Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • 2010-2014  (35)
  • Rand Corporation National Security Research Division  (35)
  • Electronic books  (35)
  • Zeitschriften zur Ethnologie
Datasource
Material
Language
Years
Year
  • 1
    ISBN: 9780833084040 , 0833085530 , 0833084046 , 9780833085535
    Language: English
    Pages: 1 Online-Ressource (xxiv, 226 pages)
    Series Statement: RAND Corporation research report series RR513
    Parallel Title: Print version Watts, Stephen (Stephen Baldwin) Countering others' insurgencies
    Keywords: Counterinsurgency Government policy ; Counterinsurgency ; Counterinsurgency ; Counterinsurgency ; Counterinsurgency ; Counterinsurgency ; Pakistan ; Philippines ; United States ; Military relations ; Military & Naval Science ; Law, Politics & Government ; Military Science - General ; Counterinsurgency ; Counterinsurgency ; Government policy ; United States Military relations ; Pakistan Military relations ; United States Military relations ; Philippines Military relations ; United States Military relations ; United States ; Pakistan ; United States ; Philippines ; United States ; Electronic books
    Abstract: This study examines the counterinsurgency strategies and practices adopted by threatened regimes and the conditions under which U.S. "small-footprint" partnerships are likely to help these governments succeed. The report's findings are derived from a mixed-method research design incorporating both quantitative and qualitative analysis. Simple statistical analyses are applied to a dataset of counterinsurgencies that have terminated since the end of the Cold War (72 in all), and more in-depth analyses are provided of two recent cases of U.S. partnerships with counterinsurgent regimes, in the Philippines and Pakistan. The quantitative analysis finds that the cases of small-footprint U.S. operations that are commonly touted as "success stories" all occurred in countries approximating a best-case scenario. Such a verdict is not meant to deny the importance of U.S. assistance; rather, it is meant to highlight that similar U.S. policies with less promising partner nations should not be expected to produce anywhere near the same levels of success. The majority of insurgencies have taken place in worst-case conditions, and in these environments, counterinsurgent regimes are typically unsuccessful in their efforts to end rebellion, and they often employ violence indiscriminately. The case studies of the Philippines and Pakistan largely reinforce the findings of the quantitative analysis. They also highlight the challenges the United States faces in attempting to influence partner regimes to fight counterinsurgencies in the manner that the United States would prefer. The study concludes with policy recommendations for managing troubled partnerships
    Abstract: This study examines the counterinsurgency strategies and practices adopted by threatened regimes and the conditions under which U.S. "small-footprint" partnerships are likely to help these governments succeed. The report's findings are derived from a mixed-method research design incorporating both quantitative and qualitative analysis. Simple statistical analyses are applied to a dataset of counterinsurgencies that have terminated since the end of the Cold War (72 in all), and more in-depth analyses are provided of two recent cases of U.S. partnerships with counterinsurgent regimes, in the Philippines and Pakistan. The quantitative analysis finds that the cases of small-footprint U.S. operations that are commonly touted as "success stories" all occurred in countries approximating a best-case scenario. Such a verdict is not meant to deny the importance of U.S. assistance; rather, it is meant to highlight that similar U.S. policies with less promising partner nations should not be expected to produce anywhere near the same levels of success. The majority of insurgencies have taken place in worst-case conditions, and in these environments, counterinsurgent regimes are typically unsuccessful in their efforts to end rebellion, and they often employ violence indiscriminately. The case studies of the Philippines and Pakistan largely reinforce the findings of the quantitative analysis. They also highlight the challenges the United States faces in attempting to influence partner regimes to fight counterinsurgencies in the manner that the United States would prefer. The study concludes with policy recommendations for managing troubled partnerships
    Note: Includes bibliographical references (pages 201-226)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9780833084941 , 0833085700 , 0833084941 , 9780833085702
    Language: English
    Pages: 1 Online-Ressource (xviii, 84 pages)
    Parallel Title: Print version Gonzales, Daniel Improving interagency information sharing using technology demonstrations
    Keywords: United States ; United States ; Civil-military relations ; Drug control Technological innovations ; Drug traffic Prevention ; Border security ; Interagency coordination ; Information networks Management ; Military law ; Civil-military relations ; Drug control ; Drug traffic ; Border security ; Interagency coordination ; Information networks ; Military law ; Information networks ; Management ; Interagency coordination ; Military law ; Law - U.S ; Law, Politics & Government ; Military Law - U.S ; United States ; TECHNOLOGY & ENGINEERING ; Military Science ; Border security ; Civil-military relations ; United States ; Drug control ; Technological innovations ; Electronic books
    Abstract: The Department of Defense (DoD) has developed new sensor technologies to support military forces operating in Iraq and Afghanistan. These new capabilities may be useful in counterdrug (CD) operations along the southern U.S. border. DoD has held technology demonstrations to test and demonstrate new technologies along the southern border--because the field conditions along the border closely resemble those in current military theaters of operation and because they can also reveal whether new technologies are useful for CD operations led by domestic law enforcement agencies. However, there are legal questions about whether such technology demonstrations fully comply with U.S. law and whether advanced DoD sensors can legally be used in domestic CD operations when they are operated by U.S. military forces. In this report, the authors examine federal law and DoD policy to answer these questions. Some parts of U.S. law mandate information sharing among federal departments and agencies for national security purposes and direct DoD to play a key role in domestic CD operations in support of U.S. law enforcement agencies, while other parts of the law place restrictions on when the U.S. military may participate in law enforcement operations. Reviewing relevant federal law and DoD policy, the authors conclude that there is no legal reason why a DoD sensor should be excluded from use in an interagency technology demonstration or in an actual CD operation as long as a valid request for support is made by an appropriate law enforcement official and so long as no personally identifiable or private information is collected. The authors recommend DoD policy on domestic CD operations be formally clarified and that an approval process should be established for technology demonstrations with a CD nexus
    Abstract: The Department of Defense (DoD) has developed new sensor technologies to support military forces operating in Iraq and Afghanistan. These new capabilities may be useful in counterdrug (CD) operations along the southern U.S. border. DoD has held technology demonstrations to test and demonstrate new technologies along the southern border--because the field conditions along the border closely resemble those in current military theaters of operation and because they can also reveal whether new technologies are useful for CD operations led by domestic law enforcement agencies. However, there are legal questions about whether such technology demonstrations fully comply with U.S. law and whether advanced DoD sensors can legally be used in domestic CD operations when they are operated by U.S. military forces. In this report, the authors examine federal law and DoD policy to answer these questions. Some parts of U.S. law mandate information sharing among federal departments and agencies for national security purposes and direct DoD to play a key role in domestic CD operations in support of U.S. law enforcement agencies, while other parts of the law place restrictions on when the U.S. military may participate in law enforcement operations. Reviewing relevant federal law and DoD policy, the authors conclude that there is no legal reason why a DoD sensor should be excluded from use in an interagency technology demonstration or in an actual CD operation as long as a valid request for support is made by an appropriate law enforcement official and so long as no personally identifiable or private information is collected. The authors recommend DoD policy on domestic CD operations be formally clarified and that an approval process should be established for technology demonstrations with a CD nexus
    Note: "RR551-OSD"--Page 4 of cover , "RAND National Security Research Division , "This research was ... conducted within the International Security and Defense Policy Center of the RAND National Defense Research Institute"--Preface , Includes bibliographical references (pages 81-84)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9780833085412 , 0833085417 , 9780833085740 , 0833085743 , 9780833087119 , 012415817X , 0833087118 , 9780124158177
    Language: English
    Pages: 1 Online-Ressource (xv, 65 pages)
    Parallel Title: Print version Ablon, Lillian Markets for cybercrime tools and stolen data
    Keywords: Hacking ; Computer crimes Economic aspects ; Black market ; Data protection ; Hacking ; Computer crimes ; Black market ; Data protection ; Hacking ; Schwarzmarkt ; Datensicherung ; Internetkriminalität ; Computerkriminalität ; Criminology, Penology & Juvenile Delinquency ; Social Sciences ; Social Welfare & Social Work ; COMPUTERS ; Internet ; Security ; Grässe ; SOCIAL SCIENCE ; Criminology ; Black market ; Data protection ; Electronic books
    Abstract: Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report, part of a multiphase study on the future security environment, describes the fundamental characteristics of these markets and how they have grown into their current state to explain how their existence can harm the information security environment. Understanding the current and predicted landscape for these markets lays the groundwork for follow-on exploration of options to minimize the potentially harmful influence these markets impart. Experts agree that the coming years will bring more activity in darknets, more use of crypto-currencies, greater anonymity capabilities in malware, and more attention to encrypting and protecting communications and transactions; that the ability to stage cyberattacks will likely outpace the ability to defend against them; that crime will increasingly have a networked or cyber component, creating a wider range of opportunities for black markets; and that there will be more hacking for hire, as-a-service offerings, and brokers. Experts disagree, however, on who will be most affected by the growth of the black market (e.g., small or large businesses, individuals), what products will be on the rise (e.g., fungible goods, such as data records and credit card information; non-fungible goods, such as intellectual property), or which types of attacks will be most prevalent (e.g., persistent, targeted attacks; opportunistic, mass "smash-and-grab" attacks)
    Abstract: Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report, part of a multiphase study on the future security environment, describes the fundamental characteristics of these markets and how they have grown into their current state to explain how their existence can harm the information security environment. Understanding the current and predicted landscape for these markets lays the groundwork for follow-on exploration of options to minimize the potentially harmful influence these markets impart. Experts agree that the coming years will bring more activity in darknets, more use of crypto-currencies, greater anonymity capabilities in malware, and more attention to encrypting and protecting communications and transactions; that the ability to stage cyberattacks will likely outpace the ability to defend against them; that crime will increasingly have a networked or cyber component, creating a wider range of opportunities for black markets; and that there will be more hacking for hire, as-a-service offerings, and brokers. Experts disagree, however, on who will be most affected by the growth of the black market (e.g., small or large businesses, individuals), what products will be on the rise (e.g., fungible goods, such as data records and credit card information; non-fungible goods, such as intellectual property), or which types of attacks will be most prevalent (e.g., persistent, targeted attacks; opportunistic, mass "smash-and-grab" attacks)
    Note: "RR-610-JNI."--Page 4 of cover , "The research described in this report was sponsored by Juniper Networks and conducted within the Acquisition and Technology Policy Center of the RAND National Security Research Division"--Title page verso , Includes bibliographical references (pages 53-65)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    ISBN: 9780833085016 , 0833085018 , 9780833085023 , 0833085034 , 9780833085009 , 0833085026 , 9780833085030
    Language: English
    Pages: 1 Online-Ressource (xxi, 84 pages)
    Parallel Title: Print version Libicki, Martin C H4cker5 wanted
    Keywords: Professions Supply and demand ; Hackers ; Cyberspace Security measures ; Cyber intelligence (Computer security) ; Computer crimes Prevention ; Professions ; Hackers ; Cyberspace ; Cyber intelligence (Computer security) ; Computer crimes ; POLITICAL SCIENCE ; Labor & Industrial Relations ; POLITICAL SCIENCE ; Political Freedom ; Computer crimes ; Prevention ; Cyber intelligence (Computer security) ; Hackers ; Professions ; Supply and demand ; Social Welfare & Social Work ; Social Sciences ; Criminology, Penology & Juvenile Delinquency ; BUSINESS & ECONOMICS ; Labor ; Electronic books
    Abstract: The perceived shortage of cybersecurity professionals working on national security may endanger the nation's networks and be a disadvantage in cyberspace conflict. RAND examined the cybersecurity labor market, especially in regard to national defense. Analysis suggests market forces and government programs will draw more workers into the profession in time, and steps taken today would not bear fruit for another five to ten years
    Abstract: The perceived shortage of cybersecurity professionals working on national security may endanger the nation's networks and be a disadvantage in cyberspace conflict. RAND examined the cybersecurity labor market, especially in regard to national defense. Analysis suggests market forces and government programs will draw more workers into the profession in time, and steps taken today would not bear fruit for another five to ten years
    Note: "RAND National Security Research Division , "RR-430"--Page 4 of cover , Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    ISBN: 9780833084125 , 0833084143 , 0833084119 , 0833084127 , 9780833084118 , 9780833084149
    Language: English
    Pages: 1 Online-Ressource (xvii, 151 pages)
    Series Statement: RAND Corporation research report series RR521
    Parallel Title: Print version Hanauer, Larry Chinese engagement in Africa
    Keywords: Außenpolitik ; Internationale Wirtschaftspolitik ; Wirtschaftshilfe ; Entwicklungshilfe ; Auslandsinvestition ; Regions & Countries - Asia & the Middle East ; History & Archaeology ; East Asia ; Regions & Countries - Africa ; China ; China ; Afrika ; POLITICAL SCIENCE ; Government ; International ; POLITICAL SCIENCE ; International Relations ; General ; HISTORY ; Africa ; General ; Africa ; International relations ; China Relations ; Africa Relations ; China Foreign public opinion, African ; China ; Africa ; China ; Electronic books
    Abstract: "Most analyses of Chinese engagement in Africa focus either on what China gets out of these partnerships or the impacts that China's aid and investment have had on African countries. This analysis approaches Sino-African relations as a vibrant, two-way dynamic in which both sides adjust to policy initiatives and popular perceptions emanating from the other. The authors focus on (1) Chinese and African objectives in the political and economic spheres and how they work to achieve them, (2) African perceptions of Chinese engagement, (3) how China has adjusted its policies to accommodate often-hostile African responses, and (4) whether the United States and China are competing for influence, access, and resources in Africa and how they might cooperate in the region. The authors find that Chinese engagement in the region is primarily concerned with natural resource extraction, infrastructure development, and manufacturing, in contrast to the United States' focus on higher-technology trade and services as well as aid policies aimed at promoting democracy, good governance, and human development. African governments generally welcome engagement with China, as it brings them political legitimacy and contributes to their economic development. Some segments of African society criticize Chinese enterprises for their poor labor conditions, unsustainable environmental practices, and job displacement, but China has been modifying its approach to the continent to address these concerns. China and the United States are not strategic rivals in Africa, but greater American commercial engagement in African markets could generate competition that would both benefit African countries and advance U.S. interests."--Back cover
    Abstract: "Most analyses of Chinese engagement in Africa focus either on what China gets out of these partnerships or the impacts that China's aid and investment have had on African countries. This analysis approaches Sino-African relations as a vibrant, two-way dynamic in which both sides adjust to policy initiatives and popular perceptions emanating from the other. The authors focus on (1) Chinese and African objectives in the political and economic spheres and how they work to achieve them, (2) African perceptions of Chinese engagement, (3) how China has adjusted its policies to accommodate often-hostile African responses, and (4) whether the United States and China are competing for influence, access, and resources in Africa and how they might cooperate in the region. The authors find that Chinese engagement in the region is primarily concerned with natural resource extraction, infrastructure development, and manufacturing, in contrast to the United States' focus on higher-technology trade and services as well as aid policies aimed at promoting democracy, good governance, and human development. African governments generally welcome engagement with China, as it brings them political legitimacy and contributes to their economic development. Some segments of African society criticize Chinese enterprises for their poor labor conditions, unsustainable environmental practices, and job displacement, but China has been modifying its approach to the continent to address these concerns. China and the United States are not strategic rivals in Africa, but greater American commercial engagement in African markets could generate competition that would both benefit African countries and advance U.S. interests."--Back cover
    Note: "Approved for public release; distribution unlimited , "RR-521-OSD."--Page 4 of printed paper wrapper , "RAND Corporation research report series."--Web page (PDF) , "National Security Research Division , "This research was conducted within the International Security and Defense Policy Center of the RAND National Defense Research Institute."--Title page verso , Includes bibliographical references (pages 121-151)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    ISBN: 9780833085757 , 0833089854 , 0833085751 , 9780833089854
    Language: English
    Pages: 1 Online-Ressource (xviii, 70 pages)
    Series Statement: RAND Corporation research report series
    Parallel Title: Erscheint auch als McNerney, Michael J. (Michael Joseph) New security and justice sector partnership models
    Keywords: Military assistance, American ; Political planning ; Security Assistance Program ; Arab Spring, 2010- ; Military assistance, American ; Political planning ; Security Assistance Program ; Arab Spring, 2010- ; Military & Naval Science ; Law, Politics & Government ; Armies ; HISTORY ; Middle East ; General ; Middle East ; Military assistance, American ; Political planning ; Security Assistance Program ; Arab Spring (2010- ) ; Electronic books
    Abstract: The United States faces a unique set of challenges and opportunities in strengthening security and justice sector partnerships in the Middle East and North Africa. Against the backdrop of the Arab uprisings, the U.S. government has issued policy guidance relating to foreign assistance more broadly and security sector assistance in particular. RAND researchers analyzed potential new partnership models that could help implement this guidance, simultaneously strengthening security and justice sector cooperation and promoting reform across the Arab world and beyond. They devised the Enhanced Partnership Planning Model, which focuses on improving collaborative planning, rather than on using assistance as leverage to require partner nations to do what the United States wants. The model serves as a flexible framework that could support tailored, rigorous SJS planning by U.S. and partner nation stakeholders. This framework can support both policy-makers and program managers as they seek to implement new policy guidelines that integrate elements of accountability and reform while continuing to advance core U.S. interests and equities in a rapidly evolving regional context
    Abstract: The United States faces a unique set of challenges and opportunities in strengthening security and justice sector partnerships in the Middle East and North Africa. Against the backdrop of the Arab uprisings, the U.S. government has issued policy guidance relating to foreign assistance more broadly and security sector assistance in particular. RAND researchers analyzed potential new partnership models that could help implement this guidance, simultaneously strengthening security and justice sector cooperation and promoting reform across the Arab world and beyond. They devised the Enhanced Partnership Planning Model, which focuses on improving collaborative planning, rather than on using assistance as leverage to require partner nations to do what the United States wants. The model serves as a flexible framework that could support tailored, rigorous SJS planning by U.S. and partner nation stakeholders. This framework can support both policy-makers and program managers as they seek to implement new policy guidelines that integrate elements of accountability and reform while continuing to advance core U.S. interests and equities in a rapidly evolving regional context
    Note: "Prepared for the State Department Bureau of Political-Military Affairs , "RAND National Security Research Division , "The United States faces an important set of challenges and opportunities in strengthening security and justice sector partnerships in the Middle East and North Africa. The emergence of a series of popular uprisings in the Arab world since 2010 complicates these efforts, while making their success all the more important. The State Department asked RAND's National Security Research Division to analyze potential new partnership models that could help implement recent policy guidance related to improving security."--Provided by publisher , "RR-605-DOS , Includes bibliographical references (pages 67-70)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    ISBN: 9780833083869 , 0833083872 , 0833083864 , 9780833083876
    Language: English
    Pages: 1 Online-Ressource (31 pages)
    Parallel Title: Print version Jackson, Brian A., 1972- How do we know what information sharing is really worth?
    Keywords: Selective dissemination of information ; Intelligence service ; Information policy ; Communication in law enforcement ; Government information Access control ; Terrorism Prevention ; Domestic intelligence ; Exchange of government information ; Selective dissemination of information ; Intelligence service ; Information policy ; Communication in law enforcement ; Government information ; Terrorism ; Domestic intelligence ; Exchange of government information ; Selective dissemination of information ; Terrorism ; Prevention ; United States ; COMPUTERS ; Internet ; Security ; Communication in law enforcement ; Domestic intelligence ; Exchange of government information ; Government information ; Access control ; Information policy ; Intelligence service ; Electronic books
    Abstract: Since the terrorist attacks of September 11, 2001, the sharing of intelligence and law enforcement information has been a central part of U.S. domestic security efforts. Though much of the public debate about such sharing focuses on addressing the threat of terrorism, organizations at all levels of government routinely share varied types of information through multiagency information systems, collaborative groups, and other links. Given resource constraints, there are concerns about the effectiveness of information-sharing and fusion activities and, therefore, their value relative to the public funds invested in them. Solid methods for evaluating these efforts are lacking, however, limiting the ability to make informed policy decisions. Drawing on a substantial literature review and synthesis, this report lays out the challenges of evaluating information-sharing efforts that frequently seek to achieve multiple goals simultaneously; reviews past evaluations of information-sharing programs; and lays out a path to improving the evaluation of such efforts going forward
    Note: "RAND Homeland Security and Defense Center , "This research was conducted within the RAND Homeland Security and Defense Center ... a joint center of two research divisions: RAND Justice, Infrastructure, and Environment, and the RAND National Security Research Division"--Back cover , "RAND Corporation research report series."--Web Page (PDF) , "RR-380-OSD"--Page 31 , Caption title , Includes bibliographical references (pages 27-30)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    ISBN: 9780833084453 , 083308447X , 9780833084446 , 0833084453 , 9780833084477
    Language: English
    Pages: 1 Online-Ressource (xxxii, 249 pages)
    Series Statement: Rand Corporation research report RR-548/2
    Parallel Title: Paul, Christopher, 1971 - Mexico is not Colombia
    Parallel Title: Print version Paul, Christopher, 1971- Mexico is not Colombia : alternative historical analogies for responding to the challenge of violent drug-trafficking organizations
    Keywords: Drug control ; Internal security ; Insurgency ; Drug traffic ; Violence ; Violent crimes ; Drug control ; Internal security ; Insurgency ; Drug traffic ; Violence ; Violent crimes ; SOCIAL SCIENCE ; General ; SOCIAL SCIENCE ; Criminology ; Drug control ; Drug traffic ; Insurgency ; Internal security ; Violence ; Violent crimes ; Mexico ; BUSINESS & ECONOMICS ; Infrastructure ; Electronic books ; Drogenkriminalität ; Organisiertes Verbrechen ; Bekämpfung ; Internationaler Vergleich ; Drogenkriminalität ; Organisiertes Verbrechen ; Bekämpfung ; Internationaler Vergleich
    Abstract: Despite the scope of the threat they pose to Mexico's security, violent drug-trafficking organizations are not well understood, and optimal strategies to combat them have not been identified. While there is no perfectly analogous case to Mexico's current security situation, historical case studies may offer lessons for policymakers as they cope with challenges related to violence and corruption in that country
    Abstract: Despite the scope of the threat they pose to Mexico's security, violent drug-trafficking organizations are not well understood, and optimal strategies to combat them have not been identified. While there is no perfectly analogous case to Mexico's current security situation, historical case studies may offer lessons for policymakers as they cope with challenges related to violence and corruption in that country
    Note: "Supporting case studies , Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    ISBN: 9780833082305 , 0833082078 , 0833082302 , 9780833082077
    Language: English
    Pages: 1 Online-Ressource (xix, 51 pages)
    Parallel Title: Print version Moore, Nancy Y., 1947- Small business and strategic sourcing
    Keywords: United States Procurement ; United States ; Small business ; Strategic planning ; Government contractors ; Government purchasing ; Defense contracts ; Small business ; Strategic planning ; Government contractors ; Government purchasing ; Defense contracts ; Small business ; Strategic planning ; United States ; BUSINESS & ECONOMICS ; Outsourcing ; Armed Forces ; Procurement ; Defense contracts ; United States ; Government contractors ; Government purchasing ; Electronic books
    Abstract: The Department of Defense (DoD) may face challenges as it attempts to maintain its goal of spending about 23 percent of its prime-contract dollars for goods and services with small businesses and at the same time apply strategic-sourcing practices to reduce total costs and improve performance in ways that will not conflict with small-business goals while making DoD purchasing more effective and efficient. Strategic sourcing practices, for example, recommend consolidation of the supply base to reduce total costs, which can lead to fewer, larger, longer-term contracts with fewer and, often, larger suppliers
    Abstract: The Department of Defense (DoD) may face challenges as it attempts to maintain its goal of spending about 23 percent of its prime-contract dollars for goods and services with small businesses and at the same time apply strategic-sourcing practices to reduce total costs and improve performance in ways that will not conflict with small-business goals while making DoD purchasing more effective and efficient. Strategic sourcing practices, for example, recommend consolidation of the supply base to reduce total costs, which can lead to fewer, larger, longer-term contracts with fewer and, often, larger suppliers
    Note: "RAND National Defense Research Institute , "Prepared for the Office of the Secretary of Defense , "This research was conducted within the Acquisition and Technology Policy Center of the RAND National Defense Research Institute"--Preface , Includes bibliographical references (pages 47-51)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Santa Monica, CA : RAND, National Security Research Division
    ISBN: 9780833085993 , 0833086014 , 0833085999 , 9780833086013
    Language: English
    Pages: 1 Online-Ressource (1 online resource)
    Parallel Title: Print version Cerully, Jennifer L Health and Economic Outcomes Among the Alumni of the Wounded Warrior Project : 2013
    Keywords: Disabled veterans Vocational rehabilitation ; Disabled veterans Mental health ; Disabled veterans Rehabilitation ; Disabled veterans ; Disabled veterans ; Disabled veterans ; BUSINESS & ECONOMICS ; Public Finance ; HISTORY ; Military ; Veterans ; Disabled veterans ; Rehabilitation ; Disabled veterans ; Vocational rehabilitation ; United States ; Electronic books
    Abstract: Alumni Reporting Mental Health Conditions: Female Alumni and Younger Alumni Report More Difficulties and Delays in Getting Care or Not Getting CareSummary; Chapter Four: Physical Health Outcomes; Achieving a Healthy BMI Is a Challenge for Over 80 Percent of Alumni; BMI Is Related to Other Physical Health Outcomes and Perceptions; Mental and Physical Injuries Are Both Related to Perceptions of Health; Alcohol Use Is Related to General Self-Reported Health in an Unexpected Way; Summary; Chapter Five: Economic Outcomes; Half of Alumni Are Employed
    Abstract: Alumni Reporting Mental Health Conditions: Female Alumni and Younger Alumni Report More Difficulties and Delays in Getting Care or Not Getting CareSummary; Chapter Four: Physical Health Outcomes; Achieving a Healthy BMI Is a Challenge for Over 80 Percent of Alumni; BMI Is Related to Other Physical Health Outcomes and Perceptions; Mental and Physical Injuries Are Both Related to Perceptions of Health; Alcohol Use Is Related to General Self-Reported Health in an Unexpected Way; Summary; Chapter Five: Economic Outcomes; Half of Alumni Are Employed
    Abstract: Few Alumni Access Employment and Education BenefitsType of Injury Is Related to Participation in Employment and Education Benefit Programs; High VA Disability Ratings and Many Injury Types Are Associated with Unemployment; Summary; Chapter Six: Discussion; Empowering Wounded Warriors in Mind and Spirit; Empowering Wounded Warriors in Body; Empowering Wounded Warriors Economically; Technical Appendix A: Interpretation of Regression Analyses; Multiple Regression; Logistic Regression; Explanatory Variables; Statistical Significance; Weighting; Technical Appendix B: Analyses for Chapter 3
    Abstract: Few Alumni Access Employment and Education BenefitsType of Injury Is Related to Participation in Employment and Education Benefit Programs; High VA Disability Ratings and Many Injury Types Are Associated with Unemployment; Summary; Chapter Six: Discussion; Empowering Wounded Warriors in Mind and Spirit; Empowering Wounded Warriors in Body; Empowering Wounded Warriors Economically; Technical Appendix A: Interpretation of Regression Analyses; Multiple Regression; Logistic Regression; Explanatory Variables; Statistical Significance; Weighting; Technical Appendix B: Analyses for Chapter 3
    Abstract: Technical Appendix C Analyses for Chapter 4Technical Appendix C.1: Alumni Characteristics and General Self-Reported Health; Technical Appendix C.2: Alumni Characteristics and Limitations Due to Physical Health; Technical Appendix C.3: Alumni Characteristics and Exercise Frequency; Technical Appendix C.4: Alumni Characteristics and Limitations of Doing Vigorous Activity; Technical Appendix D: Analyses for Chapter 5; Technical Appendix D.1: Alumni Characteristics and Use of VA's Vocational Rehabilitation and Employment Program
    Abstract: The Wounded Warrior Project offers support and raises public awareness of service members who have experienced physical or mental health conditions associated with their service on or after September 11, 2001. In this report, the authors use WWP's 2013 survey of its members (alumni) to understand the physical, mental, and economic challenges that Wounded Warriors face. This information can be used to better understand the needs of WWP alumni and the ways that WWP can serve and support this constituency. --
    Note: Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    ISBN: 9780833079947 , 0833081195 , 0833079948 , 9780833081193
    Language: English
    Pages: 1 Online-Ressource (xx, 71 pages)
    Series Statement: Rand Corporation monograph series
    Parallel Title: Print version Lippiatt, Thomas F., 1940- Leadership stability in Army Reserve component units
    Keywords: United States Officers ; United States Unit cohesion ; United States Operational readiness ; United States Personnel management ; United States ; United States ; United States ; United States ; Leadership ; Command of troops ; Leadership ; Command of troops ; Armed Forces ; Operational readiness ; Armed Forces ; Personnel management ; Armed Forces ; Unit cohesion ; Command of troops ; Leadership ; Military & Naval Science ; Law, Politics & Government ; Military Administration ; United States ; United States ; BUSINESS & ECONOMICS ; Training ; Armed Forces ; Officers ; Electronic books
    Abstract: Stability of personnel is highly valued in all military forces, especially in units that are preparing for deployment. A particular concern is personnel turbulence (personnel leaving the unit and being replaced by others) among the unit leadership. Even if the Army must live with turbulence among the bulk of unit members, it would prefer to have unit officers and noncommissioned officers in place to plan and oversee training of the troops with whom they will deploy. This monograph reports results of a study to determine the level of turbulence among unit leadership and to address several related questions: What causes leader turbulence? What effects might it have on training and preparation for future missions that may require RC units? What steps, if any, could be taken to mitigate it? The authors used data from 2003 through 2011 on Army National Guard infantry battalions and Army National Guard and U.S. Army Reserve military police and truck companies. They find high rates of personnel instability, caused generally by vacancies, personnel losses, and those who don't deploy. This turbulence generates a large influx of new leaders entering units who have not been through all the training with the soldiers they will lead. The monograph makes recommendations for estimating preparation time for different types of units and for department policy to mitigate effects on mission preparation
    Abstract: Stability of personnel is highly valued in all military forces, especially in units that are preparing for deployment. A particular concern is personnel turbulence (personnel leaving the unit and being replaced by others) among the unit leadership. Even if the Army must live with turbulence among the bulk of unit members, it would prefer to have unit officers and noncommissioned officers in place to plan and oversee training of the troops with whom they will deploy. This monograph reports results of a study to determine the level of turbulence among unit leadership and to address several related questions: What causes leader turbulence? What effects might it have on training and preparation for future missions that may require RC units? What steps, if any, could be taken to mitigate it? The authors used data from 2003 through 2011 on Army National Guard infantry battalions and Army National Guard and U.S. Army Reserve military police and truck companies. They find high rates of personnel instability, caused generally by vacancies, personnel losses, and those who don't deploy. This turbulence generates a large influx of new leaders entering units who have not been through all the training with the soldiers they will lead. The monograph makes recommendations for estimating preparation time for different types of units and for department policy to mitigate effects on mission preparation
    Note: "Prepared for the Office of the Secretary of Defense , "National Security Research Division , Includes bibliographical references (pages 69-71)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    Santa Monica, CA : RAND
    ISBN: 9780833081735 , 083308173X , 9780833081742 , 0833081756 , 0833081748 , 0833081721 , 9780833081728 , 9780833081759
    Language: English
    Pages: 1 Online-Ressource (xxx, 312 pages)
    Series Statement: Rand Corporation research report series
    Parallel Title: Print version Bennett, Bruce W., 1952- Preparing for the possibility of a North Korean collapse
    Keywords: Failed states ; Korean reunification question (1945- ) ; Failed states ; Korean reunification question (1945- ) ; Korean reunification question (1945- ) ; Diplomatic relations ; Economic history ; Failed states ; Politics and government ; POLITICAL SCIENCE ; Government ; International ; Korea (North) ; United States ; POLITICAL SCIENCE ; International Relations ; General ; POLITICAL SCIENCE ; Human Rights ; United States Foreign relations ; Korea (North) Foreign relations ; Korea (North) Economic conditions 21st century ; Korea (North) Politics and government 2011- ; United States ; Korea (North) ; Korea (North) ; Korea (North) ; Electronic books
    Abstract: A North Korean government collapse would have serious consequences in North Korea and beyond. At the very least, a collapse would reduce the already scarce food and essential goods available to the population, in part due to hoarding and increasing costs. This could lead to a humanitarian disaster. Factions emerging after a collapse could plunge the country into civil war that spills over into neighboring countries. Weapons of mass destruction (WMD) could be used and even proliferated. This report examines ways of controlling and mitigating the consequences, recognizing that the Republic of Korea (ROK) and its U.S. ally will almost certainly need to intervene militarily in the North, likely seeking Korean unification as the ultimate outcome. But such an intervention requires serious preparation. North Koreans must be convinced that they will be treated well and could actually have better lives after unification. The allies need to prepare to deliver humanitarian aid in the North, stop conflict, demilitarize the North Korean military and security services over time, and secure and eventually eliminate North Korean WMD. Potential Chinese intervention must be addressed, ideally leading to cooperation with ROK and U.S. forces. Plans are needed for liberating North Korean political prisons before the guards execute the prisoners. Property rights need to be addressed. The ROK must sustain its military capabilities despite major reductions in force size due to very low birthrates. And ROK reluctance to broadly address North Korean collapse must be overcome so that plans in these areas can move forward
    Abstract: A North Korean government collapse would have serious consequences in North Korea and beyond. At the very least, a collapse would reduce the already scarce food and essential goods available to the population, in part due to hoarding and increasing costs. This could lead to a humanitarian disaster. Factions emerging after a collapse could plunge the country into civil war that spills over into neighboring countries. Weapons of mass destruction (WMD) could be used and even proliferated. This report examines ways of controlling and mitigating the consequences, recognizing that the Republic of Korea (ROK) and its U.S. ally will almost certainly need to intervene militarily in the North, likely seeking Korean unification as the ultimate outcome. But such an intervention requires serious preparation. North Koreans must be convinced that they will be treated well and could actually have better lives after unification. The allies need to prepare to deliver humanitarian aid in the North, stop conflict, demilitarize the North Korean military and security services over time, and secure and eventually eliminate North Korean WMD. Potential Chinese intervention must be addressed, ideally leading to cooperation with ROK and U.S. forces. Plans are needed for liberating North Korean political prisons before the guards execute the prisoners. Property rights need to be addressed. The ROK must sustain its military capabilities despite major reductions in force size due to very low birthrates. And ROK reluctance to broadly address North Korean collapse must be overcome so that plans in these areas can move forward
    Note: "Prepared for the Smith Richardson Foundation , At head of title: Rand National Security Research Division , Includes bibliographical references (pages 297-312) and index
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    ISBN: 9780833083708 , 0833083708
    Language: English
    Pages: 1 Online-Ressource (145 pages)
    DDC: 344.7301/25763
    Keywords: United States ; United States ; Soldiers Employment ; Employee retention ; Soldiers ; Employee retention ; Uniformed Services Employment and Reemployment Rights Act of 1994 (United States) ; Employee retention ; Soldiers ; Employment ; United States ; United States National Guard ; Employment ; United States Armed Forces ; Reserves ; Employment ; United States ; United States ; Electronic books
    Abstract: Employer Support of the Guard and Reserve (ESGR), a U.S. Department of Defense office (DoD), asked the RAND Corporation to study the implications that using the Reserve Components (RCs) as an operational force can have for employers in view of employment rights protections for RC members. Specifically, ESGR wanted to know whether changes are needed to the Uniformed Services Employment and Reemployment Rights Act (USERRA), 1994 legislation designed to prevent hiring discrimination and bolster job protection for members of the armed forces, including those of the RCs; ESGR support programs; or RC activation and deployment policies, given the increased mobilization of the National Guard and Reserve and the continuing need to balance the rights, duties, and obligations of employers, RC members, and RC members⁰́₉ families. The study involved the review and analysis of existing research and data related to USERRA and the effects on employers of employee absences more generally, an analysis of the 2011 DoD National Survey of Employers, focus groups with employers conducted in 2012, interviews with RC chiefs conducted in 2011, and a legal and legislative history review of USERRA. This report describes key findings from the analysis
    Abstract: Employer Support of the Guard and Reserve (ESGR), a U.S. Department of Defense office (DoD), asked the RAND Corporation to study the implications that using the Reserve Components (RCs) as an operational force can have for employers in view of employment rights protections for RC members. Specifically, ESGR wanted to know whether changes are needed to the Uniformed Services Employment and Reemployment Rights Act (USERRA), 1994 legislation designed to prevent hiring discrimination and bolster job protection for members of the armed forces, including those of the RCs; ESGR support programs; or RC activation and deployment policies, given the increased mobilization of the National Guard and Reserve and the continuing need to balance the rights, duties, and obligations of employers, RC members, and RC members⁰́₉ families. The study involved the review and analysis of existing research and data related to USERRA and the effects on employers of employee absences more generally, an analysis of the 2011 DoD National Survey of Employers, focus groups with employers conducted in 2012, interviews with RC chiefs conducted in 2011, and a legal and legislative history review of USERRA. This report describes key findings from the analysis
    Note: "RAND National Security Research Division , "The research was conducted within the Forces and Resources Policy Center of the RAND National Defense Research Institute"--Page [ii] , Includes bibliographical references , Title from title screen (viewed August 23, 2013)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    ISBN: 9780833080608 , 0833084801 , 0833080601 , 9780833084804
    Language: English
    Pages: 1 Online-Ressource (44 pages)
    Keywords: United States Appropriations and expenditures ; United States Procurement ; Costs ; Evaluation ; Methodology ; United States ; United States ; Weapons systems Costs ; Forecasting ; Systems integration Risk assessment ; Methodology ; Weapons systems ; Systems integration ; TECHNOLOGY & ENGINEERING ; Military Science ; United States ; United States ; Expenditures, Public ; United States Armed Forces ; Weapons systems ; Costs ; Evaluation ; Methodology ; United States ; Electronic books
    Abstract: Implementing risk management principles to manage large defense acquisition programs is a priority for the U.S. defense acquisition community. To assist those decisionmakers responsible for identifying the risk associated with major weapons programs, RAND researchers developed a methodology and accompanying Excel, information-based risk tool (the ⁰́Assessor Tool⁰́₊). The Assessor Tool offers an Office of the Secretary of Defense (OSD)-level approach to the evaluation and measurement of system integration risk. That is, it is meant for assessors, such as OSD personnel, who may not be especially familiar with the specific program under evaluation but still may need to make judgments about the program⁰́₉s risk. It is based on a tractable and comprehensive set of questions that can help evaluate integration risk at each point in the acquisition process. More specifically, the tool enables users to see how well integration risk is being managed by providing a standards-based valuation of integration issues that can lead to cost growth, schedule growth, and program performance. The users⁰́₉ manual for the Assessor Tool is available in a companion document, An Excel Tool to Assess Acquisition Program Risk (by Lauren A. Fleishman-Mayer, Mark V. Arena, and Michael E. McMahon, TL-113-OSD, 2013). The Assessor Tool and its methodology may also be generalizable to an entire set of information-based risk assessment applications. Overall, the methodology and tool have many strengths, including being based on well-grounded theories, allowing for reproducibility and traceability, and the extensive flexibility to be used to evaluate risk for many different types of programs. To provide a benchmarking and validation of the risk scores calculated by the tool, future work could include the tool⁰́₉s validation by tracking its output against a program⁰́₉s performance
    Abstract: Implementing risk management principles to manage large defense acquisition programs is a priority for the U.S. defense acquisition community. To assist those decisionmakers responsible for identifying the risk associated with major weapons programs, RAND researchers developed a methodology and accompanying Excel, information-based risk tool (the ⁰́Assessor Tool⁰́₊). The Assessor Tool offers an Office of the Secretary of Defense (OSD)-level approach to the evaluation and measurement of system integration risk. That is, it is meant for assessors, such as OSD personnel, who may not be especially familiar with the specific program under evaluation but still may need to make judgments about the program⁰́₉s risk. It is based on a tractable and comprehensive set of questions that can help evaluate integration risk at each point in the acquisition process. More specifically, the tool enables users to see how well integration risk is being managed by providing a standards-based valuation of integration issues that can lead to cost growth, schedule growth, and program performance. The users⁰́₉ manual for the Assessor Tool is available in a companion document, An Excel Tool to Assess Acquisition Program Risk (by Lauren A. Fleishman-Mayer, Mark V. Arena, and Michael E. McMahon, TL-113-OSD, 2013). The Assessor Tool and its methodology may also be generalizable to an entire set of information-based risk assessment applications. Overall, the methodology and tool have many strengths, including being based on well-grounded theories, allowing for reproducibility and traceability, and the extensive flexibility to be used to evaluate risk for many different types of programs. To provide a benchmarking and validation of the risk scores calculated by the tool, future work could include the tool⁰́₉s validation by tracking its output against a program⁰́₉s performance
    Note: "This research was conducted within the Acquisition and Technology Policy Center of the RAND National Defense Research Institute"--Preface , "RAND National Security Research Division , Includes bibliographical references (pages 25-26) , Title from title screen (viewed on October 24, 2013)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    ISBN: 9780833080929 , 0833083368 , 083308092X , 9780833083364
    Language: English
    Pages: 1 Online-Ressource (xliii, 258 pages)
    Parallel Title: Available in another form
    Parallel Title: Available in another form
    Keywords: Violence Forecasting ; Criminal behavior Research ; Methodology ; Terrorists Psychology ; Terrorists Social conditions ; Criminal behavior, Prediction of ; Terrorism Prevention ; Violence ; Criminal behavior ; Terrorists ; Terrorists ; Criminal behavior, Prediction of ; Terrorism ; Behavioral Research ; Behavioral Sciences ; Crime ; Criminology ; Disciplines and Occupations ; Natural Science Disciplines ; Psychiatry and Psychology ; Research ; Science ; Social Problems ; Social Sciences ; Sociology ; Terrorism ; Violence ; Anthropology, Education, Sociology and Social Phenomena ; Behavioral Disciplines and Activities ; Criminal behavior, Prediction of ; Social Welfare & Social Work ; Social Sciences ; SOCIAL SCIENCE ; Criminology ; Criminology, Penology & Juvenile Delinquency ; Terrorists ; Psychology ; Criminal behavior ; Research ; Methodology ; Terrorism ; Prevention ; Violence ; Forecasting ; Electronic books
    Abstract: Government organizations have put substantial effort into detecting and thwarting terrorist and insurgent attacks by observing suspicious behaviors of individuals at transportation checkpoints and elsewhere. This report reviews the scientific literature relating to observable, individual-level behavioral indicators that might-along with other information-help detect potential violent attacks. The report focuses on new or nontraditional technologies and methods, most of which exploit (1) data on communication patterns, (2) "pattern-of-life" data, and/or (3) data relating to body movement and physiological state. To help officials set priorities for special attention and investment, the report proposes an analytic framework for discussion and evaluation; it also urges investment in cost-effectiveness analysis and more vigorous, routine, and sustained efforts to measure real-world effectiveness of methods. One cross-cutting conclusion is that methods for behavioral observation are typically not reliable enough to stand alone; success in detection will depend on information fusion across types of behaviors and time. How to accomplish such fusion is understudied. Finally, because many aspects of using behavioral observations are highly controversial, both scientifically and because of privacy and civil-liberties concerns, the report sharpens the underlying perspectives and suggests ways to resolve some of the controversy while significantly mitigating problems that definitely exist
    Abstract: Government organizations have put substantial effort into detecting and thwarting terrorist and insurgent attacks by observing suspicious behaviors of individuals at transportation checkpoints and elsewhere. This report reviews the scientific literature relating to observable, individual-level behavioral indicators that might-along with other information-help detect potential violent attacks. The report focuses on new or nontraditional technologies and methods, most of which exploit (1) data on communication patterns, (2) "pattern-of-life" data, and/or (3) data relating to body movement and physiological state. To help officials set priorities for special attention and investment, the report proposes an analytic framework for discussion and evaluation; it also urges investment in cost-effectiveness analysis and more vigorous, routine, and sustained efforts to measure real-world effectiveness of methods. One cross-cutting conclusion is that methods for behavioral observation are typically not reliable enough to stand alone; success in detection will depend on information fusion across types of behaviors and time. How to accomplish such fusion is understudied. Finally, because many aspects of using behavioral observations are highly controversial, both scientifically and because of privacy and civil-liberties concerns, the report sharpens the underlying perspectives and suggests ways to resolve some of the controversy while significantly mitigating problems that definitely exist
    Note: "RAND National Security Research Division , "The research was conducted within the International Security and Defense Policy Center of the RAND National Defense Research Institute"--Title page verso , Includes bibliographical references (pages 225-258)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    ISBN: 9780833080431 , 0833081950 , 0833080431 , 9780833081957
    Language: English
    Pages: 1 Online-Ressource (xxviii, 146 pages)
    Series Statement: Report RR-146-OSD
    Parallel Title: Erscheint auch als Moroney, Jennifer D. P., 1973- Lessons from Department of Defense disaster relief efforts in the Asia-Pacific Region
    Keywords: United States Rules and practice ; Evaluation ; United States ; Disaster relief Case studies ; Disaster relief Evaluation ; Humanitarian assistance Evaluation ; Humanitarian assistance Case studies ; Emergency management Case studies ; Integrated operations (Military science) Case studies ; Disaster relief ; Disaster relief ; Humanitarian assistance ; Humanitarian assistance ; Emergency management ; Integrated operations (Military science) ; POLITICAL SCIENCE ; Human Rights ; Armed Forces ; Civic action ; Disaster relief ; Disaster relief ; Evaluation ; Emergency management ; Humanitarian assistance ; Integrated operations (Military science) ; Military & Naval Science ; Law, Politics & Government ; Military Administration ; Pacific Area ; United States ; Case studies ; United States ; United States Case studies Armed Forces ; Civic action ; United States ; Electronic books
    Abstract: The Department of Defense has long been able to play a major role in international humanitarian assistance and disaster response (HA/DR) due to its unique capabilities, manpower, and forward-deployed resources. The Asia-Pacific region is of particular importance to the United States because it bears the brunt of more than half of the world's natural disasters and is home to numerous key U.S. allies. In an effort to improve the effectiveness of HA/DR operations in the future, this report analyzes recent operations in Burma, Indonesia, Pakistan, and Japan, and identifies lessons that have emerged in the areas of (1) interagency coordination, (2) communication with the affected country, (3) coordination with other state and non-state actors, (4) prospects for U.S. security cooperation and building partner capacity for HA/DR, and (5) prospects for the increased involvement of regional organizations in HA/DR. This report also identifies complementary capabilities and comparative advantages that exist around the region, presents options for leveraging these capabilities to deal with future disasters, and assesses various crisis management mechanisms involving allies and partners that can be applied to other contingencies
    Abstract: The Department of Defense has long been able to play a major role in international humanitarian assistance and disaster response (HA/DR) due to its unique capabilities, manpower, and forward-deployed resources. The Asia-Pacific region is of particular importance to the United States because it bears the brunt of more than half of the world's natural disasters and is home to numerous key U.S. allies. In an effort to improve the effectiveness of HA/DR operations in the future, this report analyzes recent operations in Burma, Indonesia, Pakistan, and Japan, and identifies lessons that have emerged in the areas of (1) interagency coordination, (2) communication with the affected country, (3) coordination with other state and non-state actors, (4) prospects for U.S. security cooperation and building partner capacity for HA/DR, and (5) prospects for the increased involvement of regional organizations in HA/DR. This report also identifies complementary capabilities and comparative advantages that exist around the region, presents options for leveraging these capabilities to deal with future disasters, and assesses various crisis management mechanisms involving allies and partners that can be applied to other contingencies
    Note: "National Security Research Division , "Prepared for the Office of the Secretary of Defense , Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    ISBN: 9780833080912 , 0833081977 , 0833080911 , 9780833081971
    Language: English
    Pages: 1 Online-Ressource (xxvi, 94 pages)
    Series Statement: Rand Corporation research report series RR-152-OSD
    Keywords: United States ; United States ; Leave of absence Law and legislation ; Veterans Employment ; Law and legislation ; Leave of absence ; Veterans ; Veterans ; Employment ; Law and legislation ; Law - U.S ; Uniformed Services Employment and Reemployment Rights Act of 1994 (United States) ; Law, Politics & Government ; Law - U.S. - General ; LAW ; Labor & Employment ; Leave of absence ; Law and legislation ; United States ; United States Armed Forces ; Reserves ; Legal status, laws, etc ; United States ; Electronic books
    Abstract: Employer Support of the Guard and Reserve (ESGR), a U.S. Department of Defense office (DoD), asked the RAND Corporation to study the implications that using the Reserve Components (RCs) as an operational force can have for employers in view of employment rights protections for RC members. Specifically, ESGR wanted to know whether changes are needed to the Uniformed Services Employment and Reemployment Rights Act (USERRA), 1994 legislation designed to prevent hiring discrimination and bolster job protection for members of the armed forces, including those of the RCs; ESGR support programs; or RC activation and deployment policies, given the increased mobilization of the National Guard and Reserve and the continuing need to balance the rights, duties, and obligations of employers, RC members, and RC members' families. The study involved the review and analysis of existing research and data related to USERRA and the effects on employers of employee absences more generally, an analysis of the 2011 DoD National Survey of Employers, focus groups with employers conducted in 2012, interviews with RC chiefs conducted in 2011, and a legal and legislative history review of USERRA. This report describes key findings from the analysis
    Abstract: Employer Support of the Guard and Reserve (ESGR), a U.S. Department of Defense office (DoD), asked the RAND Corporation to study the implications that using the Reserve Components (RCs) as an operational force can have for employers in view of employment rights protections for RC members. Specifically, ESGR wanted to know whether changes are needed to the Uniformed Services Employment and Reemployment Rights Act (USERRA), 1994 legislation designed to prevent hiring discrimination and bolster job protection for members of the armed forces, including those of the RCs; ESGR support programs; or RC activation and deployment policies, given the increased mobilization of the National Guard and Reserve and the continuing need to balance the rights, duties, and obligations of employers, RC members, and RC members' families. The study involved the review and analysis of existing research and data related to USERRA and the effects on employers of employee absences more generally, an analysis of the 2011 DoD National Survey of Employers, focus groups with employers conducted in 2012, interviews with RC chiefs conducted in 2011, and a legal and legislative history review of USERRA. This report describes key findings from the analysis
    Note: "Prepared for the Office of the Secretary of Defense , "National Security Research Division , Includes bibliographical references (pages 89-94)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    ISBN: 9780833082756 , 0833082752 , 9780833081490
    Language: English
    Pages: 1 Online-Ressource (10 pages)
    Keywords: Nutrition disorders ; Obesity ; Epidemics ; Nutrition disorders ; Obesity ; Epidemics ; MEDICAL ; Forensic Medicine ; MEDICAL ; Preventive Medicine ; MEDICAL ; Public Health ; MEDICAL ; Nutrition ; Epidemics ; Nutrition disorders ; Obesity ; Public Health ; Health & Biological Sciences ; Epidemiology & Epidemics ; United States ; North America ; Electronic books
    Abstract: Peformance Standards for Restaurants: A New Approach to Addressing the Obesity Epidemic; References; About This Paper.
    Abstract: This report presents the results of a conference of 38 national experts in nutrition and public health who met to develop performance standards that could guide restaurants toward facilitating healthier choices among consumers and that local communities or states could use as a model for developing and implementing either voluntary or mandatory certification programs
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    ISBN: 9780833084590 , 0833084593
    Language: English
    Pages: 1 Online-Ressource (28 pages)
    Keywords: United States Appropriations and expenditures ; United States Procurement ; Costs ; Evaluation ; United States ; United States ; Weapons systems Costs ; Forecasting ; Systems integration Risk assessment ; Electronic spreadsheets Computer programs ; Weapons systems ; Systems integration ; Electronic spreadsheets ; Electronic spreadsheets ; Computer programs ; Expenditures, Public ; United States ; TECHNOLOGY & ENGINEERING ; Military Science ; United States ; United States Armed Forces ; Weapons systems ; Costs ; Evaluation ; United States ; Electronic books
    Note: "RAND National Security Research Division , Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    ISBN: 9780833078612 , 0833078615 , 9780833078629 , 0833078631 , 0833078623 , 0833078607 , 9780833078605 , 9780833078636
    Language: English
    Pages: 1 Online-Ressource (xliii, 304 pages)
    Series Statement: Rand Corporation monograph series
    Parallel Title: Print version Dobbins, James, 1942- Overcoming obstacles to peace
    Keywords: Nation-building Case studies ; Peace-building ; Democratization ; Nation-building ; Nation-building ; Peace-building ; Democratization ; Nation-building ; POLITICAL SCIENCE ; Peace ; HISTORY ; Asia ; Southeast Asia ; Democratization ; Nation-building ; Peace-building ; Befriedung ; Demokratisierung ; Friedenskonsolidierung ; Nationenbildung ; Case studies ; Electronic books
    Abstract: "This volume analyzes the impediments that local conditions pose to successful outcomes of nation-building interventions in conflict-affected areas. Previous RAND studies of nation-building focused on external interveners' activities. This volume shifts the focus to internal circumstances, first identifying the conditions that gave rise to conflicts or threatened to perpetuate them, and then determining how external and local actors were able to modify or work around them to promote enduring peace. It examines in depth six varied societies: Cambodia, El Salvador, Bosnia and Herzegovina, East Timor, Sierra Leone, and the Democratic Republic of the Congo. It then analyzes a larger set of 20 major post-Cold War nation-building interventions. The authors assess the risk of renewed conflict at the onset of the interventions and subsequent progress along five dimensions: security, democratization, government effectiveness, economic growth, and human development. They find that transformation of many of the specific conditions that gave rise to or fueled conflict often is not feasible in the time frame of nation-building operations but that such transformation has not proven essential to achieving the primary goal of nation-building -- establishing peace. Most interventions in the past 25 years have led to enduring peace, as well as some degree of improvement in the other dimensions assessed. The findings suggest the importance of setting realistic expectations -- neither expecting nation-building operations to quickly lift countries out of poverty and create liberal democracies, nor being swayed by a negative stereotype of nation-building that does not recognize its signal achievements in the great majority of cases."--Page 4 of cover
    Description / Table of Contents: Preface -- Figures -- Tables -- Summary -- Acknowledgments -- Abbreviations -- Chapter 1. Introduction -- Chapter 2. Which Local Factors Pose Challenges to Nation-Building? -- Factors That Raise the Risk of Conflict Renewal -- Civil War Onset -- Civil War Recurrence -- How Great Is the Risk of Recurrence? -- Structure of the Case Studies -- Tailoring Nation-Building to Local Factors -- Chapter 3. Cambodia -- Local Factors Before the Peace -- Geographical and Geopolitical -- Cultural and Social -- Economic -- Political -- Institutional -- Nation-Building Efforts -- Geographical and Geopolitical -- Cultural and Social -- Economic -- Political -- Institutional -- Outcomes -- Local Attitudes -- Geographical and Geopolitical -- Cultural and Social -- Economic -- Political -- Institutional -- Conclusions -- What Local Factors Posed the Greatest Challenges? -- Were Local Factors Modified or Circumvented to Promote Enduring Peace? -- Chapter 4. El Salvador -- Local Factors Before the Peace -- Geographical and Geopolitical -- Cultural and Social -- Economic -- Political -- Institutional -- Nation-Building Efforts -- Geographical and Geopolitical -- Cultural and Social -- Economic -- Political -- Institutional -- Outcomes -- Local Attitudes -- Geographical and Geopolitical -- Cultural and Social -- Economic -- Political -- Institutional -- Conclusions -- What Local Factors Posed the Greatest Challenges? -- Were Local Factors Modified or Circumvented to Promote Enduring Peace? -- Chapter 5. Bosnia and Herzegovina -- Local Factors Before the Peace -- Geographical and Geopolitical -- Cultural and Social -- Economic -- Political -- Institutional -- Nation-Building Efforts -- Geographical and Geopolitical -- Cultural and Social -- Economic -- Political -- Institutional -- Outcomes -- Local Attitudes -- Geographical and Geopolitical -- Cultural and Social -- Economic -- Political -- Institutional -- Conclusions -- What Local Factors Posed the Greatest Challenges? -- Were Local Factors Modified or Circumvented to Promote Enduring Peace? -- Chapter 6. East Timor -- Local Factors Before the Peace -- Geographical and Geopolitical -- Cultural and Social -- Economic -- Political -- Institutional -- Nation-Building Efforts -- Geographical and Geopolitical -- Cultural and Social -- Economic -- Political -- Institutional -- Outcomes -- Local Attitudes -- Geographical and Geopolitical -- Cultural and Social -- Economic -- Political -- Institutional -- Conclusions -- What Local Factors Posed the Greatest Challenges? -- Were Local Factors Modified or Circumvented to Promote Enduring Peace? -- Chapter 7. Local Factors Before the Peace -- Geographical and Geopolitical -- Cultural and Social -- Economic -- Political -- Institutional -- Nation-Building Efforts -- Geographical and Geopolitical -- Cultural and Social -- Economic -- Political -- Institutional -- Outcomes -- Local Attitudes -- Geographical and Geopolitical -- Cultural and Social -- Economic -- Political -- Institutional -- Conclusions -- What Local Factors Posed the Greatest Challenges? -- Were Local Factors Modified or Circumvented to Promote Enduring Peace? -- Chapter 8. Democratic Republic of the Congo -- Local Factors Before the Peace -- Geographical and Geopolitical -- Cultural and Social -- Economic -- Political -- Institutional -- Nation-Building Efforts -- Geographical and Geopolitical -- Cultural and Social -- Economic -- Political -- Institutional -- Outcomes -- Local Attitudes -- Geographical and Geopolitical -- Cultural and Social -- Economic -- Political -- Institutional -- Conclusions -- What Local Factors Posed the Greatest Challenges? -- Were Local Factors Modified or Circumvented to Promote Enduring Peace? -- Chapter 9. Estimating the Challenges and Comparing with Outcomes -- Sustaining Peace -- Promoting Democracy -- Improving Governance -- Achieving Economic Growth -- Advancing Human Development -- Summing Up -- Chapter 10. Conclusions -- The Transformational Limits of Nation-Building -- Factors Crucial to Establishing Enduring Peace -- Geopolitics -- Patronage Networks -- The Impact of Geopolitics and Patronage Networks in 20 Cases -- Dissimilar Societies, Similar Instruments -- Establishing Realistic Expectations -- Appendixes. A. Performance Indicators and Nation-Building Inputs for 20 Major Post-Cold War Nation-Building Interventions -- B. Economic Growth Statistics for Nation-Building Interventions in Comparative Perspective -- References.
    Note: Includes bibliographical references and index
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    Santa Monica, CA : RAND Corporation
    ISBN: 9780833080707 , 0833080709
    Language: English
    Pages: 1 Online-Ressource (ix, 40 pages)
    Series Statement: Research reports
    Keywords: Nuclear weapons Forecasting ; Nuclear weapons Government policy ; Forecasting ; Nuclear weapons ; Nuclear weapons ; HISTORY ; Military ; Other ; TECHNOLOGY & ENGINEERING ; Military Science ; HISTORY ; Middle East ; General ; Nuclear weapons ; Forecasting ; Politics and government ; Forecasting ; Iran ; Iran Politics and government ; Forecasting ; Iran Foreign relations ; Forecasting ; Iran ; Iran ; Electronic books
    Abstract: This report explores how a nuclear-armed Iran would behave, if it would act aggressively, and what this would entail for the United States and its main regional allies, including the Gulf Cooperation Council (GCC) and Israel. The Islamic Republic seeks to undermine what it perceives to be the American-dominated order in the Middle East and to deter a U.S. and/or Israeli military attack, but it does not have territorial ambitions and does not seek to invade, conquer, or occupy other nations. Nuclear arms are unlikely to change its fundamental interests and strategies. Rather, they would probably reinforce Iran's traditional national security objectives. The ideological beliefs of the Iranian political elite will not shape the country's nuclear decisionmaking. The regional geopolitical environment and Iran's political, military, and economic capabilities will have a greater bearing on Iranian calculations. It is very unlikely that Iran would use nuclear weapons against another Muslim state or against Israel, given the latter's overwhelming conventional and nuclear military superiority. Further, the Iranian government does not use terrorism for ideological reasons. Instead, Iran's support for terrorism is motivated by cost and benefit calculations, with the aims of maintaining deterrence and preserving or expanding its influence in the Middle East. An inadvertent or accidental nuclear exchange between Israel and Iran is a dangerous possibility, but there is not much evidence to suggest that rogue elements could have easy access to Iranian nuclear weapons
    Abstract: This report explores how a nuclear-armed Iran would behave, if it would act aggressively, and what this would entail for the United States and its main regional allies, including the Gulf Cooperation Council (GCC) and Israel. The Islamic Republic seeks to undermine what it perceives to be the American-dominated order in the Middle East and to deter a U.S. and/or Israeli military attack, but it does not have territorial ambitions and does not seek to invade, conquer, or occupy other nations. Nuclear arms are unlikely to change its fundamental interests and strategies. Rather, they would probably reinforce Iran's traditional national security objectives. The ideological beliefs of the Iranian political elite will not shape the country's nuclear decisionmaking. The regional geopolitical environment and Iran's political, military, and economic capabilities will have a greater bearing on Iranian calculations. It is very unlikely that Iran would use nuclear weapons against another Muslim state or against Israel, given the latter's overwhelming conventional and nuclear military superiority. Further, the Iranian government does not use terrorism for ideological reasons. Instead, Iran's support for terrorism is motivated by cost and benefit calculations, with the aims of maintaining deterrence and preserving or expanding its influence in the Middle East. An inadvertent or accidental nuclear exchange between Israel and Iran is a dangerous possibility, but there is not much evidence to suggest that rogue elements could have easy access to Iranian nuclear weapons
    Note: "National Security Research Division , Includes bibliographical references (pages 35-40)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    ISBN: 9780833081025 , 0833082035 , 0833081020 , 9780833082039
    Language: English
    Pages: 1 Online-Ressource (xvi, 71 pages)
    Keywords: United States ; United States ; Organizational change Management ; Corporate culture ; Strategic planning ; Organizational change ; Corporate culture ; Strategic planning ; Military Administration ; Corporate culture ; Organizational change ; Management ; Strategic planning ; Military & Naval Science ; Law, Politics & Government ; BUSINESS & ECONOMICS ; Strategic Planning ; United States ; Electronic books
    Abstract: To help the National Reconnaissance Office (NRO) become more flexible and agile in an increasingly uncertain world, RAND sought answers to two key questions. First, would the NRO benefit from building modular satellites? RAND researchers developed a method for evaluating whether a system is a good candidate for modularity and applied it to systems both inside and outside the NRO. The authors found that NRO space systems do not appear to be strong candidates for modularization. Second, what lessons might be drawn from how chief executive officers, military personnel, and health care professionals (among others) respond to surprise? RAND developed a framework to categorize professionals' responses to surprise and then conducted discussions with representatives from 13 different professions, including former ambassadors, chief executive officers, military personnel, and physicians. The authors observed that all interviewees used common coping strategies. The authors also found some differences in response to surprise that depend on two factors: time available to respond and the level of chaos in the environment. The report concludes with recommendations on actions that the NRO can take to improve the flexibility of its hardware and the workforce
    Abstract: To help the National Reconnaissance Office (NRO) become more flexible and agile in an increasingly uncertain world, RAND sought answers to two key questions. First, would the NRO benefit from building modular satellites? RAND researchers developed a method for evaluating whether a system is a good candidate for modularity and applied it to systems both inside and outside the NRO. The authors found that NRO space systems do not appear to be strong candidates for modularization. Second, what lessons might be drawn from how chief executive officers, military personnel, and health care professionals (among others) respond to surprise? RAND developed a framework to categorize professionals' responses to surprise and then conducted discussions with representatives from 13 different professions, including former ambassadors, chief executive officers, military personnel, and physicians. The authors observed that all interviewees used common coping strategies. The authors also found some differences in response to surprise that depend on two factors: time available to respond and the level of chaos in the environment. The report concludes with recommendations on actions that the NRO can take to improve the flexibility of its hardware and the workforce
    Note: "This research was conducted within the Intelligence Policy Center of the RAND National Defense Research Division (NSRD)"--Preface , "RAND National Defense Research Institute , Includes bibliographical references (pages 69-71)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    ISBN: 9780833084798 , 0833084798
    Language: English
    Pages: 1 Online-Ressource (xv, 25 pages)
    Series Statement: Rand Corporation research report series RR-297-OSD
    Keywords: United States ; United States ; United States ; United States ; Military education Costs ; Veterans Education ; Costs ; Military education ; Veterans ; HISTORY ; Military ; Veterans ; Military education ; Costs ; United States ; Montgomery G.I. Bill (United States) ; Post-9/11 Veterans Educational Assistance Act of 2008 (United States) ; Electronic books
    Abstract: Since the 1944 passage of the original GI Bill following World War II, the military has provided veterans with a collection of financial aid benefits designed to help them attend college. While research has shown that these programs have helped many veterans acquire a college education, less is known about the impact of more recent educational benefits for veterans. This is especially true of the Post-9/11 GI Bill, which, in conjunction with a number of other assistance programs, has afforded veterans new educational opportunities. The Post-9/11 GI Bill offers tuition subsidies paid directly to institutions, a housing allowance tied to cost of living, and a book stipend, which in combination are usually more generous than preceding GI Bills. However, issues such as rising tuition costs; an increasing presence of low-quality, for-profit institutions that target veterans; and a potentially confusing array of benefit options could mitigate the impact of these programs on the recruitment, retention, and human capital development of service members. This report contextualizes these issues and formulates a research agenda to address them
    Abstract: Since the 1944 passage of the original GI Bill following World War II, the military has provided veterans with a collection of financial aid benefits designed to help them attend college. While research has shown that these programs have helped many veterans acquire a college education, less is known about the impact of more recent educational benefits for veterans. This is especially true of the Post-9/11 GI Bill, which, in conjunction with a number of other assistance programs, has afforded veterans new educational opportunities. The Post-9/11 GI Bill offers tuition subsidies paid directly to institutions, a housing allowance tied to cost of living, and a book stipend, which in combination are usually more generous than preceding GI Bills. However, issues such as rising tuition costs; an increasing presence of low-quality, for-profit institutions that target veterans; and a potentially confusing array of benefit options could mitigate the impact of these programs on the recruitment, retention, and human capital development of service members. This report contextualizes these issues and formulates a research agenda to address them
    Note: "Prepared for the Office of the Secretary of Defense , "National Security Research Division , Includes bibliographical references (pages 23-25) , Report number from resource home page
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    ISBN: 9780833080974 , 083308478X , 0833080970 , 9780833084781
    Language: English
    Pages: 1 Online-Ressource (xvii, 30 pages)
    Series Statement: Rand Corporation research report series RR-322-OSD
    Parallel Title: Erscheint auch als Cox, Amy G Improving federal and Department of Defense use of service-disabled veteran-owned businesses
    Keywords: United States Rules and practice ; United States ; Business enterprises owned by veterans with disabilities Government policy ; Veteran-owned business enterprises Government policy ; Public contracts ; Business enterprises owned by veterans with disabilities ; Veteran-owned business enterprises ; Public contracts ; Military & Naval Science ; Law, Politics & Government ; Military Administration ; United States ; Rules ; HISTORY ; Military ; Veterans ; Public contracts ; United States ; Electronic books
    Abstract: The report investigates the barriers that service-disabled veteran-owned small businesses (SDVOSBs) may face when attempting to contract with the federal government and the Department of Defense. The government and DoD goals are to award 3 percent of prime-contract dollars to SDVOSBs but current contracting falls below that level. The authors assess the characteristics of service-disabled veterans that support successful business ownership and identify possible barriers to meeting the 3 percent goals
    Abstract: The report investigates the barriers that service-disabled veteran-owned small businesses (SDVOSBs) may face when attempting to contract with the federal government and the Department of Defense. The government and DoD goals are to award 3 percent of prime-contract dollars to SDVOSBs but current contracting falls below that level. The authors assess the characteristics of service-disabled veterans that support successful business ownership and identify possible barriers to meeting the 3 percent goals
    Note: "RAND National Security Research Division , Includes bibliographical references (pages 29-30)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    ISBN: 9780833082336 , 0833082353 , 0833082337 , 9780833082350
    Language: English
    Pages: 1 Online-Ressource (xxiii, 115 pages)
    Series Statement: Rand Corporation research report series RR-420-RC
    Parallel Title: Print version Dunigan, Molly Out of the shadows
    Keywords: Government contractors Medical care ; Government contractors Mental health ; Government contractors Health and hygiene ; Government contractors ; Government contractors ; Government contractors ; Contract Services ; Military Medicine ; Warfare ; Occupational Health ; Combat Disorders ; United States ; PSYCHOLOGY ; Psychopathology ; Depression ; POLITICAL SCIENCE ; Public Affairs & Administration ; United States ; Electronic books
    Abstract: Over the past decade, private contractors have been deployed extensively around the globe. In addition to supporting U.S. and allied forces in Iraq and Afghanistan, contractors have assisted foreign governments, nongovernmental organizations, and private businesses by providing a wide range of services, including base support and maintenance, logistical support, transportation, intelligence, communications, construction, and security. At the height of the conflicts in Iraq and Afghanistan, contractors outnumbered U.S. troops deployed to both theaters. Although these contractors are not supposed to engage in offensive combat, they may nonetheless be exposed to many of the stressors that are known to have physical and mental health implications for military personnel. RAND conducted an online survey of a sample of contractors who had deployed on contract to a theater of conflict at least once between early 2011 and early 2013. The survey collected demographic and employment information, along with details about respondents⁰́₉ deployment experience (including level of preparation for deployment, combat exposure, and living conditions), mental health (including probable posttraumatic stress disorder, depression, and alcohol misuse), physical health, and access to and use of health care. The goal was to describe the contractors⁰́₉ health and well-being and to explore differences across the sample by such factors as country of citizenship, job specialty, and length and frequency of contract deployment. The findings provide a foundation for future studies of contractor populations and serve to inform policy decisions affecting contractors, including efforts to reduce barriers to mental health treatment for this population
    Abstract: Over the past decade, private contractors have been deployed extensively around the globe. In addition to supporting U.S. and allied forces in Iraq and Afghanistan, contractors have assisted foreign governments, nongovernmental organizations, and private businesses by providing a wide range of services, including base support and maintenance, logistical support, transportation, intelligence, communications, construction, and security. At the height of the conflicts in Iraq and Afghanistan, contractors outnumbered U.S. troops deployed to both theaters. Although these contractors are not supposed to engage in offensive combat, they may nonetheless be exposed to many of the stressors that are known to have physical and mental health implications for military personnel. RAND conducted an online survey of a sample of contractors who had deployed on contract to a theater of conflict at least once between early 2011 and early 2013. The survey collected demographic and employment information, along with details about respondents⁰́₉ deployment experience (including level of preparation for deployment, combat exposure, and living conditions), mental health (including probable posttraumatic stress disorder, depression, and alcohol misuse), physical health, and access to and use of health care. The goal was to describe the contractors⁰́₉ health and well-being and to explore differences across the sample by such factors as country of citizenship, job specialty, and length and frequency of contract deployment. The findings provide a foundation for future studies of contractor populations and serve to inform policy decisions affecting contractors, including efforts to reduce barriers to mental health treatment for this population
    Note: "RR-420-RC"--Page 4 of cover , At head of title: Rand National Security Research Division , Includes bibliographical references (pages 107-115)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    ISBN: 9780833080516 , 0833082027 , 0833080512 , 9780833082022
    Language: English
    Pages: 1 Online-Ressource (xxii, 53 pages)
    Series Statement: RAND Corporation research report series RR243
    Keywords: National Intelligence University (U.S.) Research ; National Intelligence University (U.S.) ; Interagency coordination ; Intelligence service ; Interagency coordination ; Intelligence service ; Government - General ; Law, Politics & Government ; Political Institutions & Public Administration - General ; United States ; EDUCATION ; Higher ; Intelligence service ; Interagency coordination ; Research ; Electronic books
    Abstract: The Center for Strategic Intelligence Research (CSIR) of the National Intelligence University (NIU) is responsible for supporting faculty and student research efforts and coordinating NIU research activities with the Intelligence Community (IC). A challenge to these coordination efforts lies in the fact that research being conducted regularly in the IC exists, for the most part, in small pockets scattered throughout a number of different IC agencies. To better identify collaborative research opportunities, topics, and processes, CSIR asked RAND to conduct a study that would capture information about these research entities, their responsibilities, and their willingness to support interagency research with NIU. The study team conducted semistructured interviews with a purposive sample of representatives of research entities in the IC. The interviews discussed interagency research and collaboration with NIU. We found that the majority of these research entities are small (less than ten full-time staff), face the competing responsibilities of short-term analytic responses and longer-term analysis and research, and are interested in research plans aligned with national priorities. The research entities are willing to support NIU, but expect NIU to take the lead in facilitating research collaboration
    Abstract: The Center for Strategic Intelligence Research (CSIR) of the National Intelligence University (NIU) is responsible for supporting faculty and student research efforts and coordinating NIU research activities with the Intelligence Community (IC). A challenge to these coordination efforts lies in the fact that research being conducted regularly in the IC exists, for the most part, in small pockets scattered throughout a number of different IC agencies. To better identify collaborative research opportunities, topics, and processes, CSIR asked RAND to conduct a study that would capture information about these research entities, their responsibilities, and their willingness to support interagency research with NIU. The study team conducted semistructured interviews with a purposive sample of representatives of research entities in the IC. The interviews discussed interagency research and collaboration with NIU. We found that the majority of these research entities are small (less than ten full-time staff), face the competing responsibilities of short-term analytic responses and longer-term analysis and research, and are interested in research plans aligned with national priorities. The research entities are willing to support NIU, but expect NIU to take the lead in facilitating research collaboration
    Note: "This research was sponsored by NIU and conducted within the Intelligence Policy Center of the RAND National Defense Research Institute"--Preface , "RAND National Security Research Division , Includes bibliographical references (pages 51-53)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    ISBN: 9780833082954 , 0833082957
    Language: English
    Pages: 1 Online-Ressource (70 pages)
    DDC: 519.3
    Keywords: Mathematical optimization ; Mathematical optimization ; Mathematical optimization ; Electronic books
    Abstract: This paper describes a new approach to a very difficult process of optimization under uncertainty. This approach is to find the optimal solution to a problem by designing a number of search algorithms or schemes in a way that allows analysts to apply to a problem that contains a significantly larger number of decision variables, uncertain parameters, and uncertain scenarios than analysts have had to contend with until now. The specific purpose of this paper is to convert a provisional patent application entitled Portfolio Optimization by Means of a Ranking and Competing Search by the author into a published volume available for public use. This approach and its associated search algorithms have a key feature⁰́₄they generate typically 10,000 uncertain scenarios according to their uncertainty distribution functions. While each of these scenarios is a point in the larger uncertainty space, the originally uncertain parameters are specified for the scenario and are, thereby, "determined" or "certain." Thus, the solvable mixed-integer linear programming model can be used "under certainty" (i.e., deterministically) to find the optimal solution for that scenario. Doing this for numerous scenarios provides a great deal of knowledge and facilitates the search for the optimal solution⁰́₄or one close to it⁰́₄for the larger problem under uncertainty. Thus, this approach allows one to avoid the impossible task of performing millions or trillions of searches to find the optimal solution for each scenario, yet enables one to gain just as much knowledge as if one were doing so
    Abstract: This paper describes a new approach to a very difficult process of optimization under uncertainty. This approach is to find the optimal solution to a problem by designing a number of search algorithms or schemes in a way that allows analysts to apply to a problem that contains a significantly larger number of decision variables, uncertain parameters, and uncertain scenarios than analysts have had to contend with until now. The specific purpose of this paper is to convert a provisional patent application entitled Portfolio Optimization by Means of a Ranking and Competing Search by the author into a published volume available for public use. This approach and its associated search algorithms have a key feature⁰́₄they generate typically 10,000 uncertain scenarios according to their uncertainty distribution functions. While each of these scenarios is a point in the larger uncertainty space, the originally uncertain parameters are specified for the scenario and are, thereby, "determined" or "certain." Thus, the solvable mixed-integer linear programming model can be used "under certainty" (i.e., deterministically) to find the optimal solution for that scenario. Doing this for numerous scenarios provides a great deal of knowledge and facilitates the search for the optimal solution⁰́₄or one close to it⁰́₄for the larger problem under uncertainty. Thus, this approach allows one to avoid the impossible task of performing millions or trillions of searches to find the optimal solution for each scenario, yet enables one to gain just as much knowledge as if one were doing so
    Note: "RAND Corporation , "March 15, 2013 , Includes bibliographical references , Title from title screen (viewed March 15, 2013)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    ISBN: 9780833082138 , 0833086030 , 0833082132 , 9780833086037
    Language: English
    Pages: 1 Online-Ressource (viii, 81 pages)
    Parallel Title: Online version Webb, Timothy, 1936- Venture capital and strategic investment for developing government mission capabilities
    Parallel Title: Print version Webb, Timothy, 1936- Venture capital and strategic investment for developing government mission capabilities
    Keywords: Technology and state ; Venture capital Government policy ; Incentives in industry Government policy ; Technological innovations Government policy ; Technology and state ; Venture capital ; Incentives in industry ; Technological innovations ; United States ; Technological innovations ; Government policy ; Technology and state ; Venture capital ; Government policy ; Business & Economics ; Economic History ; BUSINESS & ECONOMICS ; Econometrics ; Incentives in industry ; Government policy ; Electronic books
    Abstract: A wide range of military capability improvement efforts have benefited from development and procurement methods that accommodate urgent operational needs. Changes in the threat environment suggest a need for a fresh examination of the adequacy and suitability of acquisition methods for the coming decade. This report examines one class of acquisition method, known as government venture capital (GVC), or government strategic investment (GSI). The research extracts general observations from previous cases and from a partial economic model of the GSI type of initiative. Taken together, these analyses will help government acquisition managers to judge more thoroughly the suitability of strategic investment methods for motivating future government mission-oriented innovation by private firms. The report does not explicitly compare GSIs and alternatives for their efficacy in advancing government mission objectives. If it had, it is likely that the main advantage of GSI would be improved access to information about alternative approaches available in the commercial market, resulting from the close relationships the GSI structure engenders between government and business
    Abstract: A wide range of military capability improvement efforts have benefited from development and procurement methods that accommodate urgent operational needs. Changes in the threat environment suggest a need for a fresh examination of the adequacy and suitability of acquisition methods for the coming decade. This report examines one class of acquisition method, known as government venture capital (GVC), or government strategic investment (GSI). The research extracts general observations from previous cases and from a partial economic model of the GSI type of initiative. Taken together, these analyses will help government acquisition managers to judge more thoroughly the suitability of strategic investment methods for motivating future government mission-oriented innovation by private firms. The report does not explicitly compare GSIs and alternatives for their efficacy in advancing government mission objectives. If it had, it is likely that the main advantage of GSI would be improved access to information about alternative approaches available in the commercial market, resulting from the close relationships the GSI structure engenders between government and business
    Note: "RAND National Defense Research Institute , "This research was ... conducted within the Acquisition and Technology Policy Center of the RAND National Defense Research Institute"--Preface , Includes bibliographical references (pages 79-81)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    Santa Monica, CA : RAND
    ISBN: 9780833078391 , 0833078399 , 9780833078384 , 0833078410 , 0833078380 , 9780833078414
    Language: English
    Pages: 1 Online-Ressource (19 pages)
    Series Statement: RAND Corporation research report series RR-129-SRF
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Keywords: Postwar reconstruction ; Nation-building ; Internal security ; Postwar reconstruction ; Nation-building ; Internal security ; Regions & Countries - Africa ; Nachkriegszeit ; Internal security ; Nation-building ; Libyen ; Libya ; Politics and government ; Postwar reconstruction ; HISTORY ; Asia ; India & South Asia ; HISTORY ; Africa ; North ; History & Archaeology ; Libya Politics and government 21st century ; Libya ; Electronic books
    Abstract: A year after Qaddafi's death, the light-footprint approach adopted for Libya's postwar transition is facing its most serious test. Security, the political transition, and economic development all present challenges. The security situation requires immediate attention and could worsen still. Until the militias are brought under state control, progress on other fronts will be very difficult to achieve. In most cases, the appropriate approach is a combination of incentives and broad-based negotiation between Tripoli and militia leaders. Only in extreme cases should the use of force be considered. On the political front, Libya and international actors deserve credit for the successful elections in July, but the political challenges ahead are significant. Libya still needs to write a constitution, and in doing so, it must determine the degree to which power is centralized in Tripoli and how to ensure inclusive yet stable governing institutions. Libya also needs to begin rethinking the management of its economy, and especially of its energy resources, to maximize the benefit to its citizens, reduce corruption, and enable private enterprise to flourish in other areas, such as tourism. Libya also needs sustained assistance, mainly technical in nature, from the countries that helped oust Qaddafi lest the transition run off the rails. Despite its role in helping topple Qaddafi, NATO is absent from Libya today. A greater role for the alliance is worth exploring, for example training Libyan security officials and forces and providing technical assistance for security-sector reform. An international Friends of Libya conference on assistance to Libya is warranted. Post-conflict transitions normally span years, and Libya's will be no different. Nevertheless, if current challenges are handled adroitly, Libya could still emerge as a positive force for democratic stability in North Africa and a valuable partner against al-Qaeda
    Abstract: A year after Qaddafi's death, the light-footprint approach adopted for Libya's postwar transition is facing its most serious test. Security, the political transition, and economic development all present challenges. The security situation requires immediate attention and could worsen still. Until the militias are brought under state control, progress on other fronts will be very difficult to achieve. In most cases, the appropriate approach is a combination of incentives and broad-based negotiation between Tripoli and militia leaders. Only in extreme cases should the use of force be considered. On the political front, Libya and international actors deserve credit for the successful elections in July, but the political challenges ahead are significant. Libya still needs to write a constitution, and in doing so, it must determine the degree to which power is centralized in Tripoli and how to ensure inclusive yet stable governing institutions. Libya also needs to begin rethinking the management of its economy, and especially of its energy resources, to maximize the benefit to its citizens, reduce corruption, and enable private enterprise to flourish in other areas, such as tourism. Libya also needs sustained assistance, mainly technical in nature, from the countries that helped oust Qaddafi lest the transition run off the rails. Despite its role in helping topple Qaddafi, NATO is absent from Libya today. A greater role for the alliance is worth exploring, for example training Libyan security officials and forces and providing technical assistance for security-sector reform. An international Friends of Libya conference on assistance to Libya is warranted. Post-conflict transitions normally span years, and Libya's will be no different. Nevertheless, if current challenges are handled adroitly, Libya could still emerge as a positive force for democratic stability in North Africa and a valuable partner against al-Qaeda
    Note: "This paper is the result of an ongoing research project on the future of post-Qaddafi Libya sponsored by the Smith Richardson Foundation and conducted within the International Security and Defense Center (ISDP) of the RAND National Security Research Division (NSRD)."--Page [20] , Includes bibliographical references (page 18)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    ISBN: 9780833059727 , 0833059890 , 0833059726 , 9780833059895
    Language: English
    Pages: 1 Online-Ressource (xxi, 86 pages)
    Series Statement: Technical report
    Parallel Title: Print version Using social media to gauge Iranian public opinion and mood after the 2009 election
    Keywords: Twitter ; Twitter ; Public opinion ; Social media Political aspects ; Social media Political aspects ; Research ; Presidents Election 2009 ; Public opinion ; Public opinion ; Social media ; Social media ; Presidents ; Twitter ; POLITICAL SCIENCE ; Political Process ; Elections ; POLITICAL SCIENCE ; Political Process ; General ; POLITICAL SCIENCE ; International Relations ; General ; Presidents ; Election ; Public opinion ; Public opinion ; Social media ; Political aspects ; Government - Non-U.S ; Law, Politics & Government ; Government - Asia ; Iran ; Electronic books
    Abstract: Preface -- Figures and Table -- Summary -- Acknowledgments -- Abbreviations -- Introduction -- Analysis of Social Media Can Help Gauge Public Opinion and Mood in Closed Societies -- A New Computer-Based Tool Offers a Promising Means of Tapping into Politically Oriented Content in Social Media -- This Type of Analysis Can Have Important Policy Uses -- Organization of This Report -- Methodology -- The Precedent for Our Approach: Previous Research Using LIWC and Word-Usage Analysis -- LIWC Has Been Shown to Accurately Represent Verbal Expression -- The Real Potential of Exploring Word Usage Lies in Its Links with Behaviors and Outcomes -- Word Usage Is Now Being Studied in Politically Oriented Contexts -- Our Research Process -- Planning Tasks: Understanding the Sphere of Relevant Social Media -- Selecting Twitter Texts -- Selecting Iran-Relevant Political Topics -- Selecting the LIWC Word Categories to Use in Our Analysis and Defining How We Would Interpret Them -- Background on Social Media Use in Iran and Events Surrounding the 2009 Election -- Social Media Use in Contemporary Iran -- The Scale of Internet and Social Media Usage in Contemporary Iran -- Who Is Using Social Media in Iran? -- The Anonymity Factor -- The Iranian Information Environment Prior to the 2009 Presidential Election -- The Use of Social Media During the 2009 Presidential Election in Iran -- The Role of Social Media in Iran's Internal Politics Grew Rapidly After the 2009 Presidential Election -- Major Events in Iran During the Post-Election Period -- The Rise of Mass Protests -- June 19: Khamenei's Friday Prayer Speech -- June 20: Neda Agha-Soltan's Death -- July 9: Anniversary of the 1999 Student Uprisings -- August 5: Ahmadinejad's Inauguration -- September 18: Quds Day -- Late December: Ashura Day Protests -- February 11, 2010: 31st Anniversary of the Islamic Revolution -- Overall Trends in Public Mood in Iran After the 2009 Presidential Election -- Public Mood Throughout the Nine Months After the Election -- Twitter's Clearest Indicator of Mood and Forecaster of Action: Swear Words -- Use of Pronouns on Twitter After the Election -- Summary -- Iranian Public Opinion About Specific Topics in the Aftermath of the 2009 Election -- Public Opinion Leading Domestic Political Figures: Ahmadinejad, Khamenei, Mousavi, and Karroubi -- Summary -- Background -- Comparing Trends in Public Opinion About Political Figures -- Around the Quds Day Protest, Twitter Users Wrote More Negatively About Khamenei Than About Ahmadinejad -- At Certain Points, Twitter Users Wrote More Positively and Less Negatively About Karroubi Than About Mousavi -- Initially, Twitter Users Swore More About Ahmadinejad Than About Mousavi, but the Opposite Became True -- Policy Implications -- Pro-Government and Opposition Groups: The Green Movement, the Revolutionary Guards, and the Basij -- Summary -- Background -- Comparing Trends in Public Opinion About Political Groups -- The Green Movement Was Viewed More Positively Than the Revolutionary Guards or Basij -- Twitter Users Swore More About the Basij Than About the Revolutionary Guards -- Public Opinion About the United States, President Obama, and the CIA -- Summary -- Usage of Swear Words Suggests Early Frustration with the United States and President Obama, as Well as a Strong Desire for U.S. Action -- Usage of First-Person Singular Pronouns Regarding the United States and President Obama Generally Paralleled Usage of Swear Words -- Pronoun Use When Writing About Obama as Compared with Iranian Figures -- Twitter Users Expressed Less Negative Emotion When Writing About Obama as Compared with Iranian Figures -- Positive Emotions in Tweets About Obama Showed Several Pronounced Spikes Compared with Tweets About the United States -- Some Twitter Users Pointed to Foreign Influence, Particularly Intelligence Agencies, as the Driving Force Behind Protests -- Public Opinion About Specific Countries: Israel, the United States, and Iran -- Summary -- Twitter Users Only Infrequently Swore Regarding Israel or the United States -- Twitter Users Swore More When Referring to the "Islamic Republic" Than to "Iran" -- Twitter Users Expressed Positive Emotions Toward Israelis Who May Have Aided the Protest Movement -- Methodological Considerations -- Additional Demonstration of the Methodology: Sadness Words -- Linguistic Indicators That Did Not Work as Expected on Twitter -- Differences in Phrasing May Reflect Differing Intentions and Writing Styles -- Limitations of Automated Analysis Suggest That It Is a Complementary Approach to Manual Analysis -- Next Steps: A Design for a Second Phase of This Program of Research -- Looking Ahead Toward the 2013 Iranian Presidential Elections -- Validating the Methodology -- Improving Current Aspects of the Methodology -- Expanding the Scope of the Current Work -- Additional Details Regarding Methodology: Data Collection and Analysis -- References
    Abstract: Preface -- Figures and Table -- Summary -- Acknowledgments -- Abbreviations -- Introduction -- Analysis of Social Media Can Help Gauge Public Opinion and Mood in Closed Societies -- A New Computer-Based Tool Offers a Promising Means of Tapping into Politically Oriented Content in Social Media -- This Type of Analysis Can Have Important Policy Uses -- Organization of This Report -- Methodology -- The Precedent for Our Approach: Previous Research Using LIWC and Word-Usage Analysis -- LIWC Has Been Shown to Accurately Represent Verbal Expression -- The Real Potential of Exploring Word Usage Lies in Its Links with Behaviors and Outcomes -- Word Usage Is Now Being Studied in Politically Oriented Contexts -- Our Research Process -- Planning Tasks: Understanding the Sphere of Relevant Social Media -- Selecting Twitter Texts -- Selecting Iran-Relevant Political Topics -- Selecting the LIWC Word Categories to Use in Our Analysis and Defining How We Would Interpret Them -- Background on Social Media Use in Iran and Events Surrounding the 2009 Election -- Social Media Use in Contemporary Iran -- The Scale of Internet and Social Media Usage in Contemporary Iran -- Who Is Using Social Media in Iran? -- The Anonymity Factor -- The Iranian Information Environment Prior to the 2009 Presidential Election -- The Use of Social Media During the 2009 Presidential Election in Iran -- The Role of Social Media in Iran's Internal Politics Grew Rapidly After the 2009 Presidential Election -- Major Events in Iran During the Post-Election Period -- The Rise of Mass Protests -- June 19: Khamenei's Friday Prayer Speech -- June 20: Neda Agha-Soltan's Death -- July 9: Anniversary of the 1999 Student Uprisings -- August 5: Ahmadinejad's Inauguration -- September 18: Quds Day -- Late December: Ashura Day Protests -- February 11, 2010: 31st Anniversary of the Islamic Revolution -- Overall Trends in Public Mood in Iran After the 2009 Presidential Election -- Public Mood Throughout the Nine Months After the Election -- Twitter's Clearest Indicator of Mood and Forecaster of Action: Swear Words -- Use of Pronouns on Twitter After the Election -- Summary -- Iranian Public Opinion About Specific Topics in the Aftermath of the 2009 Election -- Public Opinion Leading Domestic Political Figures: Ahmadinejad, Khamenei, Mousavi, and Karroubi -- Summary -- Background -- Comparing Trends in Public Opinion About Political Figures -- Around the Quds Day Protest, Twitter Users Wrote More Negatively About Khamenei Than About Ahmadinejad -- At Certain Points, Twitter Users Wrote More Positively and Less Negatively About Karroubi Than About Mousavi -- Initially, Twitter Users Swore More About Ahmadinejad Than About Mousavi, but the Opposite Became True -- Policy Implications -- Pro-Government and Opposition Groups: The Green Movement, the Revolutionary Guards, and the Basij -- Summary -- Background -- Comparing Trends in Public Opinion About Political Groups -- The Green Movement Was Viewed More Positively Than the Revolutionary Guards or Basij -- Twitter Users Swore More About the Basij Than About the Revolutionary Guards -- Public Opinion About the United States, President Obama, and the CIA -- Summary -- Usage of Swear Words Suggests Early Frustration with the United States and President Obama, as Well as a Strong Desire for U.S. Action -- Usage of First-Person Singular Pronouns Regarding the United States and President Obama Generally Paralleled Usage of Swear Words -- Pronoun Use When Writing About Obama as Compared with Iranian Figures -- Twitter Users Expressed Less Negative Emotion When Writing About Obama as Compared with Iranian Figures -- Positive Emotions in Tweets About Obama Showed Several Pronounced Spikes Compared with Tweets About the United States -- Some Twitter Users Pointed to Foreign Influence, Particularly Intelligence Agencies, as the Driving Force Behind Protests -- Public Opinion About Specific Countries: Israel, the United States, and Iran -- Summary -- Twitter Users Only Infrequently Swore Regarding Israel or the United States -- Twitter Users Swore More When Referring to the "Islamic Republic" Than to "Iran" -- Twitter Users Expressed Positive Emotions Toward Israelis Who May Have Aided the Protest Movement -- Methodological Considerations -- Additional Demonstration of the Methodology: Sadness Words -- Linguistic Indicators That Did Not Work as Expected on Twitter -- Differences in Phrasing May Reflect Differing Intentions and Writing Styles -- Limitations of Automated Analysis Suggest That It Is a Complementary Approach to Manual Analysis -- Next Steps: A Design for a Second Phase of This Program of Research -- Looking Ahead Toward the 2013 Iranian Presidential Elections -- Validating the Methodology -- Improving Current Aspects of the Methodology -- Expanding the Scope of the Current Work -- Additional Details Regarding Methodology: Data Collection and Analysis -- References
    Note: Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    Online Resource
    Online Resource
    Santa Monica, CA : Rand National Security Research Division
    ISBN: 9780833052063 , 0833052063 , 9780833051806 , 083305208X , 0833051806 , 9780833052087
    Language: English
    Pages: 1 Online-Ressource (xx, 142 pages)
    Series Statement: RAND Corporation monograph series
    Parallel Title: Print version Cliff, Roger Ready for takeoff
    Keywords: Aeronautics, Commercial Government policy ; Aeronautics, Commercial ; Artificial satellites ; Artificial satellites Government policy ; Aerospace industries Government policy ; Aerospace industries ; Aeronautics, Commercial ; Aeronautics, Commercial ; Artificial satellites ; Artificial satellites ; Aerospace industries ; Aerospace industries ; Aerospace industries ; Government policy ; Artificial satellites ; Artificial satellites ; Government policy ; International economic relations ; BUSINESS & ECONOMICS ; Industries ; Service ; POLITICAL SCIENCE ; International Relations ; General ; China ; United States ; Aeronautics, Commercial ; Aeronautics, Commercial ; Government policy ; Aerospace industries ; United States Foreign economic relations ; China Foreign economic relations ; United States ; China ; Electronic books
    Abstract: "China's aerospace industry has advanced at an impressive rate over the past decade. While some of this progress can be attributed to rapidly growing governmental support for China's aerospace sector, China's aerospace capabilities have also benefited from the increasing participation of its aerospace industry in the global commercial aerospace market and the supply chains of the world's leading aerospace firms. This monograph assesses China's aerospace capabilities and the extent to which China's participation in commercial aerospace markets and supply chains is contributing to the improvement of those capabilities. Specific areas assessed include China's commercial aviation manufacturing capabilities, its commercial and military capabilities in space, efforts of the Chinese government to encourage foreign participation in the development of the aerospace industry, transfers of foreign aerospace technology to China, the extent to which U.S. and other foreign aerospace firms are dependent on supplies from China, and the implications of all of these issues for U.S. security interests. The study should be of interest to business analysts, policymakers, lawmakers, and anyone who wishes to learn about China's market for commercial aviation, the capabilities of China's aerospace manufacturing industry, the role foreign aerospace firms are playing in the development of China's aerospace capabilities, and security implications for the United States. This research was sponsored by the U.S-China Economic and Security Review Commission, which was established by Congress in 2000 to monitor and report on the economic and national security dimensions of U.S. trade and economic ties with the People's Republic of China. This research was conducted within the International Security and Defense Policy Center of the RAND Corporation's National Security Research Division (NSRD). NSRD conducts research and analysis on defense and national security topics for the U.S. and allied defense, foreign policy, homeland security, and intelligence communities and foundations and other nongovernmental organizations that support defense and national security analysis."--Preface
    Abstract: "China's aerospace industry has advanced at an impressive rate over the past decade. While some of this progress can be attributed to rapidly growing governmental support for China's aerospace sector, China's aerospace capabilities have also benefited from the increasing participation of its aerospace industry in the global commercial aerospace market and the supply chains of the world's leading aerospace firms. This monograph assesses China's aerospace capabilities and the extent to which China's participation in commercial aerospace markets and supply chains is contributing to the improvement of those capabilities. Specific areas assessed include China's commercial aviation manufacturing capabilities, its commercial and military capabilities in space, efforts of the Chinese government to encourage foreign participation in the development of the aerospace industry, transfers of foreign aerospace technology to China, the extent to which U.S. and other foreign aerospace firms are dependent on supplies from China, and the implications of all of these issues for U.S. security interests. The study should be of interest to business analysts, policymakers, lawmakers, and anyone who wishes to learn about China's market for commercial aviation, the capabilities of China's aerospace manufacturing industry, the role foreign aerospace firms are playing in the development of China's aerospace capabilities, and security implications for the United States. This research was sponsored by the U.S-China Economic and Security Review Commission, which was established by Congress in 2000 to monitor and report on the economic and national security dimensions of U.S. trade and economic ties with the People's Republic of China. This research was conducted within the International Security and Defense Policy Center of the RAND Corporation's National Security Research Division (NSRD). NSRD conducts research and analysis on defense and national security topics for the U.S. and allied defense, foreign policy, homeland security, and intelligence communities and foundations and other nongovernmental organizations that support defense and national security analysis."--Preface
    Note: Includes bibliographical references (pages 125-142)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    Online Resource
    Online Resource
    Santa Monica, CA : RAND
    ISBN: 9780833058652 , 0833058673 , 0833058657 , 9780833058676
    Language: English
    Pages: 1 Online-Ressource (xxvi, 128 pages)
    Series Statement: Rand Corporation monograph series MG-1154-SRF
    Parallel Title: Print version Coping with a nuclearizing Iran
    Keywords: Nuclear weapons ; Nuclear weapons ; HISTORY ; Military ; Nuclear Warfare ; POLITICAL SCIENCE ; International Relations ; Arms Control ; Diplomatic relations ; Iran ; United States ; Nuclear weapons ; Strategic aspects of individual places ; Iran Strategic aspects ; Iran Foreign relations ; United States Foreign relations ; Iran ; Iran ; United States ; Electronic books
    Abstract: It is not inevitable that Iran will acquire nuclear weapons or even that it will gain the capacity to quickly produce them. U.S. and even Israeli analysts continually push their estimates for such an event further into the future. Nevertheless, absent a change in Iranian policy, it is reasonable to assume that, some time in the coming decade, Iran will acquire such a capability. Most recent scholarly studies have also focused on how to prevent Iran from acquiring nuclear weapons. Other, less voluminous writing looks at what to do after Iran becomes a nuclear power. What has so far been lacking is a policy framework for dealing with Iran before, after, and, indeed, during its crossing of the nuclear threshold. This monograph attempts to fill that gap by providing a midterm strategy for dealing with Iran that neither begins nor ends at the point at which Tehran acquires a nuclear weapon capability. It proposes an approach that neither acquiesces to a nuclear-armed Iran nor refuses to admit the possibility -- indeed, the likelihood -- of this occurring
    Abstract: It is not inevitable that Iran will acquire nuclear weapons or even that it will gain the capacity to quickly produce them. U.S. and even Israeli analysts continually push their estimates for such an event further into the future. Nevertheless, absent a change in Iranian policy, it is reasonable to assume that, some time in the coming decade, Iran will acquire such a capability. Most recent scholarly studies have also focused on how to prevent Iran from acquiring nuclear weapons. Other, less voluminous writing looks at what to do after Iran becomes a nuclear power. What has so far been lacking is a policy framework for dealing with Iran before, after, and, indeed, during its crossing of the nuclear threshold. This monograph attempts to fill that gap by providing a midterm strategy for dealing with Iran that neither begins nor ends at the point at which Tehran acquires a nuclear weapon capability. It proposes an approach that neither acquiesces to a nuclear-armed Iran nor refuses to admit the possibility -- indeed, the likelihood -- of this occurring
    Note: "National Security Research Division , Includes bibliographical references (pages 111-128)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    Online Resource
    Online Resource
    Santa Monica, CA : RAND
    ISBN: 9780833049827 , 0833050753 , 0833049828 , 9780833050755
    Language: English
    Pages: 1 Online-Ressource (xxvi, 115 pages)
    Series Statement: Rand Corporation monograph series MG-987-SRF
    Parallel Title: Print version Hired guns
    Keywords: Government contractors Evaluation ; Contracting out Evaluation ; Government contractors Evaluation ; Contracting out Evaluation ; Private security services Evaluation ; Private military companies Evaluation ; Postwar reconstruction Evaluation ; Government contractors ; Contracting out ; Government contractors ; Contracting out ; Private security services ; Private military companies ; Postwar reconstruction ; POLITICAL SCIENCE ; International Relations ; General ; Contracting out ; Evaluation ; Government contractors ; Evaluation ; Iraq ; United States ; HISTORY ; Military ; Electronic books
    Abstract: "The use of armed private security contractors (PSCs) in the Iraq war has been unprecedented. Not only government agencies but also journalists, reconstruction contractors, and nongovernmental organizations frequently view them as a logical choice to fill their security needs, yet there have been a number of reports of PSCs committing serious, and sometimes fatal, abuses of power in Iraq. This study uses a systematic, empirically based survey of opinions of U.S. military and State Department personnel on the ground in Iraq to shed light on the following questions: To what extent are armed PSCs perceived to be imposing costs on the U.S. military effort? If so, are those costs tempered by positive contributions? How has the use of PSCs affected U.S. military operations in Operation Iraqi Freedom? While the military personnel did report some incidents of unnecessarily threatening, arrogant, or belligerent contractor behavior, the survey results indicate that neither the U.S. military nor State Department personnel appear to perceive PSCs to be "running wild" in Iraq. Moreover, respondents tended to consider PSCs a force multiplier rather than an additional strain on military troops, but both military and State Department respondents held mixed views regarding the contribution of armed contractors to U.S. foreign policy objectives."--Page 4 of cover
    Abstract: "The use of armed private security contractors (PSCs) in the Iraq war has been unprecedented. Not only government agencies but also journalists, reconstruction contractors, and nongovernmental organizations frequently view them as a logical choice to fill their security needs, yet there have been a number of reports of PSCs committing serious, and sometimes fatal, abuses of power in Iraq. This study uses a systematic, empirically based survey of opinions of U.S. military and State Department personnel on the ground in Iraq to shed light on the following questions: To what extent are armed PSCs perceived to be imposing costs on the U.S. military effort? If so, are those costs tempered by positive contributions? How has the use of PSCs affected U.S. military operations in Operation Iraqi Freedom? While the military personnel did report some incidents of unnecessarily threatening, arrogant, or belligerent contractor behavior, the survey results indicate that neither the U.S. military nor State Department personnel appear to perceive PSCs to be "running wild" in Iraq. Moreover, respondents tended to consider PSCs a force multiplier rather than an additional strain on military troops, but both military and State Department respondents held mixed views regarding the contribution of armed contractors to U.S. foreign policy objectives."--Page 4 of cover
    Note: Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    Online Resource
    Online Resource
    Santa Monica, Calif : RAND
    ISBN: 9780833050434 , 0833050532 , 0833050435 , 9780833050533
    Language: English
    Pages: 1 Online-Ressource (xxviii, 179 pages)
    Series Statement: Rand Corporation monograph series MG-1039-SRF/CC
    Parallel Title: Print version Building a more resilient Haitian state
    Keywords: Nation-building ; Political planning ; Nation-building ; Political planning ; Politics and government ; POLITICAL SCIENCE ; Public Policy ; General ; Haiti ; POLITICAL SCIENCE ; World ; General ; Nation-building ; Political planning ; Haiti Politics and government 1986- ; Haiti ; Electronic books
    Abstract: Hope for a more prosperous and peaceful future for the Haitian people lies in building a more effective, resilient state. Haiti's state institutions are riddled with weaknesses in human resources, organization, procedures, and policies. State-building should be at the forefront of efforts to recover from the January 2010 earthquake. Devising lists of measures needed to repair the state's weaknesses is relatively easy, but formulating strategies to address those weaknesses is hard, and implementation is even harder. This report supports the development of a Haitian state-building strategy by identifying the main challenges to more capable governance, evaluating existing plans for strengthening government institutions and improving the delivery of public services, and proposing a realistic and carefully limited set of critical actions. The recommended priorities, in the areas of public administration, justice, security, economic policy, infrastructure, education, and health care, merit the greatest degree of Haiti's and international donors' policy attention and financial commitment
    Abstract: Hope for a more prosperous and peaceful future for the Haitian people lies in building a more effective, resilient state. Haiti's state institutions are riddled with weaknesses in human resources, organization, procedures, and policies. State-building should be at the forefront of efforts to recover from the January 2010 earthquake. Devising lists of measures needed to repair the state's weaknesses is relatively easy, but formulating strategies to address those weaknesses is hard, and implementation is even harder. This report supports the development of a Haitian state-building strategy by identifying the main challenges to more capable governance, evaluating existing plans for strengthening government institutions and improving the delivery of public services, and proposing a realistic and carefully limited set of critical actions. The recommended priorities, in the areas of public administration, justice, security, economic policy, infrastructure, education, and health care, merit the greatest degree of Haiti's and international donors' policy attention and financial commitment
    Note: Includes bibliographical references (pages 165-179)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    ISBN: 9780833050052 , 0833050141 , 0833050052 , 9780833050144
    Language: English
    Pages: 1 Online-Ressource (xxiv, 199 pages, 1 flowchart)
    Series Statement: RAND Corporation monograph series
    Parallel Title: Print version Jackson, Brian A., 1972- Evaluating the reliability of emergency response systems for large-scale incident operations
    Keywords: Emergency communication systems ; Preparedness Evaluation ; Incident command systems ; Assistance in emergencies ; Emergency management Evaluation ; Emergency communication systems ; Preparedness ; Incident command systems ; Assistance in emergencies ; Emergency management ; Disaster Planning organization & administration ; Emergencies ; Program Evaluation ; Emergency Responders ; Incident command systems ; United States ; Emergency management ; Evaluation ; SOCIAL SCIENCE ; Disasters & Disaster Relief ; Assistance in emergencies ; Emergency communication systems ; United States ; Electronic books
    Abstract: The ability to measure emergency preparedness - to predict the likely performance of emergency response systems in future events - is critical for policy analysis in homeland security. Yet it remains difficult to know how prepared a response system is to deal with large-scale incidents, whether it be a natural disaster, terrorist attack, or industrial or transportation accident. This research draws on the fields of systems analysis and engineering to apply the concept of system reliability to the evaluation of emergency response systems. The authors describe a method for modeling an emergency response system; identifying how individual parts of the system might fail; and assessing the likelihood of each failure and the severity of its effects on the overall response effort. The authors walk the reader through two applications of this method: a simplified example in which responders must deliver medical treatment to a certain number of people in a specified time window, and a more complex scenario involving the release of chlorine gas. The authors also describe an exploratory analysis in which they parsed a set of after-action reports describing real-world incidents, to demonstrate how this method can be used to quantitatively analyze data on past response performance. The authors conclude with a discussion of how this method of measuring emergency response system reliability could inform policy discussion of emergency preparedness, how system reliability might be improved, and the costs of doing so. --From publisher description
    Abstract: The ability to measure emergency preparedness - to predict the likely performance of emergency response systems in future events - is critical for policy analysis in homeland security. Yet it remains difficult to know how prepared a response system is to deal with large-scale incidents, whether it be a natural disaster, terrorist attack, or industrial or transportation accident. This research draws on the fields of systems analysis and engineering to apply the concept of system reliability to the evaluation of emergency response systems. The authors describe a method for modeling an emergency response system; identifying how individual parts of the system might fail; and assessing the likelihood of each failure and the severity of its effects on the overall response effort. The authors walk the reader through two applications of this method: a simplified example in which responders must deliver medical treatment to a certain number of people in a specified time window, and a more complex scenario involving the release of chlorine gas. The authors also describe an exploratory analysis in which they parsed a set of after-action reports describing real-world incidents, to demonstrate how this method can be used to quantitatively analyze data on past response performance. The authors conclude with a discussion of how this method of measuring emergency response system reliability could inform policy discussion of emergency preparedness, how system reliability might be improved, and the costs of doing so. --From publisher description
    Note: Includes bibliographical references (pages 187-199)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...