Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • MPI Ethno. Forsch.  (5)
  • Rand Corporation National Security Research Division  (5)
  • Social Sciences  (5)
Datasource
  • MPI Ethno. Forsch.  (5)
Material
Language
Years
  • 1
    ISBN: 9780833091284 , 083309128X , 9780833090485 , 0833090488
    Language: English
    Pages: 1 Online-Ressource (xxxi, 233 pages)
    Series Statement: Research report RR-1075-DOS
    Parallel Title: Print versionGreenfield, Victoria A., 1964- Reducing the cultivation of opium poppies in southern Afghanistan
    DDC: 362.293
    Keywords: Opium poppy growers ; Rural development ; Opium trade ; Opium poppy growers ; Rural development ; Opium trade ; Opium trade ; Rural development ; Social Sciences ; Afghanistan ; Social Welfare & Social Work ; Substance Abuse ; Agriculture ; Opium poppy growers ; Afghanistan Agriculture ; Afghanistan ; Electronic books
    Abstract: "This report identifies a broad range of factors that drive opium poppy cultivation in southern Afghanistan, the locus of opium production in that country, and assesses the positive and negative effects of programs designed to promote rural development, eradicate opium poppies, or otherwise create incentives for farmers to reduce the cultivation of opium poppies. The authors consider the decision to cultivate opium poppy or other crops from the perspective of farmers who must balance concerns about household income and food sufficiency in the context of socio-economic and environmental factors that, for example, relate to security, eradication, and environmental risks; governance and religiosity; landholding terms and conditions; household circumstances; and agricultural input costs and commodity prices. A factor might encourage or discourage opium poppy cultivation and, in some instances, it could have indeterminate or conflicting effects. Then, the authors examine how rural development, crop eradication, and other programs touch on the factors --and affect poppy cultivation--through mechanisms that include subsidies on fertilizer, high-quality wheat seed, saplings and vines, and farm equipment and facilities; infrastructure investment; training; introduction of non-traditional crops; cash-for-work programs; improved market links; and non-agricultural rural income. On the basis of the assessment, the authors also provide advice on how to design programs that might better serve to reduce the cultivation of opium poppies in southern Afghanistan over the long term"--Abstract
    Abstract: "This report identifies a broad range of factors that drive opium poppy cultivation in southern Afghanistan, the locus of opium production in that country, and assesses the positive and negative effects of programs designed to promote rural development, eradicate opium poppies, or otherwise create incentives for farmers to reduce the cultivation of opium poppies. The authors consider the decision to cultivate opium poppy or other crops from the perspective of farmers who must balance concerns about household income and food sufficiency in the context of socio-economic and environmental factors that, for example, relate to security, eradication, and environmental risks; governance and religiosity; landholding terms and conditions; household circumstances; and agricultural input costs and commodity prices. A factor might encourage or discourage opium poppy cultivation and, in some instances, it could have indeterminate or conflicting effects. Then, the authors examine how rural development, crop eradication, and other programs touch on the factors --and affect poppy cultivation--through mechanisms that include subsidies on fertilizer, high-quality wheat seed, saplings and vines, and farm equipment and facilities; infrastructure investment; training; introduction of non-traditional crops; cash-for-work programs; improved market links; and non-agricultural rural income. On the basis of the assessment, the authors also provide advice on how to design programs that might better serve to reduce the cultivation of opium poppies in southern Afghanistan over the long term"--Abstract
    Note: "June 17, 2015"--Table of contents page , Includes bibliographical references (pages 221-233)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9780833085016 , 0833085018 , 9780833085023 , 0833085034 , 9780833085009 , 0833085026 , 9780833085030
    Language: English
    Pages: 1 Online-Ressource (xxi, 84 pages)
    Parallel Title: Print version Libicki, Martin C H4cker5 wanted
    Keywords: Professions Supply and demand ; Hackers ; Cyberspace Security measures ; Cyber intelligence (Computer security) ; Computer crimes Prevention ; Professions ; Hackers ; Cyberspace ; Cyber intelligence (Computer security) ; Computer crimes ; POLITICAL SCIENCE ; Labor & Industrial Relations ; POLITICAL SCIENCE ; Political Freedom ; Computer crimes ; Prevention ; Cyber intelligence (Computer security) ; Hackers ; Professions ; Supply and demand ; Social Welfare & Social Work ; Social Sciences ; Criminology, Penology & Juvenile Delinquency ; BUSINESS & ECONOMICS ; Labor ; Electronic books
    Abstract: The perceived shortage of cybersecurity professionals working on national security may endanger the nation's networks and be a disadvantage in cyberspace conflict. RAND examined the cybersecurity labor market, especially in regard to national defense. Analysis suggests market forces and government programs will draw more workers into the profession in time, and steps taken today would not bear fruit for another five to ten years
    Abstract: The perceived shortage of cybersecurity professionals working on national security may endanger the nation's networks and be a disadvantage in cyberspace conflict. RAND examined the cybersecurity labor market, especially in regard to national defense. Analysis suggests market forces and government programs will draw more workers into the profession in time, and steps taken today would not bear fruit for another five to ten years
    Note: "RAND National Security Research Division , "RR-430"--Page 4 of cover , Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9780833085412 , 0833085417 , 9780833085740 , 0833085743 , 9780833087119 , 012415817X , 0833087118 , 9780124158177
    Language: English
    Pages: 1 Online-Ressource (xv, 65 pages)
    Parallel Title: Print version Ablon, Lillian Markets for cybercrime tools and stolen data
    Keywords: Hacking ; Computer crimes Economic aspects ; Black market ; Data protection ; Hacking ; Computer crimes ; Black market ; Data protection ; Hacking ; Schwarzmarkt ; Datensicherung ; Internetkriminalität ; Computerkriminalität ; Criminology, Penology & Juvenile Delinquency ; Social Sciences ; Social Welfare & Social Work ; COMPUTERS ; Internet ; Security ; Grässe ; SOCIAL SCIENCE ; Criminology ; Black market ; Data protection ; Electronic books
    Abstract: Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report, part of a multiphase study on the future security environment, describes the fundamental characteristics of these markets and how they have grown into their current state to explain how their existence can harm the information security environment. Understanding the current and predicted landscape for these markets lays the groundwork for follow-on exploration of options to minimize the potentially harmful influence these markets impart. Experts agree that the coming years will bring more activity in darknets, more use of crypto-currencies, greater anonymity capabilities in malware, and more attention to encrypting and protecting communications and transactions; that the ability to stage cyberattacks will likely outpace the ability to defend against them; that crime will increasingly have a networked or cyber component, creating a wider range of opportunities for black markets; and that there will be more hacking for hire, as-a-service offerings, and brokers. Experts disagree, however, on who will be most affected by the growth of the black market (e.g., small or large businesses, individuals), what products will be on the rise (e.g., fungible goods, such as data records and credit card information; non-fungible goods, such as intellectual property), or which types of attacks will be most prevalent (e.g., persistent, targeted attacks; opportunistic, mass "smash-and-grab" attacks)
    Abstract: Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report, part of a multiphase study on the future security environment, describes the fundamental characteristics of these markets and how they have grown into their current state to explain how their existence can harm the information security environment. Understanding the current and predicted landscape for these markets lays the groundwork for follow-on exploration of options to minimize the potentially harmful influence these markets impart. Experts agree that the coming years will bring more activity in darknets, more use of crypto-currencies, greater anonymity capabilities in malware, and more attention to encrypting and protecting communications and transactions; that the ability to stage cyberattacks will likely outpace the ability to defend against them; that crime will increasingly have a networked or cyber component, creating a wider range of opportunities for black markets; and that there will be more hacking for hire, as-a-service offerings, and brokers. Experts disagree, however, on who will be most affected by the growth of the black market (e.g., small or large businesses, individuals), what products will be on the rise (e.g., fungible goods, such as data records and credit card information; non-fungible goods, such as intellectual property), or which types of attacks will be most prevalent (e.g., persistent, targeted attacks; opportunistic, mass "smash-and-grab" attacks)
    Note: "RR-610-JNI."--Page 4 of cover , "The research described in this report was sponsored by Juniper Networks and conducted within the Acquisition and Technology Policy Center of the RAND National Security Research Division"--Title page verso , Includes bibliographical references (pages 53-65)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    ISBN: 9780833080929 , 0833083368 , 083308092X , 9780833083364
    Language: English
    Pages: 1 Online-Ressource (xliii, 258 pages)
    Parallel Title: Available in another form
    Parallel Title: Available in another form
    Keywords: Violence Forecasting ; Criminal behavior Research ; Methodology ; Terrorists Psychology ; Terrorists Social conditions ; Criminal behavior, Prediction of ; Terrorism Prevention ; Violence ; Criminal behavior ; Terrorists ; Terrorists ; Criminal behavior, Prediction of ; Terrorism ; Behavioral Research ; Behavioral Sciences ; Crime ; Criminology ; Disciplines and Occupations ; Natural Science Disciplines ; Psychiatry and Psychology ; Research ; Science ; Social Problems ; Social Sciences ; Sociology ; Terrorism ; Violence ; Anthropology, Education, Sociology and Social Phenomena ; Behavioral Disciplines and Activities ; Criminal behavior, Prediction of ; Social Welfare & Social Work ; Social Sciences ; SOCIAL SCIENCE ; Criminology ; Criminology, Penology & Juvenile Delinquency ; Terrorists ; Psychology ; Criminal behavior ; Research ; Methodology ; Terrorism ; Prevention ; Violence ; Forecasting ; Electronic books
    Abstract: Government organizations have put substantial effort into detecting and thwarting terrorist and insurgent attacks by observing suspicious behaviors of individuals at transportation checkpoints and elsewhere. This report reviews the scientific literature relating to observable, individual-level behavioral indicators that might-along with other information-help detect potential violent attacks. The report focuses on new or nontraditional technologies and methods, most of which exploit (1) data on communication patterns, (2) "pattern-of-life" data, and/or (3) data relating to body movement and physiological state. To help officials set priorities for special attention and investment, the report proposes an analytic framework for discussion and evaluation; it also urges investment in cost-effectiveness analysis and more vigorous, routine, and sustained efforts to measure real-world effectiveness of methods. One cross-cutting conclusion is that methods for behavioral observation are typically not reliable enough to stand alone; success in detection will depend on information fusion across types of behaviors and time. How to accomplish such fusion is understudied. Finally, because many aspects of using behavioral observations are highly controversial, both scientifically and because of privacy and civil-liberties concerns, the report sharpens the underlying perspectives and suggests ways to resolve some of the controversy while significantly mitigating problems that definitely exist
    Abstract: Government organizations have put substantial effort into detecting and thwarting terrorist and insurgent attacks by observing suspicious behaviors of individuals at transportation checkpoints and elsewhere. This report reviews the scientific literature relating to observable, individual-level behavioral indicators that might-along with other information-help detect potential violent attacks. The report focuses on new or nontraditional technologies and methods, most of which exploit (1) data on communication patterns, (2) "pattern-of-life" data, and/or (3) data relating to body movement and physiological state. To help officials set priorities for special attention and investment, the report proposes an analytic framework for discussion and evaluation; it also urges investment in cost-effectiveness analysis and more vigorous, routine, and sustained efforts to measure real-world effectiveness of methods. One cross-cutting conclusion is that methods for behavioral observation are typically not reliable enough to stand alone; success in detection will depend on information fusion across types of behaviors and time. How to accomplish such fusion is understudied. Finally, because many aspects of using behavioral observations are highly controversial, both scientifically and because of privacy and civil-liberties concerns, the report sharpens the underlying perspectives and suggests ways to resolve some of the controversy while significantly mitigating problems that definitely exist
    Note: "RAND National Security Research Division , "The research was conducted within the International Security and Defense Policy Center of the RAND National Defense Research Institute"--Title page verso , Includes bibliographical references (pages 225-258)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Santa Monica, CA : RAND Corp
    ISBN: 9780833046673 , 0833046810 , 9781282033443 , 1282033441 , 9780833046819 , 0833046675
    Language: English
    Pages: 1 Online-Ressource (vii, 27 pages)
    Edition: [S.l.] HathiTrust Digital Library 2010 Electronic reproduction
    Series Statement: Occasional paper OP-249-RC
    Parallel Title: Print version Lessons of Mumbai
    Keywords: Terrorism Prevention ; Government policy ; Civil defense readiness ; Bombings ; Emergency management ; Terrorism Prevention ; Terrorism Prevention ; Terrorism ; Terrorism ; Civil defense readiness ; Bombings ; Emergency management ; Terrorism ; Terrorism ; Terrorism ; POLITICAL SCIENCE ; Political Freedom & Security ; Terrorism ; POLITICAL SCIENCE ; International Relations ; General ; Bombings ; Civil defense readiness ; Emergency management ; Terrorism ; Terrorism ; Prevention ; Terrorism ; Prevention ; Government policy ; Social Welfare & Social Work ; Social Sciences ; Criminology, Penology & Juvenile Delinquency ; India ; India ; Mumbai ; India ; terrorism ; Bombay ; Electronic books
    Abstract: "This study of the Mumbai, India, terrorist attack of November 2008 identifies the operational and tactical capabilities displayed by the terrorists and evaluates the response of the Indian security forces. The authors draw out the implications of the incident for India, Pakistan, and the international community and derive lessons learned from the attack and from the Indian response. Their goal is to develop findings that may help counterterrorism authorities in India and elsewhere to prepare for or counter future terrorist attacks on urban centers."--Page 4 of cover
    Abstract: "This study of the Mumbai, India, terrorist attack of November 2008 identifies the operational and tactical capabilities displayed by the terrorists and evaluates the response of the Indian security forces. The authors draw out the implications of the incident for India, Pakistan, and the international community and derive lessons learned from the attack and from the Indian response. Their goal is to develop findings that may help counterterrorism authorities in India and elsewhere to prepare for or counter future terrorist attacks on urban centers."--Page 4 of cover
    Note: "This research was conducted within the RAND National Security Research Division (NSRD) of the RAND Corporation"--Preface , Includes bibliographical references (pages 25-27) , Use copy Restrictions unspecified star MiAaHDL , Electronic reproduction , Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...