Sciences ; Criminology, Penology & Juvenile Delinquency ; United States ; POLITICAL SCIENCE ; Political Freedom ; Risk management ; Mathematical models ; Terrorism ; Prevention ; United States ; Electronic book
    Abstract: RAND evaluated a terrorism risk modeling tool developed by the Transportation Security Administration and Boeing to help guide program planning for aviation security. This tool, the Risk Management Analysis Tool, or RMAT, is used by TSA to estimate the terrorism risk-reduction benefits attributable to new and existing security programs, technologies, and procedures. RMAT simulates terrorist behavior and success in attacking vulnerabilities in the domestic commercial air transportation system, drawing on estimates of terrorist resources, capabilities, preferences, decision processes, intelligence collection, and operational planning. It describes how the layers of security protecting the air transportation system are likely to perform when confronted by more than 60 types of attacks, drawing on detailed blast and other physical modeling to understand the damage produced by different weapons and attacks, and calculating expected loss of life and the direct and indirect economic consequences of that damage. This report describes RAND's conclusions about the validity of RMAT for TSA's intended uses and its recommendations for how TSA should perform cost-benefit analyses of its security programs
    Abstract: RAND evaluated a terrorism risk modeling tool developed by the Transportation Security Administration and Boeing to help guide program planning for aviation security. This tool, the Risk Management Analysis Tool, or RMAT, is used by TSA to estimate the terrorism risk-reduction benefits attributable to new and existing security programs, technologies, and procedures. RMAT simulates terrorist behavior and success in attacking vulnerabilities in the domestic commercial air transportation system, drawing on estimates of terrorist resources, capabilities, preferences, decision processes, intelligence collection, and operational planning. It describes how the layers of security protecting the air transportation system are likely to perform when confronted by more than 60 types of attacks, drawing on detailed blast and other physical modeling to understand the damage produced by different weapons and attacks, and calculating expected loss of life and the direct and indirect economic consequences of that damage. This report describes RAND's conclusions about the validity of RMAT for TSA's intended uses and its recommendations for how TSA should perform cost-benefit analyses of its security programs
    Note: At head of title: RAND Homeland Security and Defense Center , Includes bibliographical references (pages 135-146)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    ISBN: 9780833073846 , 0833073842 , 9780833073402 , 0833073826 , 0833073400 , 9780833073822
    Language: English
    Pages: 1 Online-Ressource (xvii, 50 pages)
    Series Statement: Rand Corporation monograph series MG-1211-AF
    Parallel Title: Print version U.S. overseas military presence
    DDC: 355/.033573
    Keywords: National security Planning ; Military bases, American ; National security ; Military bases, American ; National security ; Planning ; Military & Naval Science ; Law, Politics & Government ; Armies ; HISTORY ; Military ; Other ; TECHNOLOGY & ENGINEERING ; Military Science ; Armed Forces ; Military policy ; Planning ; Military readiness ; Military readiness ; Planning ; United States ; United States Armed Forces ; United States Military policy ; Planning ; United States Defenses ; United States Defenses ; Planning ; United States ; United States ; United States ; United States ; Electronic books
    Abstract: "Since World War II, the United States has relied on a global network of military bases and forces to protect its interests and those of its allies. But the international environment has changed greatly over the decades, and economic concerns have risen, leading some to debate just what America's role should now be in the world. This monograph addresses one aspect of this debate by introducing a new analytical approach to defining future U.S. military presence overseas. It does so by first considering U.S. global security interests, then focusing on specific threats to them in East Asia, Europe, and the Middle East. With that, the researchers designed a menu of global postures based on different strategic perspectives. They evaluated the global postures in terms of their operational performance and then compared them in terms of their associated U.S. Air Force bases, combat forces, active-duty personnel, and base operating costs. These analyses offer insights on the critical strategic choices that policymakers need to address and that the public needs to debate as they consider future overseas U.S. military presence. Among these choices are for the United States to depend more on its allies, rely more on U.S. based military forces, focus its presence more on East Asia or on the Middle East, or retain its current overseas presence in the face of expanding threats. Those involved in debates on the future global U.S. posture will need to make explicit their implicit underlying perspectives on what role overseas military presence can play in achieving U.S. global security interests."--Publisher's description
    Abstract: Introduction -- Path to defining future global U.S. postures -- Comparison of global postures -- Strategic choices: Overseas U.S. military presence -- Appendix A. Protecting the global commons: confusing means with ends -- Appendix B. Database of current U.S. bases overseas -- Appendix C. Comparison of global postures
    Abstract: "Since World War II, the United States has relied on a global network of military bases and forces to protect its interests and those of its allies. But the international environment has changed greatly over the decades, and economic concerns have risen, leading some to debate just what America's role should now be in the world. This monograph addresses one aspect of this debate by introducing a new analytical approach to defining future U.S. military presence overseas. It does so by first considering U.S. global security interests, then focusing on specific threats to them in East Asia, Europe, and the Middle East. With that, the researchers designed a menu of global postures based on different strategic perspectives. They evaluated the global postures in terms of their operational performance and then compared them in terms of their associated U.S. Air Force bases, combat forces, active-duty personnel, and base operating costs. These analyses offer insights on the critical strategic choices that policymakers need to address and that the public needs to debate as they consider future overseas U.S. military presence. Among these choices are for the United States to depend more on its allies, rely more on U.S. based military forces, focus its presence more on East Asia or on the Middle East, or retain its current overseas presence in the face of expanding threats. Those involved in debates on the future global U.S. posture will need to make explicit their implicit underlying perspectives on what role overseas military presence can play in achieving U.S. global security interests."--Publisher's description
    Note: "This research was conducted in the Strategy and Doctrine Program of RAND Project Air Force"--Preface , "RAND Project Air Force , Includes bibliographical references (pages 47-50)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    ISBN: 9780833078063 , 0833083171 , 0833078062 , 9780833083173
    Language: English
    Pages: 1 Online-Ressource (xv, 26 pages)
    Keywords: Law enforcement Information technology ; Law enforcement Data processing ; Criminal justice, Administration of Data processing ; Criminal justice, Administration of Information technology ; Law enforcement ; Law enforcement ; Criminal justice, Administration of ; Criminal justice, Administration of ; United States ; Criminal justice, Administration of ; Data processing ; Law enforcement ; Data processing ; Social Welfare & Social Work ; POLITICAL SCIENCE ; Political Freedom ; Social Sciences ; Criminology, Penology & Juvenile Delinquency ; Electronic books
    Abstract: The National Institute of Justice strives to assist criminal justice practitioners on behalf of the Department of Justice through the scientific research, development, and evaluation of technologies and methods. Given that there are nearly 18,000 state and local law enforcement agencies in the United States, this is a challenge of great complexity, breadth, and depth. Thus, it is crucial to be aware of agencies' technology needs, as well as how they might learn about promising technologies and applications. To this end, RAND researchers conducted interviews with an extensive sample group to determine criminal justice technology priorities at the state and local levels, as well as the means by which these agencies commonly receive information on technology and the effectiveness of outreach efforts by the National Law Enforcement and Corrections Technology Center. Interview results indicated a strong across-the-board desire for knowledge management systems and low-cost, easily maintained surveillance systems, and further indicated that the Center needs to expand its outreach efforts to professional associations
    Abstract: The National Institute of Justice strives to assist criminal justice practitioners on behalf of the Department of Justice through the scientific research, development, and evaluation of technologies and methods. Given that there are nearly 18,000 state and local law enforcement agencies in the United States, this is a challenge of great complexity, breadth, and depth. Thus, it is crucial to be aware of agencies' technology needs, as well as how they might learn about promising technologies and applications. To this end, RAND researchers conducted interviews with an extensive sample group to determine criminal justice technology priorities at the state and local levels, as well as the means by which these agencies commonly receive information on technology and the effectiveness of outreach efforts by the National Law Enforcement and Corrections Technology Center. Interview results indicated a strong across-the-board desire for knowledge management systems and low-cost, easily maintained surveillance systems, and further indicated that the Center needs to expand its outreach efforts to professional associations
    Note: "RAND Center on Quality Policing , "This project was ... conducted in the Safety and Justice Program of RAND Justice, Infrastructure, and Environment"--Title page verso , Includes bibliographical references (pages 25-26)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    ISBN: 9780833052582 , 0833052748 , 0833052586 , 9780833052742
    Language: English
    Pages: 1 Online-Ressource (xx, 66 pages)
    Series Statement: RAND Corporation technical report series TR906
    Parallel Title: Print version Asch, Beth J Mitigating corruption in government security forces
    Keywords: Police Government policy ; Police administration ; Police Personnel management ; Police corruption ; Police ; Police administration ; Police ; Police corruption ; Police corruption ; Police ; Government policy ; Police ; Personnel management ; Social Welfare & Social Work ; Social Sciences ; Criminology, Penology & Juvenile Delinquency ; Mexico ; POLITICAL SCIENCE ; Political Freedom & Security ; Law Enforcement ; POLITICAL SCIENCE ; Law Enforcement ; Police administration ; Electronic books
    Abstract: Corruption in the Mexican police forces is widely acknowledged and longstanding. The Mexican government has undertaken police reforms in recent years that have focused on professionalizing the Mexican police. Key components of these reforms have been changes in compensation and personnel policies as a way of creating a civil service for police personnel. Whether these reforms are the right ones or have helped are open questions. In this report, we draw on the literature on corruption and personnel incentives and analyze household survey data and other information related to police reform in Mexico. The study's objectives were to address questions about the roots of corruption and the tools that could be used to mitigate corruption, with a focus on compensation and personnel management policies. We also provide an initial assessment, based on available information, about the effectiveness of these policies. The report should be of interest to the broad policy and research communities concerned about police corruption in general and in Mexico specifically
    Abstract: Corruption in the Mexican police forces is widely acknowledged and longstanding. The Mexican government has undertaken police reforms in recent years that have focused on professionalizing the Mexican police. Key components of these reforms have been changes in compensation and personnel policies as a way of creating a civil service for police personnel. Whether these reforms are the right ones or have helped are open questions. In this report, we draw on the literature on corruption and personnel incentives and analyze household survey data and other information related to police reform in Mexico. The study's objectives were to address questions about the roots of corruption and the tools that could be used to mitigate corruption, with a focus on compensation and personnel management policies. We also provide an initial assessment, based on available information, about the effectiveness of these policies. The report should be of interest to the broad policy and research communities concerned about police corruption in general and in Mexico specifically
    Note: Includes bibliographical references (pages 59-66) , Title from PDF title screen (viewed on Sept. 8, 2011)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    ISBN: 9780833052629 , 0833059114 , 0833052624 , 9780833059116
    Language: English
    Pages: 1 Online-Ressource (xxiii, 129 pages)
    Series Statement: RAND Corporation technical report series TR972
    Parallel Title: Print version Lessons from U.S. allies in security cooperation with third countries
    Keywords: Military policy Case studies ; National security Case studies International cooperation ; Military policy ; National security ; National security ; International cooperation ; Military & Naval Science ; Law, Politics & Government ; Armies ; HISTORY ; Military ; Other ; Australia ; France ; Great Britain ; United States ; Australia ; security policy ; cooperation ; France ; security policy ; cooperation ; UK ; security policy ; cooperation ; TECHNOLOGY & ENGINEERING ; Military Science ; HISTORY ; Military ; Strategy ; Military policy ; Military relations ; Case studies ; France Military relations ; Great Britain Military relations ; United States Military relations ; Australia Military relations ; France ; Great Britain ; United States ; Australia ; Electronic book
    Abstract: Introduction -- Australia's Approach to Security Cooperation -- France's Approach to Security Cooperation -- The United Kingdom's Approach to Security Cooperation -- Comparing the Case Studies -- Conclusions and Recommendations -- Appendix A: Royal Australian Air Force Activities with Foreign Partners -- Appendix B: Brazilian Air Force Activities with Foreign Partners -- Appendix C: Chilean Air Force Activities with Foreign Partners -- Appendix D: Colombian Air Force Activities with Foreign Partners -- Appendix E: French Air Force Activities with Foreign Partners -- Appendix F: Indian Air Force Activities with Foreign Partners -- Appendix G: Israeli Air and Space Force Activities with Foreign Partners -- Appendix H: Japan Air Self-Defense Force Activities with Foreign Partners -- Appendix I: Pakistan Air Force Activities with Foreign Partners -- Appendix J: Republic of Korea Air Force Activities with Foreign Partners -- Appendix K: Singapore Air Force Activities with Foreign Partners -- Appendix L: South African Air Force Activities with Foreign Partners -- Appendix M: United Arab Emirates Air Force Activities with Foreign Partners -- Appendix N: Royal Air Force Activities with Foreign Partners
    Abstract: Introduction -- Australia's Approach to Security Cooperation -- France's Approach to Security Cooperation -- The United Kingdom's Approach to Security Cooperation -- Comparing the Case Studies -- Conclusions and Recommendations -- Appendix A: Royal Australian Air Force Activities with Foreign Partners -- Appendix B: Brazilian Air Force Activities with Foreign Partners -- Appendix C: Chilean Air Force Activities with Foreign Partners -- Appendix D: Colombian Air Force Activities with Foreign Partners -- Appendix E: French Air Force Activities with Foreign Partners -- Appendix F: Indian Air Force Activities with Foreign Partners -- Appendix G: Israeli Air and Space Force Activities with Foreign Partners -- Appendix H: Japan Air Self-Defense Force Activities with Foreign Partners -- Appendix I: Pakistan Air Force Activities with Foreign Partners -- Appendix J: Republic of Korea Air Force Activities with Foreign Partners -- Appendix K: Singapore Air Force Activities with Foreign Partners -- Appendix L: South African Air Force Activities with Foreign Partners -- Appendix M: United Arab Emirates Air Force Activities with Foreign Partners -- Appendix N: Royal Air Force Activities with Foreign Partners
    Note: "Project Air Force , Includes bibliographical references (pages 121-129) , Title from PDF title screen (viewed Oct. 9, 2011)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    Santa Monica, CA : RAND
    ISBN: 9780833058225 , 0833058223
    Language: English
    Pages: 1 Online-Ressource (xviii, 63 pages)
    Series Statement: Technical report TR-991-DOJ
    Parallel Title: Print version National evaluation of Safe Start Promising Approaches
    Keywords: Safe Start Promising Approaches (Program) Evaluation ; Safe Start Promising Approaches (Program) ; Children and violence Prevention ; Children Services for ; Evaluation ; Child welfare ; Children and violence ; Children ; Child welfare ; Child Health Services ; Child Welfare ; Child ; Community Health Services ; Crime ; Criminology ; Delivery of Health Care ; Evaluation Studies as Topic ; Health Care Evaluation Mechanisms ; Health Care Facilities, Manpower, and Services ; Health Care Quality, Access, and Evaluation ; Health Services Administration ; Health Services ; Investigative Techniques ; Named Groups ; Persons ; Program Evaluation ; Quality of Health Care ; Social Problems ; Social Sciences ; Social Welfare ; Sociology ; Violence ; Age Groups ; Analytical, Diagnostic and Therapeutic Techniques and Equipment ; Anthropology, Education, Sociology and Social Phenomena ; United States ; Children and violence ; Prevention ; Children ; Services for ; Evaluation ; Social Welfare & Social Work ; Evaluation ; Child welfare ; Safe Start Promising Approaches (Program) ; Social Sciences ; Child & Youth Development ; Electronic books
    Abstract: "Safe Start Promising Approaches (SSPA) is the second phase of a community-based initiative focused on developing and fielding interventions to prevent and reduce the impact of children's exposure to violence (CEV). This report shares the results of SSPA, which was intended to implement and evaluate promising and evidence-based programs in community settings. Fifteen program sites across the country were selected to implement a range of interventions for helping children and families cope with the effects of CEV. The settings, populations served, intervention types, types of violence addressed, community partners, and program goals differed across the 15 sites. The main body of this report provides information on the designs of the studies, instruments used, data collection and cleaning, analytic methods, and an overview of the results across the 15 sites. The appendixes provide a detailed description of the outcome evaluation conducted at each SSPA program, including a description of the enrollees, enrollment and retention, the amount and type of services received, and child and family outcomes over time."--Publisher's website
    Abstract: "Safe Start Promising Approaches (SSPA) is the second phase of a community-based initiative focused on developing and fielding interventions to prevent and reduce the impact of children's exposure to violence (CEV). This report shares the results of SSPA, which was intended to implement and evaluate promising and evidence-based programs in community settings. Fifteen program sites across the country were selected to implement a range of interventions for helping children and families cope with the effects of CEV. The settings, populations served, intervention types, types of violence addressed, community partners, and program goals differed across the 15 sites. The main body of this report provides information on the designs of the studies, instruments used, data collection and cleaning, analytic methods, and an overview of the results across the 15 sites. The appendixes provide a detailed description of the outcome evaluation conducted at each SSPA program, including a description of the enrollees, enrollment and retention, the amount and type of services received, and child and family outcomes over time."--Publisher's website
    Note: "RAND Health and Infrastructure, Safety, and Environment , "This research was conducted under the auspices of the Safety and Justice Program with RAND Infrastructure, Safety, and Environment (ISE) and under RAND Health's Health Promotion and Disease Prevention Program , Includes bibliographical references (pages 59-63)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    ISBN: 9780833051479 , 0833051474 , 9780833051219 , 0833051601 , 0833051210 , 9780833051608
    Language: English
    Pages: 1 Online-Ressource (30 pages)
    Series Statement: Technical report TR-918-ISEC
    Parallel Title: Print version Toward a comparison of DNA profiling and databases in the United States and England
    Keywords: Chemistry, Forensic ; DNA Analysis ; Evidence, Criminal ; Social sciences ; Chemistry, Forensic ; Evidence, Criminal ; Evidence, Criminal ; Chemistry, Forensic ; DNA ; Evidence, Criminal ; Social sciences ; Chemistry, Forensic ; Evidence, Criminal ; Evidence, Criminal ; Analytical, Diagnostic and Therapeutic Techniques and Equipment ; Anthropology, Education, Sociology and Social Phenomena ; Biometric Identification ; Biometry ; Chemicals and Drugs ; Criminology ; DNA Fingerprinting ; DNA ; Databases as Topic ; Databases, Factual ; Databases, Genetic ; Databases, Nucleic Acid ; Disciplines and Occupations ; Epidemiologic Methods ; Forensic Genetics ; Forensic Medicine ; Forensic Sciences ; Genetic Techniques ; Health Occupations ; Information Science ; Information Storage and Retrieval ; Information Systems ; Investigative Techniques ; Medical Informatics Applications ; Medical Informatics ; Medicine ; Nucleic Acids, Nucleotides, and Nucleosides ; Nucleic Acids ; Social Sciences ; Statistics as Topic ; LAW ; Criminal Law ; General ; Chemistry, Forensic ; DNA ; Analysis ; Evidence, Criminal ; Social sciences ; England ; Great Britain ; United States ; LAW ; Forensic Science ; Electronic books
    Abstract: Introduction -- How do the U.S. and English systems and processes compare? -- How do turnaround and backlog compare in the U.S. and English systems? -- Comparing the U.S. and English databases and thinking about match-rates
    Abstract: Introduction -- How do the U.S. and English systems and processes compare? -- How do turnaround and backlog compare in the U.S. and English systems? -- Comparing the U.S. and English databases and thinking about match-rates
    Note: At head of title: Issues in policing , Caption title , Includes bibliographical references (pages 26-30)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    ISBN: 9780833047564 , 0833050265 , 0833047566 , 9780833050267
    Language: English
    Pages: 1 Online-Ressource (xxiii, 138 pages)
    Series Statement: Rand Corporation monograph series
    Parallel Title: Print version Larrabee, F. Stephen Troubled partnership
    Keywords: World politics 1989- ; Geopolitics ; Social change ; National security ; National security ; World politics ; Geopolitics ; Social change ; National security ; National security ; Diplomatic relations ; Military relations ; National security ; Social change ; World politics ; POLITICAL SCIENCE ; Government ; International ; POLITICAL SCIENCE ; International Relations ; General ; Turkey ; United States ; Geopolitics ; Turkey Military relations ; Turkey Foreign relations ; United States Military relations ; United States Foreign relations ; Turkey ; Turkey ; United States ; United States
    Abstract: Turkey stands at the nexus of four geographic areas of growing strategic importance in the post-Cold War era: the Balkans, the Middle East, the Caucasus/Central Asia, and the Persian Gulf region. In each of these areas, Turkey's cooperation is critical for achieving U.S. policy goals. However, in recent years, especially since 2003, U.S.- Turkish relations have undergone serious strains. Sharp differences over Iraq and the Kurdish issue have been compounded by differences over the Middle East, particularly relations with Iran, Iraq, and Syria. At the same time, Turkey has witnessed a sharp rise in anti-American sentiment. This monograph examines the causes of recent strains in the U.S.-Turkish security partnership and options for reducing these strains
    Abstract: Turkey stands at the nexus of four geographic areas of growing strategic importance in the post-Cold War era: the Balkans, the Middle East, the Caucasus/Central Asia, and the Persian Gulf region. In each of these areas, Turkey's cooperation is critical for achieving U.S. policy goals. However, in recent years, especially since 2003, U.S.- Turkish relations have undergone serious strains. Sharp differences over Iraq and the Kurdish issue have been compounded by differences over the Middle East, particularly relations with Iran, Iraq, and Syria. At the same time, Turkey has witnessed a sharp rise in anti-American sentiment. This monograph examines the causes of recent strains in the U.S.-Turkish security partnership and options for reducing these strains
    Note: Includes bibliographical references (pages 127-138)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    ISBN: 9780833051035 , 0833051121 , 0833051032 , 9780833051127
    Language: English
    Pages: 1 Online-Ressource (xli, 133 pages)
    Series Statement: Rand Corporation monograph series MG-1031-NIJ
    Parallel Title: Print version Long-term effects of law enforcement's post-9/11 focus on counterterrorism and homeland security
    Keywords: Civil defense ; National security ; Law enforcement ; Terrorism Prevention ; Police training Costs ; Civil defense ; National security ; Law enforcement ; Terrorism ; Police training ; Civil defense ; Law enforcement ; National security ; Terrorism ; Prevention ; United States ; POLITICAL SCIENCE ; Political Freedom & Security ; Law Enforcement ; POLITICAL SCIENCE ; Law Enforcement ; Electronic books
    Abstract: Since the 9/11 terrorist attacks, the need for increased counterterrorism (CT) and homeland security (HS) efforts at the federal, state, and local levels has taken the spotlight in public safety efforts. In the immediate aftermath of 9/11, many law enforcement agencies (LEAs) shifted more resources toward developing CT and HS capabilities, and the federal government continues to support these efforts with grants provided through the Department of Homeland Security. This monograph examines the long-term adjustments that large urban LEAs have made to accommodate the focus on CT and HS, as well as the advantages and challenges associated with it. The study relies primarily on in-depth case studies of five large urban LEAs, as well as a review of federal HS grant programs and a quantitative analysis of the potential costs associated with shifting law enforcement personnel from traditional policing to focus on HS and CT functions. Major trends among the five case study LEAs include the creation of specialized departments and units, as well as an increased emphasis on information-sharing, which, nationwide, has led to the creation of fusion centers that serve as formal hubs for regional information-sharing networks. LEAs' HS and CT efforts are also greatly influenced by the restrictions and requirements associated with federal HS grant funding. Finally, using cost-of-crime estimates, it is possible to partially quantify the costs associated with LEAs' shifting of personnel away from traditional crime prevention toward CT and HS -- there are also clear benefits associated with law enforcement's focus on CT and HS, but they are difficult to quantify, and this is posing a challenge for LEAs as the economic downturn puts pressure on public budgets
    Abstract: Since the 9/11 terrorist attacks, the need for increased counterterrorism (CT) and homeland security (HS) efforts at the federal, state, and local levels has taken the spotlight in public safety efforts. In the immediate aftermath of 9/11, many law enforcement agencies (LEAs) shifted more resources toward developing CT and HS capabilities, and the federal government continues to support these efforts with grants provided through the Department of Homeland Security. This monograph examines the long-term adjustments that large urban LEAs have made to accommodate the focus on CT and HS, as well as the advantages and challenges associated with it. The study relies primarily on in-depth case studies of five large urban LEAs, as well as a review of federal HS grant programs and a quantitative analysis of the potential costs associated with shifting law enforcement personnel from traditional policing to focus on HS and CT functions. Major trends among the five case study LEAs include the creation of specialized departments and units, as well as an increased emphasis on information-sharing, which, nationwide, has led to the creation of fusion centers that serve as formal hubs for regional information-sharing networks. LEAs' HS and CT efforts are also greatly influenced by the restrictions and requirements associated with federal HS grant funding. Finally, using cost-of-crime estimates, it is possible to partially quantify the costs associated with LEAs' shifting of personnel away from traditional crime prevention toward CT and HS -- there are also clear benefits associated with law enforcement's focus on CT and HS, but they are difficult to quantify, and this is posing a challenge for LEAs as the economic downturn puts pressure on public budgets
    Note: Includes bibliographical references (pages 121-133)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    Santa Monica, CA : Rand
    ISBN: 9780833026675 , 0833026674 , 0585239576 , 9780585239576 , 9780833032560 , 0833032569
    Language: English
    Pages: Online Ressource (xxi, 153 pages) , illustrations
    Edition: Online-Ausg.
    Parallel Title: Print version Countering the new terrorism
    DDC: 303.625
    Keywords: United States / Air Force Security measures ; United States / Air Force ; United States Security measures ; United States Security measures ; United States ; Terrorism Prevention ; United States ; Information warfare Prevention ; United States ; National security United States ; Air power United States ; National security ; Information warfare Prevention ; Air power ; Terrorism Prevention ; Information warfare Prevention ; National security ; Air power ; Terrorism Prevention ; Air power ; Information warfare ; Prevention ; Military policy ; National security ; Armed Forces ; Security measures ; Terrorism ; Prevention ; POLITICAL SCIENCE ; Political Freedom & Security ; Terrorism ; United States Military policy ; United States ; United States Military policy ; United States Military policy ; United States ; Electronic book ; Electronic books
    Abstract: The contours of terrorism are changing, and the new terrorism has more diverse sources, motivations, and tactics than the old. It is more lethal, global in reach, and characterized by network forms of organization. Terrorist sponsorship is becoming hazier and "privatized." The August 1998 terrorist bombings of U.S. embassies in Kenya and Tanzania fit in many ways the new mold. The chapters in this book trace the evolution of international terrorism against civilian and U.S. military targets, look ahead to where terrorism is going, and assess how it might be contained. Terrorism and counterterrorism are placed in strategic perspective, including how terrorism might be applied as an asymmetric strategy by less-capable adversaries. The report builds on a existing body of RAND research on terrorism and political violence, and makes extensive use of the RAND-St. Andrews Chronology of International Terrorism
    Note: "Prepared for the United States Air Force. - "Project Air Force. - "MR-989-AF"--Page 4 of cover. - Includes bibliographical references and index. - Description based on print version record , "Project Air Force , "MR-989-AF"--P. [4] of cover , Includes bibliographical references and index
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...