Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • 2010-2014  (25)
  • 1995-1999  (1)
  • Rand Corporation  (26)
  • United States Procurement  (14)
  • National security  (12)
Datasource
Material
Language
Years
Year
  • 1
    ISBN: 9780833087393 , 0833090089 , 0833087398 , 9780833090089
    Language: English
    Pages: 1 Online-Ressource (xxvi, 108 pages)
    Parallel Title: Print version Arena, Mark V Management perspectives pertaining to root cause analyses of Nunn-McCurdy breaches. Volume 6 : Contractor motivations and anticipating breaches
    Keywords: United States Procurement ; United States ; Government contractors ; Motivation (Psychology) ; Defense contracts Cost effectiveness ; Government contractors ; Motivation (Psychology) ; Defense contracts ; Government contractors ; United States ; Motivation (Psychology) ; Military & Naval Science ; United States ; Law, Politics & Government ; Armed Forces ; Procurement ; Armies ; POLITICAL SCIENCE ; Political Freedom ; Electronic books
    Abstract: With an eye to making defense acquisition more effective and efficient, the authors explore defense contractor motivations in pursuing defense contracts and identify mechanisms that might more closely align those incentives with Department of Defense goals. They enumerate several motivations that drive contractors, most of which center on the financial aspects of running an enterprise. Then, they turn to the other side of the negotiating table and identify areas of influence or levers that the government can use to align the contracting process more closely with contractor motivations. They also analyze major defense acquisition programs to determine if it is possible to identify programs that might incur a future Nunn-McCurdy breach by reviewing a number of acquisition programs that have incurred breaches in the past and analyzing them for common characteristics. Their analytic framework enables oversight officials to identify programs with a greater risk of incurring a critical cost breach, which enables officials to focus more intently on a smaller set of programs and which provides hypotheses about what to look for in these programs
    Abstract: With an eye to making defense acquisition more effective and efficient, the authors explore defense contractor motivations in pursuing defense contracts and identify mechanisms that might more closely align those incentives with Department of Defense goals. They enumerate several motivations that drive contractors, most of which center on the financial aspects of running an enterprise. Then, they turn to the other side of the negotiating table and identify areas of influence or levers that the government can use to align the contracting process more closely with contractor motivations. They also analyze major defense acquisition programs to determine if it is possible to identify programs that might incur a future Nunn-McCurdy breach by reviewing a number of acquisition programs that have incurred breaches in the past and analyzing them for common characteristics. Their analytic framework enables oversight officials to identify programs with a greater risk of incurring a critical cost breach, which enables officials to focus more intently on a smaller set of programs and which provides hypotheses about what to look for in these programs
    Note: "RAND National Defense Research Institute , "This research was sponsored by OSD PARCA and conducted within the Acquisition and Technology Policy Center of the RAND National Defense Research Institute"--Preface , "Prepared for the Office of the Secretary of Defense , Includes bibliographical references (pages 103-108)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9780833082305 , 0833082078 , 0833082302 , 9780833082077
    Language: English
    Pages: 1 Online-Ressource (xix, 51 pages)
    Parallel Title: Print version Moore, Nancy Y., 1947- Small business and strategic sourcing
    Keywords: United States Procurement ; United States ; Small business ; Strategic planning ; Government contractors ; Government purchasing ; Defense contracts ; Small business ; Strategic planning ; Government contractors ; Government purchasing ; Defense contracts ; Small business ; Strategic planning ; United States ; BUSINESS & ECONOMICS ; Outsourcing ; Armed Forces ; Procurement ; Defense contracts ; United States ; Government contractors ; Government purchasing ; Electronic books
    Abstract: The Department of Defense (DoD) may face challenges as it attempts to maintain its goal of spending about 23 percent of its prime-contract dollars for goods and services with small businesses and at the same time apply strategic-sourcing practices to reduce total costs and improve performance in ways that will not conflict with small-business goals while making DoD purchasing more effective and efficient. Strategic sourcing practices, for example, recommend consolidation of the supply base to reduce total costs, which can lead to fewer, larger, longer-term contracts with fewer and, often, larger suppliers
    Abstract: The Department of Defense (DoD) may face challenges as it attempts to maintain its goal of spending about 23 percent of its prime-contract dollars for goods and services with small businesses and at the same time apply strategic-sourcing practices to reduce total costs and improve performance in ways that will not conflict with small-business goals while making DoD purchasing more effective and efficient. Strategic sourcing practices, for example, recommend consolidation of the supply base to reduce total costs, which can lead to fewer, larger, longer-term contracts with fewer and, often, larger suppliers
    Note: "RAND National Defense Research Institute , "Prepared for the Office of the Secretary of Defense , "This research was conducted within the Acquisition and Technology Policy Center of the RAND National Defense Research Institute"--Preface , Includes bibliographical references (pages 47-51)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9780833086198 , 0833086367 , 0833086197 , 9780833086365
    Language: English
    Pages: 1 Online-Ressource (16 pages)
    Parallel Title: Print version LaTourrette, Tom, 1963- Impact on federal spending of allowing the terrorism risk insurance act to expire
    Keywords: United States Evaluation ; United States ; Risk management ; National security ; Terrorism Risk assessment ; Risk (Insurance) ; Terrorism insurance Evaluation ; Risk management ; National security ; Terrorism ; Risk (Insurance) ; Terrorism insurance ; National security ; Risk (Insurance) ; Risk management ; United States ; SOCIAL SCIENCE ; Disasters & Disaster Relief ; Evaluation ; Terrorism Risk Insurance Act of 2002 (United States) ; Electronic books
    Abstract: Congress enacted the Terrorism Risk Insurance Act (TRIA) in 2002, in response to terrorism insurance becoming unavailable or, when offered, extremely costly in the wake of the 9/11 attacks. The law creates an incentive for a functioning private terrorism insurance market by providing a government reinsurance backstop for catastrophic terrorist attack losses. Extended first in 2005 and again in 2007, TRIA is set to expire at the end of 2014, and Congress is again considering the appropriate government role in terrorism insurance markets. This policy brief examines the potential federal spending implications of allowing TRIA to expire. Combining information on federal spending through TRIA, the influence of TRIA on the availability of terrorism insurance coverage, and the relationship between uninsured losses and federal disaster assistance spending, the authors find that, in the absence of a terrorist attack, TRIA costs taxpayers relatively little, and in the event of a terrorist attack comparable to any experienced before, it is expected to save taxpayers money
    Note: "RAND Corporation , "Policy Brief , "This work was conducted within RAND Center for Catastrophic Risk Management and Compensation ... part of RAND Justice, Infrastructure, and Environment"--Back cover , Caption title , Includes bibliographical references (pages 14-16)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    ISBN: 9780833085887 , 0833086340 , 0833085883 , 9780833086341
    Language: English
    Pages: 1 Online-Ressource (31 pages)
    Series Statement: RAND Corporation research report series RR-449-RC
    Parallel Title: Print vversion Davis, Lynn E. (Lynn Etheridge), 1943- Armed and dangerous?
    Keywords: Technology Risk assessment ; National security ; Military art and science Technological innovations ; Arms control ; Drone aircraft Risk assessment ; Technology ; National security ; Military art and science ; Arms control ; Drone aircraft ; Technology ; Risk assessment ; United States ; Military art and science ; Technological innovations ; POLITICAL SCIENCE ; International Relations ; Arms Control ; Arms control ; National security ; Electronic books
    Abstract: Armed drones are making the headlines, especially in their role in targeted killings. In this report, RAND researchers stepped back and asked whether these weapons are transformative. The answer is no, though they offer significant capabilities to their users, especially in counterterrorism operations as has been the case for the United States. Will they proliferate? Yes, but upon a closer look at the types of systems, only a few rich countries will be in a position to develop the higher technology and longer range systems. U.S. adversaries and others will likely find weapons such as aircraft and air defenses more cost and militarily effective. Their proliferation will not create the kinds of global dangers that call for new arms control efforts, but the risks to regional stability cannot be dismissed entirely, as is the case of any conventional weapon. How the United States will use these weapons today and into the future will be important in shaping a broader set of international norms that discourage their misuse by others
    Note: "RAND Corporation , Caption title , Includes bibliographical references (pages 26-30)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    ISBN: 9780833084033 , 0833086022 , 0833084038 , 9780833086020
    Language: English
    Pages: 1 Online-Ressource (23 pages)
    Parallel Title: Print version Silberglitt, R.S. (Richard S.) Soldier-portable battery supply
    Keywords: United States Procurement ; United States ; Business logistics ; Lithium cells ; Battery industry ; Business logistics ; Lithium cells ; Battery industry ; Battery industry ; Business logistics ; United States ; Lithium cells ; TECHNOLOGY & ENGINEERING ; Military Science ; Armed Forces ; Procurement ; Electronic books
    Abstract: Batteries are a ubiquitous presence in equipment carried by soldiers and critical to the performance of electronic devices such as radios, computers, night-vision goggles, and laser range finders. These batteries are supplied by a variety of firms, and mostly assembled from cells that are acquired through a supply chain that is driven by commercial applications to mobile phones, laptop computers, tablets, and other electronic devices, and is predominately based in Asia. RAND found that government researchers and program managers and representatives of military battery suppliers have concerns associated with this foreign-dependent supply chain. The report discusses alternative policy options to address these concerns, without evaluating the benefits versus costs of these policy options
    Note: "RAND Corporation , "RR-500-OSD"--Page 4 of cover , "This study was ... conducted within the Acquisition and Technology Policy Center of the RAND National Defense Research Institute"--Back cover , Caption title , Includes bibliographical references (pages 20-22)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    ISBN: 9780833087379 , 0833089587 , 0833087371 , 9780833089588
    Language: English
    Pages: 1 Online-Ressource (xxi, 62 pages + database)
    Series Statement: Report RR-736-AF
    Keywords: Database of U.S. security treaties and agreements ; Database of U.S. security treaties and agreements ; Information storage and retrieval systems Treaties ; Information storage and retrieval systems Status of forces agreements ; Status of forces agreements Databases ; National security Law and legislation ; Legal research ; Information storage and retrieval systems ; Information storage and retrieval systems ; Status of forces agreements ; National security ; Information storage and retrieval systems ; Status of forces agreements ; Law - U.S ; Law, Politics & Government ; Law - U.S. - General ; POLITICAL SCIENCE ; International Relations ; Treaties ; United States ; Diplomatic relations ; Databases ; Treaties ; United States Treaties Foreign relations ; United States Databases Foreign relations ; United States ; United States ; Electronic books
    Abstract: Treaties and agreements are powerful foreign policy tools that the United States uses to build and solidify relationships with partners and to influence the behavior of other states. As a result, the overall U.S. portfolio of treaties and agreements can offer insight into the distribution and depth of U.S. commitments internationally, including its military commitments and 'presence' in a given country or region. However, despite their importance, there is currently no comprehensive record of current or historical security-related treaties signed by the United States that can be used for empirical analysis. To address the shortcomings in existing datasets and indexes to contribute to the study of U.S. security treaties and agreements, we have developed a new, more comprehensive treaty database that will enhance the ability of researchers to study the full portfolio of U.S. security agreements. This report discusses our approach to data collection and coding and also presents a summary of the database's content. Its appendixes define each individual variable used in the analysis. The database was developed as part of a larger project focused on estimating the economic value of U.S. military presence overseas. In the context of this larger project, the treaty database provided an alternative way to measure 'military presence.' In addition to using numbers of troops as a measure of presence, we also used numbers of security-related agreements, drawing on the information in the treaty database described in this report. This measure provided us with additional insight into the value and role of U.S. engagement and operations in overseas areas
    Abstract: Treaties and agreements are powerful foreign policy tools that the United States uses to build and solidify relationships with partners and to influence the behavior of other states. As a result, the overall U.S. portfolio of treaties and agreements can offer insight into the distribution and depth of U.S. commitments internationally, including its military commitments and 'presence' in a given country or region. However, despite their importance, there is currently no comprehensive record of current or historical security-related treaties signed by the United States that can be used for empirical analysis. To address the shortcomings in existing datasets and indexes to contribute to the study of U.S. security treaties and agreements, we have developed a new, more comprehensive treaty database that will enhance the ability of researchers to study the full portfolio of U.S. security agreements. This report discusses our approach to data collection and coding and also presents a summary of the database's content. Its appendixes define each individual variable used in the analysis. The database was developed as part of a larger project focused on estimating the economic value of U.S. military presence overseas. In the context of this larger project, the treaty database provided an alternative way to measure 'military presence.' In addition to using numbers of troops as a measure of presence, we also used numbers of security-related agreements, drawing on the information in the treaty database described in this report. This measure provided us with additional insight into the value and role of U.S. engagement and operations in overseas areas
    Note: "The accompanying CD ... contains an actual Excel database of treaties. The database does not include text, but includes titles, dates, and other classifications."--Email from author , "Prepared for the United States Air Force , "RAND Project AIR FORCE , Includes bibliographical references (pages 59-62)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    ISBN: 9780833087348 , 0833090097 , 0833087347 , 9780833090096
    Language: English
    Pages: 1 Online-Ressource (xxvii, 112 pages)
    Keywords: United States Procurement ; Cost control ; United States ; POLITICAL SCIENCE ; Political Freedom ; Armed Forces ; Procurement ; Cost control ; United States ; Electronic books
    Abstract: The report presents the results of two studies: The first compares the capabilities and development approaches used in the Joint Tactical Radio System wideband networking waveform (WNW) and the commercial long-term evolution waveform, and the second analyzes military acquisition programs that have repeatedly exceeded certain cost thresholds. The first study compares differences in system designs, technical requirements, intellectual property protection schemes, and cost in the development of WNW. It also examined how technical risks and challenging requirements contributed to schedule and cost increases. The second study attempts to identify unique characteristics of programs that overrun their budgets more than once
    Note: "Prepared for the Office of the Secretary of Defense , "This research was sponsored by the Performance Assessments and Root Cause Analysis (PARCA) office, in the Office of the Assistant Secretary of Defense for Acquisition, and conducted within the Acquisition and Technology Policy Center of the RAND National Defense Research Institute"--Preface , "RAND National Defense Research Institute , Includes bibliographical references (pages 109-112)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    ISBN: 9780833085139 , 0833086499 , 0833085131 , 9780833086495
    Language: English
    Pages: 1 Online-Ressource (xxxiii, 152 pages)
    Parallel Title: Print version Hanauer, Larry Evaluating the impact of the Department of Defense Regional Centers for Security Studies
    Keywords: United States Management ; Evaluation ; United States ; National security International cooperation ; Military assistance, American ; National security ; Military assistance, American ; National security ; International cooperation ; Military & Naval Science ; Law, Politics & Government ; Armies ; POLITICAL SCIENCE ; International Relations ; Treaties ; Management ; Evaluation ; Military assistance, American ; United States ; Electronic books
    Abstract: The five U.S. Department of Defense (DoD) Regional Centers for Security Studies have been helping partner nations build strategic capacity for almost 20 years. However, recent DoD budget constraints have put pressure on the regional centers (RCs) to increase efficiency. The Office of the Secretary of Defense (OSD) asked RAND to conduct a study on the overall impact of the RCs, their effectiveness in advancing DoD policy priorities, the ways in which they assess their programs, and ways in which they could improve their impact and efficiency and the resulting outcomes. The RAND study team found that centers have had great success at the missions they have undertaken. They are high-impact components of U.S. security cooperation and engagement efforts, despite their relatively small budgets. The team identified 24 ways in which the centers advance U.S. interests, including building partner capacity, building relationships, fostering pro-U.S. outlooks, offering unique opportunities for engagement, and promoting regional dialogue that reduces tensions. However, RCs should improve impact-oriented data collection and analysis for improved assessment, methodically collecting such data over time. OSD and the combatant commands should improve their oversight and management of the RCs to ensure alignment with department- and theater-level objectives. In addition, OSD should maintain the RCs' focus on regional security challenges rather than refashioning them to address specific threats. Options to consider for greater impact include evaluating the balance between core residential courses and in-region workshops and determining whether and to what extent the centers should develop customized programs for DoD components so as to secure funds beyond the core budget they receive from OSD
    Abstract: The five U.S. Department of Defense (DoD) Regional Centers for Security Studies have been helping partner nations build strategic capacity for almost 20 years. However, recent DoD budget constraints have put pressure on the regional centers (RCs) to increase efficiency. The Office of the Secretary of Defense (OSD) asked RAND to conduct a study on the overall impact of the RCs, their effectiveness in advancing DoD policy priorities, the ways in which they assess their programs, and ways in which they could improve their impact and efficiency and the resulting outcomes. The RAND study team found that centers have had great success at the missions they have undertaken. They are high-impact components of U.S. security cooperation and engagement efforts, despite their relatively small budgets. The team identified 24 ways in which the centers advance U.S. interests, including building partner capacity, building relationships, fostering pro-U.S. outlooks, offering unique opportunities for engagement, and promoting regional dialogue that reduces tensions. However, RCs should improve impact-oriented data collection and analysis for improved assessment, methodically collecting such data over time. OSD and the combatant commands should improve their oversight and management of the RCs to ensure alignment with department- and theater-level objectives. In addition, OSD should maintain the RCs' focus on regional security challenges rather than refashioning them to address specific threats. Options to consider for greater impact include evaluating the balance between core residential courses and in-region workshops and determining whether and to what extent the centers should develop customized programs for DoD components so as to secure funds beyond the core budget they receive from OSD
    Note: "Prepared for the Office of the Secretary of Defense , "RR-388-OSD"--Page 4 of cover , "National Defense Research Institute , Includes bibliographical references (pages 145-152)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    ISBN: 9780833074560 , 0833084887 , 0833074563 , 9780833084880
    Language: English
    Pages: 1 Online-Ressource (xxv, 51 pages)
    Parallel Title: Erscheint auch als Lorell, Mark A., 1947- Do joint fighter programs save money?
    Keywords: United States Procurement ; Costs ; United States ; F-35 (Military aircraft) ; Fighter planes Costs ; Life cycle costing ; F-35 (Military aircraft) ; Fighter planes ; Life cycle costing ; Law, Politics & Government ; United States ; F-35 (Military aircraft) ; Fighter planes ; Costs ; Life cycle costing ; United States ; HISTORY ; Military ; Aviation ; Air Forces ; Armed Forces ; Procurement ; Costs ; Military & Naval Science ; Electronic books
    Abstract: In the past 50 years, the U.S. Department of Defense has pursued numerous joint aircraft programs, the largest and most recent of which is the F-35 Joint Strike Fighter (JSF). Joint aircraft programs are thought to reduce Life Cycle Cost (LCC) by eliminating duplicate research, development, test, and evaluation efforts and by realizing economies of scale in procurement, operations, and support. But the need to accommodate different service requirements in a single design or common design family can lead to greater program complexity, increased technical risk, and common functionality or increased weight in excess of that needed for some variants, potentially leading to higher overall cost, despite these efficiencies. To help Air Force leaders (and acquisition decisionmakers in general) select an appropriate acquisition strategy for future combat aircraft, this report analyzes the costs and savings of joint aircraft acquisition programs. The project team examined whether historical joint aircraft programs have saved LCC compared with single-service programs. In addition, the project team assessed whether JSF is on track to achieving the joint savings originally anticipated at the beginning of full-scale development. Also examined were the implications of joint fighter programs for the health of the industrial base and for operational and strategic risk
    Abstract: In the past 50 years, the U.S. Department of Defense has pursued numerous joint aircraft programs, the largest and most recent of which is the F-35 Joint Strike Fighter (JSF). Joint aircraft programs are thought to reduce Life Cycle Cost (LCC) by eliminating duplicate research, development, test, and evaluation efforts and by realizing economies of scale in procurement, operations, and support. But the need to accommodate different service requirements in a single design or common design family can lead to greater program complexity, increased technical risk, and common functionality or increased weight in excess of that needed for some variants, potentially leading to higher overall cost, despite these efficiencies. To help Air Force leaders (and acquisition decisionmakers in general) select an appropriate acquisition strategy for future combat aircraft, this report analyzes the costs and savings of joint aircraft acquisition programs. The project team examined whether historical joint aircraft programs have saved LCC compared with single-service programs. In addition, the project team assessed whether JSF is on track to achieving the joint savings originally anticipated at the beginning of full-scale development. Also examined were the implications of joint fighter programs for the health of the industrial base and for operational and strategic risk
    Note: "RAND Project Air Force , Includes bibliographical references (pages 41-51)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    ISBN: 9780833080981 , 0833084607 , 0833080989 , 9780833084606
    Language: English
    Pages: 1 Online-Ressource (57 pages)
    Parallel Title: Erscheint auch als Paul, Christopher, 1971- RAND security cooperation prioritization and propensity matching tool
    Keywords: Security, International ; Decision making Data processing ; Military assistance, American Planning ; National security International cooperation ; Security, International ; Decision making ; Military assistance, American ; National security ; Security, International ; United States ; Law, Politics & Government ; International Relations ; Military policy ; POLITICAL SCIENCE ; Security (National & International) ; Decision making ; Data processing ; Diplomatic relations ; National security ; International cooperation ; United States Foreign relations 1989- ; United States Military policy ; United States ; United States ; Electronic books
    Abstract: Security cooperation is the umbrella term used to describe a wide range of programs and activities with such goals as building relationships between the United States and partner countries, developing these countries' security capabilities, and facilitating contingency and peacetime access by U.S. forces. With increased pressure on defense spending, the scope and budget for these activities are likely to decrease. Therefore, it will be important for the U.S. Department of Defense to scrutinize and, perhaps, reevaluate current and proposed security cooperation efforts, ensuring that expected benefits align with costs and corresponding policy priorities. Recent RAND research identified practices and contextual factors associated with greater or lesser degrees of success in security cooperation, using 29 historical case studies of U.S. efforts to build partner capacity since the end of the Cold War. The RAND Security Cooperation Prioritization and Propensity Matching Tool applies these findings and results from other existing research to all current and potential security cooperation partners. This customizable diagnostic tool, built in Microsoft Excel®, will help planners preliminarily identify mismatches between the importance of a country to U.S. interests, funding for initiatives, and the propensity for successful U.S. security cooperation with a given country. For each of the world's 195 countries, the tool produces an overall security cooperation propensity score. Planners can then compare these scores with available funding and security cooperation priorities. The tool has the virtues of being systematic, being based on global data, and not relying on subjective assessments. Strategic thinking and nuanced understanding of individual countries remain important, but the tool is useful in helping to identify which countries to scrutinize
    Abstract: Security cooperation is the umbrella term used to describe a wide range of programs and activities with such goals as building relationships between the United States and partner countries, developing these countries' security capabilities, and facilitating contingency and peacetime access by U.S. forces. With increased pressure on defense spending, the scope and budget for these activities are likely to decrease. Therefore, it will be important for the U.S. Department of Defense to scrutinize and, perhaps, reevaluate current and proposed security cooperation efforts, ensuring that expected benefits align with costs and corresponding policy priorities. Recent RAND research identified practices and contextual factors associated with greater or lesser degrees of success in security cooperation, using 29 historical case studies of U.S. efforts to build partner capacity since the end of the Cold War. The RAND Security Cooperation Prioritization and Propensity Matching Tool applies these findings and results from other existing research to all current and potential security cooperation partners. This customizable diagnostic tool, built in Microsoft Excel®, will help planners preliminarily identify mismatches between the importance of a country to U.S. interests, funding for initiatives, and the propensity for successful U.S. security cooperation with a given country. For each of the world's 195 countries, the tool produces an overall security cooperation propensity score. Planners can then compare these scores with available funding and security cooperation priorities. The tool has the virtues of being systematic, being based on global data, and not relying on subjective assessments. Strategic thinking and nuanced understanding of individual countries remain important, but the tool is useful in helping to identify which countries to scrutinize
    Note: "RAND National Defense Research Institute , "This research was ... conducted within the International Security and Defense Policy Center of the RAND National Defense Research Institute"--Preface , Includes bibliographical references (pages 51-57)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    ISBN: 9780833085405 , 0833085409 , 9780833081490 , 0833084712 , 0833081497 , 9780833084712
    Language: English
    Pages: 1 Online-Ressource (x, 71 pages)
    Series Statement: Rand Corporation research report RR378
    Parallel Title: Print version Speier, Richard Penaid nonproliferation
    Keywords: Ballistic missile defenses ; Weapons of mass destruction ; National security ; Ballistic missile defenses ; Weapons of mass destruction ; National security ; National security ; Weapons of mass destruction ; TECHNOLOGY & ENGINEERING ; Military Science ; United States ; HISTORY ; Military ; Weapons ; Ballistic missile defenses ; Military readiness ; United States Defenses ; United States ; Electronic books
    Abstract: An attacker's missile-borne countermeasures to ballistic missile defenses are known as penetration aids, or penaids. To support efforts to prevent the proliferation of penaid-related items, this research recommends controls on potential exports according to the structure of the international Missile Technology Control Regime
    Abstract: An attacker's missile-borne countermeasures to ballistic missile defenses are known as penetration aids, or penaids. To support efforts to prevent the proliferation of penaid-related items, this research recommends controls on potential exports according to the structure of the international Missile Technology Control Regime
    Note: "National Defense Research Institute , "RR-378-DTRA"--Page 4 of cover , "Prepared for the Naval Postgraduate School, Project on Advanced Systems and Concepts for Combating WMD , Includes bibliographical references (pages 69-71)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    ISBN: 9780833080608 , 0833084801 , 0833080601 , 9780833084804
    Language: English
    Pages: 1 Online-Ressource (44 pages)
    Keywords: United States Appropriations and expenditures ; United States Procurement ; Costs ; Evaluation ; Methodology ; United States ; United States ; Weapons systems Costs ; Forecasting ; Systems integration Risk assessment ; Methodology ; Weapons systems ; Systems integration ; TECHNOLOGY & ENGINEERING ; Military Science ; United States ; United States ; Expenditures, Public ; United States Armed Forces ; Weapons systems ; Costs ; Evaluation ; Methodology ; United States ; Electronic books
    Abstract: Implementing risk management principles to manage large defense acquisition programs is a priority for the U.S. defense acquisition community. To assist those decisionmakers responsible for identifying the risk associated with major weapons programs, RAND researchers developed a methodology and accompanying Excel, information-based risk tool (the ⁰́Assessor Tool⁰́₊). The Assessor Tool offers an Office of the Secretary of Defense (OSD)-level approach to the evaluation and measurement of system integration risk. That is, it is meant for assessors, such as OSD personnel, who may not be especially familiar with the specific program under evaluation but still may need to make judgments about the program⁰́₉s risk. It is based on a tractable and comprehensive set of questions that can help evaluate integration risk at each point in the acquisition process. More specifically, the tool enables users to see how well integration risk is being managed by providing a standards-based valuation of integration issues that can lead to cost growth, schedule growth, and program performance. The users⁰́₉ manual for the Assessor Tool is available in a companion document, An Excel Tool to Assess Acquisition Program Risk (by Lauren A. Fleishman-Mayer, Mark V. Arena, and Michael E. McMahon, TL-113-OSD, 2013). The Assessor Tool and its methodology may also be generalizable to an entire set of information-based risk assessment applications. Overall, the methodology and tool have many strengths, including being based on well-grounded theories, allowing for reproducibility and traceability, and the extensive flexibility to be used to evaluate risk for many different types of programs. To provide a benchmarking and validation of the risk scores calculated by the tool, future work could include the tool⁰́₉s validation by tracking its output against a program⁰́₉s performance
    Abstract: Implementing risk management principles to manage large defense acquisition programs is a priority for the U.S. defense acquisition community. To assist those decisionmakers responsible for identifying the risk associated with major weapons programs, RAND researchers developed a methodology and accompanying Excel, information-based risk tool (the ⁰́Assessor Tool⁰́₊). The Assessor Tool offers an Office of the Secretary of Defense (OSD)-level approach to the evaluation and measurement of system integration risk. That is, it is meant for assessors, such as OSD personnel, who may not be especially familiar with the specific program under evaluation but still may need to make judgments about the program⁰́₉s risk. It is based on a tractable and comprehensive set of questions that can help evaluate integration risk at each point in the acquisition process. More specifically, the tool enables users to see how well integration risk is being managed by providing a standards-based valuation of integration issues that can lead to cost growth, schedule growth, and program performance. The users⁰́₉ manual for the Assessor Tool is available in a companion document, An Excel Tool to Assess Acquisition Program Risk (by Lauren A. Fleishman-Mayer, Mark V. Arena, and Michael E. McMahon, TL-113-OSD, 2013). The Assessor Tool and its methodology may also be generalizable to an entire set of information-based risk assessment applications. Overall, the methodology and tool have many strengths, including being based on well-grounded theories, allowing for reproducibility and traceability, and the extensive flexibility to be used to evaluate risk for many different types of programs. To provide a benchmarking and validation of the risk scores calculated by the tool, future work could include the tool⁰́₉s validation by tracking its output against a program⁰́₉s performance
    Note: "This research was conducted within the Acquisition and Technology Policy Center of the RAND National Defense Research Institute"--Preface , "RAND National Security Research Division , Includes bibliographical references (pages 25-26) , Title from title screen (viewed on October 24, 2013)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    ISBN: 9780833082053 , 0833083791 , 0833082051 , 9780833083791
    Language: English
    Pages: 1 Online-Ressource (xxx, 115 pages)
    Parallel Title: Print version Arena, Mark V Management perspectives pertaining to root cause analyses of Nunn-McCurdy breaches Vol. 4
    Keywords: United States Procurement ; Costs ; United States ; Defense contracts ; Defense contracts ; Law, Politics & Government ; United States ; Armed Forces ; Weapons systems ; Costs ; United States ; Armies ; Military & Naval Science ; POLITICAL SCIENCE ; Political Freedom ; Armed Forces ; Procurement ; Costs ; Defense contracts ; United States Armed Forces ; Equipment ; Costs ; United States Armed Forces ; Weapons systems ; Costs ; United States ; United States ; Electronic books
    Abstract: Concern with cost overruns in major defense acquisition programs led Congress to direct investigation of the root causes of overruns in programs that have breached Nunn-McCurdy thresholds. The authors calculate program manager tenure to determine whether tenures have lengthened since policy guidance was issued in 2005 and 2007. They also address the question of whether existing decentralized systems used to track the cost growth and performance of acquisition category II programs are sufficient or whether additional centralized guidance and control from the Office of the Secretary of Defense are warranted. A third question deals with the management of cost and schedule risk and whether the identification of key assumptions, which the authors call framing assumptions, could be a useful risk management tool
    Abstract: Concern with cost overruns in major defense acquisition programs led Congress to direct investigation of the root causes of overruns in programs that have breached Nunn-McCurdy thresholds. The authors calculate program manager tenure to determine whether tenures have lengthened since policy guidance was issued in 2005 and 2007. They also address the question of whether existing decentralized systems used to track the cost growth and performance of acquisition category II programs are sufficient or whether additional centralized guidance and control from the Office of the Secretary of Defense are warranted. A third question deals with the management of cost and schedule risk and whether the identification of key assumptions, which the authors call framing assumptions, could be a useful risk management tool
    Note: "RAND National Defense Research Institute , Includes bibliographical references (pages 109-115)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    ISBN: 9780833080233 , 0833083732 , 0833080237 , 9780833083739
    Language: English
    Pages: 1 Online-Ressource (xv, 41 pages)
    Keywords: United States Procurement ; United States Management ; United States Appropriations and expenditures ; United States ; United States ; United States ; Airplanes, Military Costs ; Airplanes, Military ; Armed Forces ; Appropriations and expenditures ; Armed Forces ; Management ; Armed Forces ; Procurement ; Military & Naval Science ; Law, Politics & Government ; Air Forces ; United States ; United States ; HISTORY ; Military ; Aviation ; Airplanes, Military ; Costs ; Electronic books
    Abstract: The U.S. Air Force is facing a number of challenges as a result of the current defense budget downturn along with the uncertainty of its timing and magnitude. RAND examined the challenge of modernizing the Air Force's aircraft fleet while trying to sustain the industrial base with limited funding. Complicating this challenge is that the pattern of Air Force spending has shifted dramatically away from new aircraft procurement, and a competitor with significant technical and economic capability has emerged. There is a need for careful strategic management of investment choices--and this goes beyond just aircraft. The Air Force will first need to define its capability priorities that fit within budget constraints, then use those priorities to shape a budget strategy. RAND considered six budget strategies for aircraft procurement: from a new high-tech fleet to sustaining and modifying the existing one. Each strategy under a constrained spending future results in challenges and issues for the industrial base. The Air Force will need to help mitigate industrial base problems that result from their chosen budget strategy--but some issues may be beyond their control. There are lessons from foreign acquisitions that the Air Force can leverage to avoid pitfalls. Most importantly, shortfalls in both industry and government skill bases can cause significant problems later during execution. Finding ways to sustain key skills during a spending downturn will be important for the future and potentially produce longer-term savings
    Abstract: The U.S. Air Force is facing a number of challenges as a result of the current defense budget downturn along with the uncertainty of its timing and magnitude. RAND examined the challenge of modernizing the Air Force's aircraft fleet while trying to sustain the industrial base with limited funding. Complicating this challenge is that the pattern of Air Force spending has shifted dramatically away from new aircraft procurement, and a competitor with significant technical and economic capability has emerged. There is a need for careful strategic management of investment choices--and this goes beyond just aircraft. The Air Force will first need to define its capability priorities that fit within budget constraints, then use those priorities to shape a budget strategy. RAND considered six budget strategies for aircraft procurement: from a new high-tech fleet to sustaining and modifying the existing one. Each strategy under a constrained spending future results in challenges and issues for the industrial base. The Air Force will need to help mitigate industrial base problems that result from their chosen budget strategy--but some issues may be beyond their control. There are lessons from foreign acquisitions that the Air Force can leverage to avoid pitfalls. Most importantly, shortfalls in both industry and government skill bases can cause significant problems later during execution. Finding ways to sustain key skills during a spending downturn will be important for the future and potentially produce longer-term savings
    Note: "RAND Project Air Force , Includes bibliographical references (pages 39-41)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    ISBN: 9780833079329 , 0833084879 , 0833079328 , 9780833084873
    Language: English
    Pages: 1 Online-Ressource (xviii, 66 pages)
    Series Statement: RAND Corporation monograph series MG1225z1
    Parallel Title: Erscheint auch als Lorell, Mark A Do joint fighter programs save money?
    Keywords: United States Procurement ; United States ; Fighter planes Costs ; Fighter planes ; Law, Politics & Government ; TECHNOLOGY & ENGINEERING ; Military Science ; Armed Forces ; Procurement ; United States ; Fighter planes ; Costs ; Air Forces ; Military & Naval Science ; United States ; Electronic books
    Abstract: Appendix A: Calculation of Theoretical Maximum Joint Aircraft Acquisition Program Savings -- Appendix B: Calculation of the Joint Acquisition Cost-Growth Premium from Historical Aircraft Programs -- Appendix C: Calculation of Maximum Joint O&S Savings from an "Ideal" Joint Fighter Program -- Appendix D: Exploring the Magnitude of Joint O&S Savings Needed to Offset Joint Acquisition Cost-Growth Premium -- Appendix E: Primary Methodology for Comparing JSF Costs with Those of Three Notional Single-Service Fighters -- Appendix F: Alternative Procurement Methodology and Results for Comparing JSF Costs with Those of Three Notional Single-Service Fighters
    Abstract: Appendix A: Calculation of Theoretical Maximum Joint Aircraft Acquisition Program Savings -- Appendix B: Calculation of the Joint Acquisition Cost-Growth Premium from Historical Aircraft Programs -- Appendix C: Calculation of Maximum Joint O&S Savings from an "Ideal" Joint Fighter Program -- Appendix D: Exploring the Magnitude of Joint O&S Savings Needed to Offset Joint Acquisition Cost-Growth Premium -- Appendix E: Primary Methodology for Comparing JSF Costs with Those of Three Notional Single-Service Fighters -- Appendix F: Alternative Procurement Methodology and Results for Comparing JSF Costs with Those of Three Notional Single-Service Fighters
    Note: Includes bibliographical references (pages 55-66)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    ISBN: 9780833081650 , 0833084674 , 0833081659 , 9780833084675
    Language: English
    Pages: 1 Online-Ressource (xv, 27 pages)
    Series Statement: Research report
    Keywords: United States Weapons systems ; Maintenance and repair ; United States Equipment ; Maintenance and repair ; United States Operational readiness ; United States Procurement ; United States ; United States ; United States ; United States ; F-35 (Military aircraft) Maintenance and repair ; F-35 (Military aircraft) ; Armed Forces ; Equipment and supplies ; Maintenance and repair ; Armed Forces ; Operational readiness ; Armed Forces ; Procurement ; Armed Forces ; Weapons systems ; Maintenance and repair ; Military & Naval Science ; Law, Politics & Government ; Air Forces ; United States ; TRANSPORTATION ; Aviation ; Repair & Maintenance ; Electronic books
    Abstract: "The U.S. Air Force has long struggled to incorporate new weapon system logistics requirements and support system design considerations into its broader sustainment enterprise early in the acquisition process. To help inform Air Force decisionmaking with regard to sustainment sourcing, RAND Project AIR FORCE researchers explored and adapted lessons from the transaction cost accounting literature. The result is a powerful economic-based framework that has three primary benefits when it comes to addressing sustainment planning challenges: It is a repeatable, analytically driven decision tool that does not require large amounts of data; it considers repair source decisionmaking in the context of the broader Air Force enterprise; and it is potentially applicable to other aspects of sustainment planning, such as managing government-mandated repair sourcing mixes and informing other Air Force sustainment community responsibilities. This report demonstrates how the framework can be used to select among depot maintenance strategies by applying it to the F-35 Joint Strike Fighter, the largest acquisition program in U.S. Department of Defense history. Although the U.S. government will retain the capability to perform the range of depot-level repairs for the F-35, 40 percent of the workload -- known as "above core" -- can be considered for sourcing to an organic Air Force facility, another military service's facility, a foreign partner, or the private sector. The framework helps planners visualize program data and compare new acquisition programs with legacy Air Force systems. In this way, it offers the Air Force additional leverage in responding to technology developments and vetting contractors's engineering, reliability, and maintainability projections for new weapon systems."--Page 4 of cover
    Abstract: "The U.S. Air Force has long struggled to incorporate new weapon system logistics requirements and support system design considerations into its broader sustainment enterprise early in the acquisition process. To help inform Air Force decisionmaking with regard to sustainment sourcing, RAND Project AIR FORCE researchers explored and adapted lessons from the transaction cost accounting literature. The result is a powerful economic-based framework that has three primary benefits when it comes to addressing sustainment planning challenges: It is a repeatable, analytically driven decision tool that does not require large amounts of data; it considers repair source decisionmaking in the context of the broader Air Force enterprise; and it is potentially applicable to other aspects of sustainment planning, such as managing government-mandated repair sourcing mixes and informing other Air Force sustainment community responsibilities. This report demonstrates how the framework can be used to select among depot maintenance strategies by applying it to the F-35 Joint Strike Fighter, the largest acquisition program in U.S. Department of Defense history. Although the U.S. government will retain the capability to perform the range of depot-level repairs for the F-35, 40 percent of the workload -- known as "above core" -- can be considered for sourcing to an organic Air Force facility, another military service's facility, a foreign partner, or the private sector. The framework helps planners visualize program data and compare new acquisition programs with legacy Air Force systems. In this way, it offers the Air Force additional leverage in responding to technology developments and vetting contractors's engineering, reliability, and maintainability projections for new weapon systems."--Page 4 of cover
    Note: "RAND Project Air Force , Includes bibliographical references (pages 25-27)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    ISBN: 9780833080585 , 0833083260 , 083308058X , 9780833083265
    Language: English
    Pages: 1 Online-Ressource (xx, 73 pages)
    Series Statement: Rand Corporation research report series RR-110-OSD
    Parallel Title: Erscheint auch als Gates, Susan M., 1968- Analyses of the Department of Defense acquisition workforce
    Keywords: United States Procurement ; United States Personnel management ; United States ; United States ; Civil service ; Civil service ; Military & Naval Science ; Law, Politics & Government ; Military Administration ; United States ; COMPUTERS ; Data Modeling & Design ; Armed Forces ; Procurement ; Civil service ; Personnel management ; United States ; Electronic books
    Abstract: The organic defense acquisition workforce consists of military personnel and Department of Defense civilian personnel who provide the management, technical, and business capabilities needed to oversee defense acquisition programs from start to finish. This workforce must itself be managed so that the right numbers of the right personnel are in the right positions at the right time. Since 2006, RAND has been helping develop data-based tools to support analysis of this workforce. This volume updates a 2008 report by documenting revisions to methods, providing descriptive information on the workforce through fiscal year 2011, and providing a user's manual for a model that can help managers project workforce needs through 2021 under different assumptions about the future. The report illustrates the use of the model
    Abstract: The organic defense acquisition workforce consists of military personnel and Department of Defense civilian personnel who provide the management, technical, and business capabilities needed to oversee defense acquisition programs from start to finish. This workforce must itself be managed so that the right numbers of the right personnel are in the right positions at the right time. Since 2006, RAND has been helping develop data-based tools to support analysis of this workforce. This volume updates a 2008 report by documenting revisions to methods, providing descriptive information on the workforce through fiscal year 2011, and providing a user's manual for a model that can help managers project workforce needs through 2021 under different assumptions about the future. The report illustrates the use of the model
    Note: "National Defense Research Institute , "Prepared for the Office of the Secretary of Defense , Includes bibliographical references (pages 71-73)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    ISBN: 9780833082107 , 0833084658 , 0833082108 , 9780833084651
    Language: English
    Pages: 1 Online-Ressource (xxix, 196 pages)
    Series Statement: Rand Corporation research report series RR-413-OSD
    Keywords: Nation-building Evaluation ; National security International cooperation ; Evaluation ; Nation-building ; National security ; Law, Politics & Government ; International Relations ; United States ; POLITICAL SCIENCE ; Political Freedom ; Electronic books
    Abstract: Security cooperation has long been an important instrument of the U.S. government and the Department of Defense for advancing national security objectives vis-à-vis allies and partner countries, including building critical relationships, securing peacetime and contingency access, and building partner capacity (BPC). One of the key challenges for policymakers and combatant commands is gaining a more complete understanding of the real value of BPC activities. Assessments of prior and ongoing BPC activities, in particular, have become increasingly important given the current fiscal climate and budgetary limitations. But it is no easy task to assess the value of what are essentially qualitative activities, and data limitations severely hinder assessments. The tools available -- such as resources, authorities, programs, processes, and organizational relationships -- may or may not be the optimal ones for the delivery of BPC activities to partner countries. This report characterizes security cooperation mechanisms used by combatant commands for BPC, produces a detailed database of the mechanism elements, develops and applies a preliminary means of evaluating the effectiveness and efficiency of select mechanisms, and draws on the analysis from the case studies to recommend ways to improve the effectiveness and efficiency of those mechanisms in the future
    Abstract: Security cooperation has long been an important instrument of the U.S. government and the Department of Defense for advancing national security objectives vis-à-vis allies and partner countries, including building critical relationships, securing peacetime and contingency access, and building partner capacity (BPC). One of the key challenges for policymakers and combatant commands is gaining a more complete understanding of the real value of BPC activities. Assessments of prior and ongoing BPC activities, in particular, have become increasingly important given the current fiscal climate and budgetary limitations. But it is no easy task to assess the value of what are essentially qualitative activities, and data limitations severely hinder assessments. The tools available -- such as resources, authorities, programs, processes, and organizational relationships -- may or may not be the optimal ones for the delivery of BPC activities to partner countries. This report characterizes security cooperation mechanisms used by combatant commands for BPC, produces a detailed database of the mechanism elements, develops and applies a preliminary means of evaluating the effectiveness and efficiency of select mechanisms, and draws on the analysis from the case studies to recommend ways to improve the effectiveness and efficiency of those mechanisms in the future
    Note: "National Defense Research Institute , "Prepared for the Joint Staff and OSD/CAPE , Includes bibliographical references (pages 193-196)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    ISBN: 9780833073846 , 0833073842 , 9780833073402 , 0833073826 , 0833073400 , 9780833073822
    Language: English
    Pages: 1 Online-Ressource (xvii, 50 pages)
    Series Statement: Rand Corporation monograph series MG-1211-AF
    Parallel Title: Print version U.S. overseas military presence
    DDC: 355/.033573
    Keywords: National security Planning ; Military bases, American ; National security ; Military bases, American ; National security ; Planning ; Military & Naval Science ; Law, Politics & Government ; Armies ; HISTORY ; Military ; Other ; TECHNOLOGY & ENGINEERING ; Military Science ; Armed Forces ; Military policy ; Planning ; Military readiness ; Military readiness ; Planning ; United States ; United States Armed Forces ; United States Military policy ; Planning ; United States Defenses ; United States Defenses ; Planning ; United States ; United States ; United States ; United States ; Electronic books
    Abstract: "Since World War II, the United States has relied on a global network of military bases and forces to protect its interests and those of its allies. But the international environment has changed greatly over the decades, and economic concerns have risen, leading some to debate just what America's role should now be in the world. This monograph addresses one aspect of this debate by introducing a new analytical approach to defining future U.S. military presence overseas. It does so by first considering U.S. global security interests, then focusing on specific threats to them in East Asia, Europe, and the Middle East. With that, the researchers designed a menu of global postures based on different strategic perspectives. They evaluated the global postures in terms of their operational performance and then compared them in terms of their associated U.S. Air Force bases, combat forces, active-duty personnel, and base operating costs. These analyses offer insights on the critical strategic choices that policymakers need to address and that the public needs to debate as they consider future overseas U.S. military presence. Among these choices are for the United States to depend more on its allies, rely more on U.S. based military forces, focus its presence more on East Asia or on the Middle East, or retain its current overseas presence in the face of expanding threats. Those involved in debates on the future global U.S. posture will need to make explicit their implicit underlying perspectives on what role overseas military presence can play in achieving U.S. global security interests."--Publisher's description
    Abstract: Introduction -- Path to defining future global U.S. postures -- Comparison of global postures -- Strategic choices: Overseas U.S. military presence -- Appendix A. Protecting the global commons: confusing means with ends -- Appendix B. Database of current U.S. bases overseas -- Appendix C. Comparison of global postures
    Abstract: "Since World War II, the United States has relied on a global network of military bases and forces to protect its interests and those of its allies. But the international environment has changed greatly over the decades, and economic concerns have risen, leading some to debate just what America's role should now be in the world. This monograph addresses one aspect of this debate by introducing a new analytical approach to defining future U.S. military presence overseas. It does so by first considering U.S. global security interests, then focusing on specific threats to them in East Asia, Europe, and the Middle East. With that, the researchers designed a menu of global postures based on different strategic perspectives. They evaluated the global postures in terms of their operational performance and then compared them in terms of their associated U.S. Air Force bases, combat forces, active-duty personnel, and base operating costs. These analyses offer insights on the critical strategic choices that policymakers need to address and that the public needs to debate as they consider future overseas U.S. military presence. Among these choices are for the United States to depend more on its allies, rely more on U.S. based military forces, focus its presence more on East Asia or on the Middle East, or retain its current overseas presence in the face of expanding threats. Those involved in debates on the future global U.S. posture will need to make explicit their implicit underlying perspectives on what role overseas military presence can play in achieving U.S. global security interests."--Publisher's description
    Note: "This research was conducted in the Strategy and Doctrine Program of RAND Project Air Force"--Preface , "RAND Project Air Force , Includes bibliographical references (pages 47-50)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    Santa Monica, Calif : RAND
    ISBN: 9780833076878 , 0833083597 , 0833076876 , 9780833083593
    Language: English
    Pages: 1 Online-Ressource (xxii, 85 pages)
    Series Statement: Rand Corporation technical report series TR-1286-OSD
    Parallel Title: Print version Assessment of the civilian acquisition workforce personnel demonstration project
    Keywords: United States Procurement ; Management ; United States Personnel management ; Evaluation ; United States ; United States ; Human capital Government policy ; Civil service Personnel management ; Human capital ; Civil service ; Civil service ; Personnel management ; Human capital ; Government policy ; Personnel management ; Evaluation ; Military & Naval Science ; Law, Politics & Government ; Military Administration ; United States ; United States ; BUSINESS & ECONOMICS ; Decision-Making & Problem Solving ; Armed Forces ; Procurement ; Management ; Electronic books
    Abstract: "The vast majority of U.S. Department of Defense (DoD) and federal civilian employees work on the General Schedule (GS) personnel system. However, some concerns have been raised about the GS system, including perceptions that poorly performing employees are tolerated for extended periods of time and that monetary rewards are not directly linked to performance. In response to concerns of this nature, Congress has authorized some demonstration projects, in which additional flexibilities are provided, intending to produce better outcomes than if the employees were in the GS system. One such demonstration project, the DoD Civilian Acquisition Workforce Personnel Demonstration Project (AcqDemo), is the subject of this report. Implemented on February 7, 1999, AcqDemo is an effort to reengineer the civilian personnel system to meet the needs of the acquisition workforce and to facilitate the fulfillment of the DoD acquisition mission. Congress required an independent assessment of the program against 12 criteria by September 30, 2012. This report is that legislatively mandated assessment
    Note: "National Defense Research Institute , Includes bibliographical references (pages 83-85)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    ISBN: 9780833078551 , 0833083481 , 0833078550 , 9780833083487
    Language: English
    Pages: 1 Online-Ressource (xxiii, 78 pages)
    Series Statement: Technical report TR-1294-NAVY
    Parallel Title: Print version Porche, Isaac, 1968- Rapid acquisition and fielding for information assurance and cyber security in the Navy
    Keywords: United States Planning ; United States Information technology ; United States Procurement ; United States ; United States ; United States ; Government purchasing Law and legislation ; Computer security ; Cyberterrorism Prevention ; Computer software Purchasing ; Computers Purchasing ; Defense contracts ; Government purchasing ; Computer security ; Cyberterrorism ; Computer software ; Computers ; Defense contracts ; Defense contracts ; Government purchasing ; Law and legislation ; Armed Forces ; Planning ; Military & Naval Science ; Law, Politics & Government ; Naval Science - General ; United States ; COMPUTERS ; Internet ; Security ; Armed Forces ; Procurement ; Computer security ; Computer software ; Purchasing ; United States ; Computers ; Purchasing ; Cyberterrorism ; Prevention ; Electronic books
    Abstract: Identifying an agile and adaptable acquisition process that can field new information technology capabilities and services in relatively short and responsive time frames is a pressing issue for the U.S. Navy. Damaging malware can mutate within hours or days, requiring a defense that is sufficiently responsive to mitigate each variant. The Navy's Program Manager, Warfare (PMW) 130, an office in the Navy's Program Executive Office for Command, Control, Communications, Computers, and Intelligence, is focused on rapidly and proactively fielding innovative capabilities to stay ahead of cyber threats. It requires an acquisition and fielding cycle that can deliver hardware security products within 12-18 months, software security products within six to 12 months, and incremental development for both hardware and software every three months. These time frames are far shorter than the Navy's traditional acquisition cycle time, which can be 36 months from concept approval to initial operational capability or eight to ten years for full operational capability. With a focus on these goals, a RAND study sought to identify ways to accelerate or bypass the traditional acquisition process in response to the unique demands of PMW 130 information technology and cyber programs, with lessons derived from and recommendations applicable to programs across the U.S. Department of Defense
    Abstract: Identifying an agile and adaptable acquisition process that can field new information technology capabilities and services in relatively short and responsive time frames is a pressing issue for the U.S. Navy. Damaging malware can mutate within hours or days, requiring a defense that is sufficiently responsive to mitigate each variant. The Navy's Program Manager, Warfare (PMW) 130, an office in the Navy's Program Executive Office for Command, Control, Communications, Computers, and Intelligence, is focused on rapidly and proactively fielding innovative capabilities to stay ahead of cyber threats. It requires an acquisition and fielding cycle that can deliver hardware security products within 12-18 months, software security products within six to 12 months, and incremental development for both hardware and software every three months. These time frames are far shorter than the Navy's traditional acquisition cycle time, which can be 36 months from concept approval to initial operational capability or eight to ten years for full operational capability. With a focus on these goals, a RAND study sought to identify ways to accelerate or bypass the traditional acquisition process in response to the unique demands of PMW 130 information technology and cyber programs, with lessons derived from and recommendations applicable to programs across the U.S. Department of Defense
    Note: "Prepared for the United States Navy , "National Defense Research Institute , Includes bibliographical references (pages 73-78)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    ISBN: 9780833059031 , 0833059033 , 9780833077561 , 0833077562 , 9780833058966 , 0833058967
    Language: English
    Pages: 1 Online-Ressource (xxxi, 121 pages)
    DDC: 623.82574
    Keywords: United States Procurement ; Seawolf (Submarine) ; United States ; Seawolf (Submarine) ; Nuclear submarines Design and construction ; Shipbuilding industry Management ; Nuclear submarines Planning ; Nuclear submarines ; Shipbuilding industry ; Nuclear submarines ; United States ; Seawolf (Submarine) ; United States ; Armed Forces ; Procurement ; Shipbuilding industry ; Management ; Electronic books
    Abstract: Large, complex submarine design and construction programs demand personnel with unique skills and capabilities supplemented with practical experiences in their areas of expertise. Recognizing the importance of past experiences for successful program management, the U.S. Navy asked the RAND Corporation to develop a set of lessons learned from previous submarine programs that could help inform future program managers. This volume presents lessons from three submarine programs. The RAND team looked at how the programs were managed, the issues that affected management decisions, and the outcomes of those decisions. All three submarine programs had tenuous beginnings. Each experienced cost overruns and schedule delays in the construction of its first-of-class submarine. The Ohio and Virginia programs made corrections, and both are viewed as generally successful. Seawolf, probably due to the changing threat and budgetary environment, was terminated before changes could be made to correct early missteps. An overarching lesson from the three programs is the importance of program stability. Stability applies in many areas--funding consistency, a long-term build strategy, fixed operational requirements, program management, and an integrated partnership between the Navy and the shipbuilders
    Abstract: Large, complex submarine design and construction programs demand personnel with unique skills and capabilities supplemented with practical experiences in their areas of expertise. Recognizing the importance of past experiences for successful program management, the U.S. Navy asked the RAND Corporation to develop a set of lessons learned from previous submarine programs that could help inform future program managers. This volume presents lessons from three submarine programs. The RAND team looked at how the programs were managed, the issues that affected management decisions, and the outcomes of those decisions. All three submarine programs had tenuous beginnings. Each experienced cost overruns and schedule delays in the construction of its first-of-class submarine. The Ohio and Virginia programs made corrections, and both are viewed as generally successful. Seawolf, probably due to the changing threat and budgetary environment, was terminated before changes could be made to correct early missteps. An overarching lesson from the three programs is the importance of program stability. Stability applies in many areas--funding consistency, a long-term build strategy, fixed operational requirements, program management, and an integrated partnership between the Navy and the shipbuilders
    Note: "This research was conducted within the Acquisition and Technology Policy Center of the RAND National Defense Research Institute"--Pg. IV , "RAND National Defense Research Institute , Includes bibliographical references (pages 117-121)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    ISBN: 9780833052629 , 0833059114 , 0833052624 , 9780833059116
    Language: English
    Pages: 1 Online-Ressource (xxiii, 129 pages)
    Series Statement: RAND Corporation technical report series TR972
    Parallel Title: Print version Lessons from U.S. allies in security cooperation with third countries
    Keywords: Military policy Case studies ; National security Case studies International cooperation ; Military policy ; National security ; National security ; International cooperation ; Military & Naval Science ; Law, Politics & Government ; Armies ; HISTORY ; Military ; Other ; Australia ; France ; Great Britain ; United States ; Australia ; security policy ; cooperation ; France ; security policy ; cooperation ; UK ; security policy ; cooperation ; TECHNOLOGY & ENGINEERING ; Military Science ; HISTORY ; Military ; Strategy ; Military policy ; Military relations ; Case studies ; France Military relations ; Great Britain Military relations ; United States Military relations ; Australia Military relations ; France ; Great Britain ; United States ; Australia ; Electronic book
    Abstract: Introduction -- Australia's Approach to Security Cooperation -- France's Approach to Security Cooperation -- The United Kingdom's Approach to Security Cooperation -- Comparing the Case Studies -- Conclusions and Recommendations -- Appendix A: Royal Australian Air Force Activities with Foreign Partners -- Appendix B: Brazilian Air Force Activities with Foreign Partners -- Appendix C: Chilean Air Force Activities with Foreign Partners -- Appendix D: Colombian Air Force Activities with Foreign Partners -- Appendix E: French Air Force Activities with Foreign Partners -- Appendix F: Indian Air Force Activities with Foreign Partners -- Appendix G: Israeli Air and Space Force Activities with Foreign Partners -- Appendix H: Japan Air Self-Defense Force Activities with Foreign Partners -- Appendix I: Pakistan Air Force Activities with Foreign Partners -- Appendix J: Republic of Korea Air Force Activities with Foreign Partners -- Appendix K: Singapore Air Force Activities with Foreign Partners -- Appendix L: South African Air Force Activities with Foreign Partners -- Appendix M: United Arab Emirates Air Force Activities with Foreign Partners -- Appendix N: Royal Air Force Activities with Foreign Partners
    Abstract: Introduction -- Australia's Approach to Security Cooperation -- France's Approach to Security Cooperation -- The United Kingdom's Approach to Security Cooperation -- Comparing the Case Studies -- Conclusions and Recommendations -- Appendix A: Royal Australian Air Force Activities with Foreign Partners -- Appendix B: Brazilian Air Force Activities with Foreign Partners -- Appendix C: Chilean Air Force Activities with Foreign Partners -- Appendix D: Colombian Air Force Activities with Foreign Partners -- Appendix E: French Air Force Activities with Foreign Partners -- Appendix F: Indian Air Force Activities with Foreign Partners -- Appendix G: Israeli Air and Space Force Activities with Foreign Partners -- Appendix H: Japan Air Self-Defense Force Activities with Foreign Partners -- Appendix I: Pakistan Air Force Activities with Foreign Partners -- Appendix J: Republic of Korea Air Force Activities with Foreign Partners -- Appendix K: Singapore Air Force Activities with Foreign Partners -- Appendix L: South African Air Force Activities with Foreign Partners -- Appendix M: United Arab Emirates Air Force Activities with Foreign Partners -- Appendix N: Royal Air Force Activities with Foreign Partners
    Note: "Project Air Force , Includes bibliographical references (pages 121-129) , Title from PDF title screen (viewed Oct. 9, 2011)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    ISBN: 9780833047564 , 0833050265 , 0833047566 , 9780833050267
    Language: English
    Pages: 1 Online-Ressource (xxiii, 138 pages)
    Series Statement: Rand Corporation monograph series
    Parallel Title: Print version Larrabee, F. Stephen Troubled partnership
    Keywords: World politics 1989- ; Geopolitics ; Social change ; National security ; National security ; World politics ; Geopolitics ; Social change ; National security ; National security ; Diplomatic relations ; Military relations ; National security ; Social change ; World politics ; POLITICAL SCIENCE ; Government ; International ; POLITICAL SCIENCE ; International Relations ; General ; Turkey ; United States ; Geopolitics ; Turkey Military relations ; Turkey Foreign relations ; United States Military relations ; United States Foreign relations ; Turkey ; Turkey ; United States ; United States
    Abstract: Turkey stands at the nexus of four geographic areas of growing strategic importance in the post-Cold War era: the Balkans, the Middle East, the Caucasus/Central Asia, and the Persian Gulf region. In each of these areas, Turkey's cooperation is critical for achieving U.S. policy goals. However, in recent years, especially since 2003, U.S.- Turkish relations have undergone serious strains. Sharp differences over Iraq and the Kurdish issue have been compounded by differences over the Middle East, particularly relations with Iran, Iraq, and Syria. At the same time, Turkey has witnessed a sharp rise in anti-American sentiment. This monograph examines the causes of recent strains in the U.S.-Turkish security partnership and options for reducing these strains
    Abstract: Turkey stands at the nexus of four geographic areas of growing strategic importance in the post-Cold War era: the Balkans, the Middle East, the Caucasus/Central Asia, and the Persian Gulf region. In each of these areas, Turkey's cooperation is critical for achieving U.S. policy goals. However, in recent years, especially since 2003, U.S.- Turkish relations have undergone serious strains. Sharp differences over Iraq and the Kurdish issue have been compounded by differences over the Middle East, particularly relations with Iran, Iraq, and Syria. At the same time, Turkey has witnessed a sharp rise in anti-American sentiment. This monograph examines the causes of recent strains in the U.S.-Turkish security partnership and options for reducing these strains
    Note: Includes bibliographical references (pages 127-138)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    ISBN: 9780833051035 , 0833051121 , 0833051032 , 9780833051127
    Language: English
    Pages: 1 Online-Ressource (xli, 133 pages)
    Series Statement: Rand Corporation monograph series MG-1031-NIJ
    Parallel Title: Print version Long-term effects of law enforcement's post-9/11 focus on counterterrorism and homeland security
    Keywords: Civil defense ; National security ; Law enforcement ; Terrorism Prevention ; Police training Costs ; Civil defense ; National security ; Law enforcement ; Terrorism ; Police training ; Civil defense ; Law enforcement ; National security ; Terrorism ; Prevention ; United States ; POLITICAL SCIENCE ; Political Freedom & Security ; Law Enforcement ; POLITICAL SCIENCE ; Law Enforcement ; Electronic books
    Abstract: Since the 9/11 terrorist attacks, the need for increased counterterrorism (CT) and homeland security (HS) efforts at the federal, state, and local levels has taken the spotlight in public safety efforts. In the immediate aftermath of 9/11, many law enforcement agencies (LEAs) shifted more resources toward developing CT and HS capabilities, and the federal government continues to support these efforts with grants provided through the Department of Homeland Security. This monograph examines the long-term adjustments that large urban LEAs have made to accommodate the focus on CT and HS, as well as the advantages and challenges associated with it. The study relies primarily on in-depth case studies of five large urban LEAs, as well as a review of federal HS grant programs and a quantitative analysis of the potential costs associated with shifting law enforcement personnel from traditional policing to focus on HS and CT functions. Major trends among the five case study LEAs include the creation of specialized departments and units, as well as an increased emphasis on information-sharing, which, nationwide, has led to the creation of fusion centers that serve as formal hubs for regional information-sharing networks. LEAs' HS and CT efforts are also greatly influenced by the restrictions and requirements associated with federal HS grant funding. Finally, using cost-of-crime estimates, it is possible to partially quantify the costs associated with LEAs' shifting of personnel away from traditional crime prevention toward CT and HS -- there are also clear benefits associated with law enforcement's focus on CT and HS, but they are difficult to quantify, and this is posing a challenge for LEAs as the economic downturn puts pressure on public budgets
    Abstract: Since the 9/11 terrorist attacks, the need for increased counterterrorism (CT) and homeland security (HS) efforts at the federal, state, and local levels has taken the spotlight in public safety efforts. In the immediate aftermath of 9/11, many law enforcement agencies (LEAs) shifted more resources toward developing CT and HS capabilities, and the federal government continues to support these efforts with grants provided through the Department of Homeland Security. This monograph examines the long-term adjustments that large urban LEAs have made to accommodate the focus on CT and HS, as well as the advantages and challenges associated with it. The study relies primarily on in-depth case studies of five large urban LEAs, as well as a review of federal HS grant programs and a quantitative analysis of the potential costs associated with shifting law enforcement personnel from traditional policing to focus on HS and CT functions. Major trends among the five case study LEAs include the creation of specialized departments and units, as well as an increased emphasis on information-sharing, which, nationwide, has led to the creation of fusion centers that serve as formal hubs for regional information-sharing networks. LEAs' HS and CT efforts are also greatly influenced by the restrictions and requirements associated with federal HS grant funding. Finally, using cost-of-crime estimates, it is possible to partially quantify the costs associated with LEAs' shifting of personnel away from traditional crime prevention toward CT and HS -- there are also clear benefits associated with law enforcement's focus on CT and HS, but they are difficult to quantify, and this is posing a challenge for LEAs as the economic downturn puts pressure on public budgets
    Note: Includes bibliographical references (pages 121-133)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    Santa Monica, CA : Rand
    ISBN: 9780833026675 , 0833026674 , 0585239576 , 9780585239576 , 9780833032560 , 0833032569
    Language: English
    Pages: Online Ressource (xxi, 153 pages) , illustrations
    Edition: Online-Ausg.
    Parallel Title: Print version Countering the new terrorism
    DDC: 303.625
    Keywords: United States / Air Force Security measures ; United States / Air Force ; United States Security measures ; United States Security measures ; United States ; Terrorism Prevention ; United States ; Information warfare Prevention ; United States ; National security United States ; Air power United States ; National security ; Information warfare Prevention ; Air power ; Terrorism Prevention ; Information warfare Prevention ; National security ; Air power ; Terrorism Prevention ; Air power ; Information warfare ; Prevention ; Military policy ; National security ; Armed Forces ; Security measures ; Terrorism ; Prevention ; POLITICAL SCIENCE ; Political Freedom & Security ; Terrorism ; United States Military policy ; United States ; United States Military policy ; United States Military policy ; United States ; Electronic book ; Electronic books
    Abstract: The contours of terrorism are changing, and the new terrorism has more diverse sources, motivations, and tactics than the old. It is more lethal, global in reach, and characterized by network forms of organization. Terrorist sponsorship is becoming hazier and "privatized." The August 1998 terrorist bombings of U.S. embassies in Kenya and Tanzania fit in many ways the new mold. The chapters in this book trace the evolution of international terrorism against civilian and U.S. military targets, look ahead to where terrorism is going, and assess how it might be contained. Terrorism and counterterrorism are placed in strategic perspective, including how terrorism might be applied as an asymmetric strategy by less-capable adversaries. The report builds on a existing body of RAND research on terrorism and political violence, and makes extensive use of the RAND-St. Andrews Chronology of International Terrorism
    Note: "Prepared for the United States Air Force. - "Project Air Force. - "MR-989-AF"--Page 4 of cover. - Includes bibliographical references and index. - Description based on print version record , "Project Air Force , "MR-989-AF"--P. [4] of cover , Includes bibliographical references and index
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...