Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • 2010-2014  (2)
  • 2005-2009  (24)
  • 1975-1979
  • Santa Monica, CA : Rand Corp  (26)
  • United States  (26)
Datasource
Material
Language
Years
  • 2010-2014  (2)
  • 2005-2009  (24)
  • 1975-1979
  • 2000-2004  (3)
Year
Subjects(RVK)
  • 1
    ISBN: 9780833082213 , 0833082213 , 9780833082206 , 0833083627 , 0833082205 , 9780833083623
    Language: English
    Pages: 1 Online-Ressource (150 pages)
    Series Statement: Research report
    Parallel Title: Print version Factors Affecting Physician Professional Satisfaction and Their Implications for Patient Care, Health Systems, and Health Policy
    Keywords: Physicians Attitudes ; Physicians Job satisfaction ; Medical care Quality control ; Medicine Practice ; Physicians ; Physicians ; Medical care ; Medicine ; Job Satisfaction ; Quality of Health Care ; Professional Practice ; Electronic Health Records utilization ; Physicians psychology ; Electronic books ; Physicians ; Job satisfaction ; Medicine ; Practice ; Medical Professional Practice ; Medical care ; Quality control ; MEDICAL ; Evidence-Based Medicine ; Physicians ; Attitudes ; United States ; Health & Biological Sciences ; Medicine ; United States ; Electronic books
    Abstract: One of the American Medical Association's core strategic objectives is to advance health care delivery and payment models that enable high-quality, affordable care and restore and preserve physician satisfaction. Such changes could yield a more sustainable and effective health care system with highly motivated physicians. To that end, the AMA asked RAND Health to characterize the factors that lead to physician satisfaction. RAND sought to identify high-priority determinants of professional satisfaction that can be targeted within a variety of practice types, especially as smaller and independent practices are purchased by or become affiliated with hospitals and larger delivery systems. Researchers gathered data from 30 physician practices in six states, using a combination of surveys and semistructured interviews. This report presents the results of the subsequent analysis, addressing such areas as physicians' perceptions of the quality of care, use of electronic health records, autonomy, practice leadership, and work quantity and pace. Among other things, the researchers found that physicians who perceived themselves or their practices as providing high-quality care reported better professional satisfaction. Physicians, especially those in primary care, were frustrated when demands for greater quantity of care limited the time they could spend with each patient, detracting from the quality of care in some cases. Electronic health records were a source of both promise and frustration, with major concerns about interoperability between systems and with the amount of physician time involved in data entry
    Abstract: One of the American Medical Association's core strategic objectives is to advance health care delivery and payment models that enable high-quality, affordable care and restore and preserve physician satisfaction. Such changes could yield a more sustainable and effective health care system with highly motivated physicians. To that end, the AMA asked RAND Health to characterize the factors that lead to physician satisfaction. RAND sought to identify high-priority determinants of professional satisfaction that can be targeted within a variety of practice types, especially as smaller and independent practices are purchased by or become affiliated with hospitals and larger delivery systems. Researchers gathered data from 30 physician practices in six states, using a combination of surveys and semistructured interviews. This report presents the results of the subsequent analysis, addressing such areas as physicians' perceptions of the quality of care, use of electronic health records, autonomy, practice leadership, and work quantity and pace. Among other things, the researchers found that physicians who perceived themselves or their practices as providing high-quality care reported better professional satisfaction. Physicians, especially those in primary care, were frustrated when demands for greater quantity of care limited the time they could spend with each patient, detracting from the quality of care in some cases. Electronic health records were a source of both promise and frustration, with major concerns about interoperability between systems and with the amount of physician time involved in data entry
    Note: "RR-439-AMA , "Produced within RAND Health, a division of the RAND Corporation , Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Santa Monica, CA : Rand Corp
    ISBN: 9780833052131 , 083305225X , 0833052136 , 9780833052254
    Language: English
    Pages: 1 Online-Ressource (xxiv, 90 pages)
    Series Statement: Rand Corporation monograph series
    Parallel Title: Print version Highway infrastructure and the economy
    DDC: 363.0973
    Keywords: Roads ; Infrastructure (Economics) ; Roads ; Infrastructure (Economics) ; SOCIAL SCIENCE ; General ; POLITICAL SCIENCE ; Public Policy ; City Planning & Urban Development ; Infrastructure (Economics) ; Roads ; Economic policy ; Economic impacts ; Economic benefits ; Highways ; Business & Economics ; Transportation Economics ; Economic History ; United States ; BUSINESS & ECONOMICS ; Infrastructure ; Electronic books
    Abstract: To inform debate on a new transportation bill being considered, the authors review the literature on the economic outcomes of highway infrastructure spending, which constitutes the largest share of federal spending on transportation infrastructure. They first highlight the connections between highway spending and the economy and then analyze the literature to trace the effects of highway infrastructure on productivity, output, and employment. Then, they conduct a formal quantitative meta-analysis to discern more clearly why the literature has produced its current findings about infrastructure and the economy. After discussing these findings, they consider the implications for federal highway policy and for future research
    Abstract: To inform debate on a new transportation bill being considered, the authors review the literature on the economic outcomes of highway infrastructure spending, which constitutes the largest share of federal spending on transportation infrastructure. They first highlight the connections between highway spending and the economy and then analyze the literature to trace the effects of highway infrastructure on productivity, output, and employment. Then, they conduct a formal quantitative meta-analysis to discern more clearly why the literature has produced its current findings about infrastructure and the economy. After discussing these findings, they consider the implications for federal highway policy and for future research
    Note: Includes bibliographical references (pages 81-90)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9780833046161 , 0833047035 , 9781282081635 , 1282081632 , 9780833047038 , 0833046160
    Language: English
    Pages: 1 Online-Ressource (xxiii, 283 pages)
    Series Statement: Rand Corporation monograph series
    Parallel Title: Print version Challenge of domestic intelligence in a free society
    Keywords: Terrorism Prevention ; Terrorism Government policy ; Intelligence service ; Terrorism ; Terrorism ; Intelligence service ; POLITICAL SCIENCE ; Political Freedom & Security ; Terrorism ; POLITICAL SCIENCE ; International Relations ; General ; Intelligence service ; Terrorism ; Government policy ; Terrorism ; Prevention ; United States ; Electronic books
    Abstract: Whether U.S. terrorism-prevention efforts match the threat continues to be central in policy debate. Part of this debate is whether the United States needs a dedicated domestic counterterrorism intelligence agency. To inform future policy decisionmaking, this book examines, from a variety of perspectives, the policy proposal that such an agency be created. These include its possible capabilities, comparing its potential effectiveness with that of current efforts, and its acceptability to the public, as well as various balances and trade-offs involved in creating such an agency. Reflecting the limits in the data available and the significant uncertainty associated with this policy area, if there is a unifying message from the study, it is one of caution and deliberation. In an area in which direct assessment and analysis are limited, there is a need to carefully consider the implications and potential outcomes of such significant policy changes. In doing so, examination from different perspectives and through different approaches -- to ideally capture a sufficient picture of the complexity to see not just the benefits we hope to gain from policy change but the layers of effects and interactions that could either help or hurt the chances of those benefits appearing -- is a critical ingredient of policy deliberation and design
    Abstract: Whether U.S. terrorism-prevention efforts match the threat continues to be central in policy debate. Part of this debate is whether the United States needs a dedicated domestic counterterrorism intelligence agency. To inform future policy decisionmaking, this book examines, from a variety of perspectives, the policy proposal that such an agency be created. These include its possible capabilities, comparing its potential effectiveness with that of current efforts, and its acceptability to the public, as well as various balances and trade-offs involved in creating such an agency. Reflecting the limits in the data available and the significant uncertainty associated with this policy area, if there is a unifying message from the study, it is one of caution and deliberation. In an area in which direct assessment and analysis are limited, there is a need to carefully consider the implications and potential outcomes of such significant policy changes. In doing so, examination from different perspectives and through different approaches -- to ideally capture a sufficient picture of the complexity to see not just the benefits we hope to gain from policy change but the layers of effects and interactions that could either help or hurt the chances of those benefits appearing -- is a critical ingredient of policy deliberation and design
    Note: Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    ISBN: 9780833044822 , 0833044826 , 9780833043184 , 0833045865 , 9781281736772 , 1281736775 , 9780833045867 , 0833043188
    Language: English
    Pages: 1 Online-Ressource (228 pages)
    Series Statement: Rand Corporation monograph series
    Parallel Title: Print version Green warriors
    DDC: 355.4/1
    Keywords: United States Operations other than war ; Environmental aspects ; United States Foreign service ; Environmental aspects ; United States ; United States ; Postwar reconstruction Environmental aspects ; Military doctrine Environmental aspects ; Environmental policy ; Postwar reconstruction ; Military doctrine ; Environmental policy ; HISTORY ; Military ; Strategy ; POLITICAL SCIENCE ; Public Policy ; Environmental Policy ; Environmental policy ; Postwar reconstruction ; Environmental aspects ; United States ; United States ; Electronic books ; Aufsatzsammlung
    Abstract: Recent experiences in Iraq, Afghanistan, and the Balkans have highlighted the importance of environmental considerations. These range from protecting soldier health and disposing of hazardous waste to building water supply systems and other activities that help achieve national goals in the post-conflict phase of contingency operations. The Army has become increasingly involved with environmental issues in every contingency operation and must be better prepared to deal with them. This study assesses whether existing policy, doctrine, and guidance adequately address environmental activities in post-conflict military operations and reconstruction. Findings are based on reviews of top-level policy and doctrine, analysis of operational experience, extensive interviews with diverse Army personnel, and a review of operational documentation and literature. From these sources, a database of 111 case studies was created. The research showed that environmental concerns can have far-reaching and significant impacts on the Army, both direct and indirect, especially in terms of cost, current operations, soldier health, diplomatic relations, reconstruction activities, and the ultimate success of the operation or the broader mission. Some evidence suggests that environmental problems may have even contributed to insurgency in Iraq. Recommendations include updating current policy and doctrine to fully address environmental considerations in contingency operations; ensuring that contractors are carefully selected and managed; and transmitting proactive field environmental practices and lessons throughout the Army
    Abstract: Recent experiences in Iraq, Afghanistan, and the Balkans have highlighted the importance of environmental considerations. These range from protecting soldier health and disposing of hazardous waste to building water supply systems and other activities that help achieve national goals in the post-conflict phase of contingency operations. The Army has become increasingly involved with environmental issues in every contingency operation and must be better prepared to deal with them. This study assesses whether existing policy, doctrine, and guidance adequately address environmental activities in post-conflict military operations and reconstruction. Findings are based on reviews of top-level policy and doctrine, analysis of operational experience, extensive interviews with diverse Army personnel, and a review of operational documentation and literature. From these sources, a database of 111 case studies was created. The research showed that environmental concerns can have far-reaching and significant impacts on the Army, both direct and indirect, especially in terms of cost, current operations, soldier health, diplomatic relations, reconstruction activities, and the ultimate success of the operation or the broader mission. Some evidence suggests that environmental problems may have even contributed to insurgency in Iraq. Recommendations include updating current policy and doctrine to fully address environmental considerations in contingency operations; ensuring that contractors are carefully selected and managed; and transmitting proactive field environmental practices and lessons throughout the Army
    Note: "RAND Arroyo Center , Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Santa Monica, CA : Rand Corp
    ISBN: 9780833042002 , 0833045881 , 0833042009 , 9780833045881
    Language: English
    Pages: 1 Online-Ressource (xxvi, 149 pages)
    Edition: [S.l.] HathiTrust Digital Library 2010 Electronic reproduction
    Parallel Title: Print version Leader development in Army units
    DDC: 355.3/3041
    Keywords: United States Officers ; Training of ; United States ; Leadership ; Command of troops ; Leadership ; Command of troops ; HISTORY ; Military ; Biological & Chemical Warfare ; POLITICAL SCIENCE ; Political Freedom ; Armed Forces ; Officers ; Training of ; Command of troops ; Leadership ; United States ; United States ; Electronic books
    Abstract: Summarizes discussions with over 450 Army officers (lieutenants through colonels) about leader development in Army units. These discussions revealed that the type and extent of leader development activities vary greatly across units, but that they are generally informal and most heavily influenced by the unit commander. The authors conclude with suggestions on how the Army school system can improve leader development
    Abstract: Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One -- Introduction; Chapter Two -- Study Participants and Methods; Chapter Three -- Overview of Unit-Level Leader Development; Chapter Four -- Commander's Influence on Unit-Level LeaderDevelopment Activities; Chapter Five -- Counseling, Coaching, and Mentoring; Chapter Six -- Specific Elements of Leader DevelopmentPrograms; Chapter Seven -- Conclusions and Recommendations; Appendix A -- Junior Officer Questionnaire; Appendix B -- Leadership Qualities That Junior Officers MostAdmire and Wish to Emulate
    Abstract: Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One -- Introduction; Chapter Two -- Study Participants and Methods; Chapter Three -- Overview of Unit-Level Leader Development; Chapter Four -- Commander's Influence on Unit-Level LeaderDevelopment Activities; Chapter Five -- Counseling, Coaching, and Mentoring; Chapter Six -- Specific Elements of Leader DevelopmentPrograms; Chapter Seven -- Conclusions and Recommendations; Appendix A -- Junior Officer Questionnaire; Appendix B -- Leadership Qualities That Junior Officers MostAdmire and Wish to Emulate
    Note: "RAND Arroyo Center , Includes bibliographical references (pages 147-149) , Use copy Restrictions unspecified star MiAaHDL , Electronic reproduction , Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Santa Monica, CA : Rand Corp
    ISBN: 9780833041289 , 0833045903 , 0833041282 , 9780833045904
    Language: English
    Pages: 1 Online-Ressource (xxvii, 111 pages)
    Edition: [S.l.] HathiTrust Digital Library 2010 Electronic reproduction
    Series Statement: RAND Corporation monograph series
    Parallel Title: Print version Common operating picture for Air Force materiel sustainment
    DDC: 358.4/180973
    Keywords: United States Equipment and supplies ; United States ; Logistics ; Airplanes, Military Maintenance and repair ; Logistics ; Airplanes, Military ; TECHNOLOGY & ENGINEERING ; Military Science ; POLITICAL SCIENCE ; Political Freedom ; Airplanes, Military ; Maintenance and repair ; Armed Forces ; Equipment and supplies ; Logistics ; United States ; United States ; Electronic books
    Abstract: Describes a potential common operating system (COP) for the Air Force materiel sustainment system (MSS). The authors first develop a COP based on the principles of effects-based measures, schwerpunkt (organizational focus), decision rights, and a nonmarket economic framework, then they apply the COP to depot-level reparable component sustainment to illustrate how the COP would improve overall MSS efficiency and responsiveness
    Abstract: Describes a potential common operating system (COP) for the Air Force materiel sustainment system (MSS). The authors first develop a COP based on the principles of effects-based measures, schwerpunkt (organizational focus), decision rights, and a nonmarket economic framework, then they apply the COP to depot-level reparable component sustainment to illustrate how the COP would improve overall MSS efficiency and responsiveness
    Note: Includes bibliographical references , Use copy Restrictions unspecified star MiAaHDL , Electronic reproduction , Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Santa Monica, CA : Rand Corp
    ISBN: 9780833042323 , 0833042327 , 9780833044877 , 0833044877 , 9780833045911 , 0833045911
    Language: English
    Pages: 1 Online-Ressource (61 pages)
    Parallel Title: Print version Ochmanek, David A Challenge of nuclear-armed regional adversaries
    DDC: 355.02/17
    Keywords: Nuclear warfare ; Deterrence (Strategy) ; Security, International ; National security ; Strategic forces ; Nuclear warfare ; Deterrence (Strategy) ; Security, International ; National security ; Strategic forces ; National security ; Nuclear warfare ; Security, International ; Strategic forces ; United States ; HISTORY ; Military ; Nuclear Warfare ; Deterrence (Strategy) ; Military policy ; United States Military policy ; United States
    Abstract: "North Korea's test of a nuclear weapon in 2006 shows that such weapons are within reach of determined regional powers. Thus, defense planners in the United States and elsewhere must begin now to confront the new security challenges posed by nuclear-armed regional adversaries. While U.S. conventional and nuclear forces will continue to have deterrent effects on the leaders of regional adversaries such as North Korea and Iran, the dynamics of the deterrent balance vis-à-vis these actors may be quite different from that to which the United States became accustomed during the Cold War. The weakness of these states at the conventional level, coupled with the high stakes they will have at risk in a conflict with the United States, could lead them to seriously consider brandishing or using nuclear weapons in a conflict. This, in turn, could compel U.S. leaders to temper their military and political objectives in such conflicts. To improve the United States' military and political leverage in these situations, a great deal more needs to be done to develop and field capabilities, such as multilayered theater missile defenses and improved surveillance and target-tracking capabilities, that can prevent the enemy's use of nuclear weapons."--Publisher's website
    Abstract: "North Korea's test of a nuclear weapon in 2006 shows that such weapons are within reach of determined regional powers. Thus, defense planners in the United States and elsewhere must begin now to confront the new security challenges posed by nuclear-armed regional adversaries. While U.S. conventional and nuclear forces will continue to have deterrent effects on the leaders of regional adversaries such as North Korea and Iran, the dynamics of the deterrent balance vis-à-vis these actors may be quite different from that to which the United States became accustomed during the Cold War. The weakness of these states at the conventional level, coupled with the high stakes they will have at risk in a conflict with the United States, could lead them to seriously consider brandishing or using nuclear weapons in a conflict. This, in turn, could compel U.S. leaders to temper their military and political objectives in such conflicts. To improve the United States' military and political leverage in these situations, a great deal more needs to be done to develop and field capabilities, such as multilayered theater missile defenses and improved surveillance and target-tracking capabilities, that can prevent the enemy's use of nuclear weapons."--Publisher's website
    Note: Includes bibliographical references (pages 57-61)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    ISBN: 9780833044228 , 0833045997 , 0833044222 , 9780833045997
    Language: English
    Pages: 1 Online-Ressource (xv, 22 pages)
    Edition: [S.l.] HathiTrust Digital Library 2010 Electronic reproduction
    Series Statement: Occasional paper
    Parallel Title: Print version Dertouzos, James N., 1950- Legal and economic implications of electronic discovery
    Keywords: Electronic discovery (Law) ; Electronic discovery (Law) ; LAW ; Civil Law ; Electronic discovery (Law) ; United States ; LAW ; Depositions ; Electronic books
    Abstract: Pretrial discovery--the exchange of relevant information between litigants--is central to the American civil legal process. As computer technologies continue to develop, concerns have arisen that, because of the sheer volume of electronically stored information, requests for electronic discovery (e-discovery) can increase litigation costs, impose new risks on lawyers and their clients, and alter expectations about likely court outcomes. For example, concerns about e-discovery may cause businesses to alter the ways in which they track and store information, or they may make certain types of plaintiffs and defendants more likely to sue, settle out of court, or go to trial. This paper presents the results of an exploratory study to identify the most important legal and economic implications of e-discovery. The authors interviewed plaintiffs and defense attorneys as well as corporate information technology staff and in-house counsel, and they reviewed the current state of e-discovery law and procedure. They then developed a preliminary model to explore the range of plausible effects that e-discovery might have on case outcomes. After summarizing this research, the authors propose five studies that will evaluate how e-discovery affects and is affected by technology, costs, business practices, legal outcomes, and public policy
    Abstract: Pretrial discovery--the exchange of relevant information between litigants--is central to the American civil legal process. As computer technologies continue to develop, concerns have arisen that, because of the sheer volume of electronically stored information, requests for electronic discovery (e-discovery) can increase litigation costs, impose new risks on lawyers and their clients, and alter expectations about likely court outcomes. For example, concerns about e-discovery may cause businesses to alter the ways in which they track and store information, or they may make certain types of plaintiffs and defendants more likely to sue, settle out of court, or go to trial. This paper presents the results of an exploratory study to identify the most important legal and economic implications of e-discovery. The authors interviewed plaintiffs and defense attorneys as well as corporate information technology staff and in-house counsel, and they reviewed the current state of e-discovery law and procedure. They then developed a preliminary model to explore the range of plausible effects that e-discovery might have on case outcomes. After summarizing this research, the authors propose five studies that will evaluate how e-discovery affects and is affected by technology, costs, business practices, legal outcomes, and public policy
    Note: Includes bibliographical references , Use copy Restrictions unspecified star MiAaHDL , Electronic reproduction , Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Santa Monica, CA : Rand Corp
    ISBN: 9780833043023 , 0833044486 , 9781281430281 , 1281430285 , 9780833044488 , 0833043021
    Language: English
    Pages: 1 Online-Ressource (xiii, 34 pages)
    Edition: [S.l.] HathiTrust Digital Library 2010 Electronic reproduction
    Parallel Title: Print version Larrabee, F. Stephen Turkey as a U.S. security partner
    Keywords: National security ; National security ; National security ; National security ; POLITICAL SCIENCE ; International Relations ; General ; Diplomatic relations ; National security ; national security ; United States ; national security ; Turkey ; Middle East ; Turkey ; United States ; POLITICAL SCIENCE ; Government ; International ; United States Foreign relations ; Turkey Foreign relations ; United States Foreign relations ; Turkey Foreign relations ; United States ; Turkey ; United States ; Turkey ; Electronic books
    Abstract: Turkey has long been an important U.S. ally, but especially with the end of the Cold War, the relationship has been changing. Divergences between U.S. and Turkish interests have grown, in part because of Turkey's relationships with its neighbors and the tension between its Western identity and its Middle Eastern orientation. Further, relations with the European Union have also deteriorated of late. As a result, Ankara has come to feel that it can no longer rely on its traditional allies, and Turkey is likely to be a more difficult and less predictable partner in the future. While Turkey will continue to want good ties to the United States, it is likely to be drawn more heavily into the Middle East by the Kurdish issue and Iran's nuclear ambitions. Consequently, the tension between Turkey's Western identity and Middle Eastern orientation is likely to grow even more
    Abstract: Turkey has long been an important U.S. ally, but especially with the end of the Cold War, the relationship has been changing. Divergences between U.S. and Turkish interests have grown, in part because of Turkey's relationships with its neighbors and the tension between its Western identity and its Middle Eastern orientation. Further, relations with the European Union have also deteriorated of late. As a result, Ankara has come to feel that it can no longer rely on its traditional allies, and Turkey is likely to be a more difficult and less predictable partner in the future. While Turkey will continue to want good ties to the United States, it is likely to be drawn more heavily into the Middle East by the Kurdish issue and Iran's nuclear ambitions. Consequently, the tension between Turkey's Western identity and Middle Eastern orientation is likely to grow even more
    Note: "RAND Project Air Force , Includes bibliographical references (pages 33-34) , Use copy Restrictions unspecified star MiAaHDL , Electronic reproduction , Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    ISBN: 9780833042910 , 0833044303 , 0833042912 , 9780833044303
    Language: English
    Pages: 1 Online-Ressource (xv, 39 pages)
    Edition: [S.l.] HathiTrust Digital Library 2010 Electronic reproduction
    Parallel Title: Print version Eibner, Christine Maintaining military medical skills during peacetime
    Keywords: United States Personnel management ; United States ; Medicine, Military ; Manpower planning ; Medicine, Military ; Manpower planning ; United States ; MEDICAL ; Health Policy ; BUSINESS & ECONOMICS ; Human Resources & Personnel Management ; Manpower planning ; Medicine, Military ; Personnel management ; United States ; Electronic books
    Abstract: Military medical personnel are tasked with fulfilling both the benefits mission and the readiness mission of the U.S. Department of Defense (DoD). Currently, most military medical personnel are stationed at military treatment facilities (MTFs) during peacetime, where they maintain their clinical skills by treating beneficiaries of TRICARE, the military health care program. However, the medical skills required during deployment are likely to differ significantly from those required at MTFs. Alternative arrangements for maintaining medical skills for deployment may be needed. One alternative would be to station some military medical personnel in nonmilitary settings where the case mix might more closely resemble the expected case mix under deployment, such as emergency rooms or trauma centers. This study explored one model under which active-duty personnel would be assigned to civilian settings during peacetime, focusing on civilian receptiveness to the proposed arrangement and identifying potential barriers and concerns. Findings indicate that civilian medical organizations are generally receptive to the idea of such a model and that DoD could consider conducting a pilot study to assess the effectiveness of the model in improving military medical readiness
    Abstract: Military medical personnel are tasked with fulfilling both the benefits mission and the readiness mission of the U.S. Department of Defense (DoD). Currently, most military medical personnel are stationed at military treatment facilities (MTFs) during peacetime, where they maintain their clinical skills by treating beneficiaries of TRICARE, the military health care program. However, the medical skills required during deployment are likely to differ significantly from those required at MTFs. Alternative arrangements for maintaining medical skills for deployment may be needed. One alternative would be to station some military medical personnel in nonmilitary settings where the case mix might more closely resemble the expected case mix under deployment, such as emergency rooms or trauma centers. This study explored one model under which active-duty personnel would be assigned to civilian settings during peacetime, focusing on civilian receptiveness to the proposed arrangement and identifying potential barriers and concerns. Findings indicate that civilian medical organizations are generally receptive to the idea of such a model and that DoD could consider conducting a pilot study to assess the effectiveness of the model in improving military medical readiness
    Note: Includes bibliographical references , Title from electronic t.p. (viewed Jan. 29, 2008) , Use copy Restrictions unspecified star MiAaHDL , Electronic reproduction , Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    Santa Monica, CA : Rand Corp
    ISBN: 9780833045133 , 0833048163 , 9781282451230 , 1282451235 , 9780833048165 , 083304513X
    Language: English
    Pages: 1 Online-Ressource (xxvi, 201 pages)
    Edition: [S.l.] HathiTrust Digital Library 2010 Electronic reproduction
    Parallel Title: Print version Ware, Willis H RAND and the information evolution
    Keywords: Rand Corporation History ; Rand Corporation ; Research institutes History 20th century ; Information technology Research ; History ; Computer science Research ; History ; Military research History 20th century ; Research institutes ; Information technology ; Computer science ; Military research ; Rand Corporation ; Rand Corporation ; COMPUTERS ; Information Theory ; COMPUTERS ; History ; HISTORY ; Military ; General ; Computer science ; Research ; Information technology ; Research ; Military research ; Research institutes ; Informationstechnik ; Forschung ; Computer Science ; Engineering & Applied Sciences ; USA ; United States ; History ; Electronic books
    Abstract: This professional memoir describes RAND's contributions to the evolution of computer science, particularly during the first decades following World War II, when digital computers succeeded slide rules, mechanical desk calculators, electric accounting machines, and analog computers. The memoir includes photographs and vignettes that reveal the collegial, creative, and often playful spirit in which the groundbreaking research was conducted at RAND
    Abstract: This professional memoir describes RAND's contributions to the evolution of computer science, particularly during the first decades following World War II, when digital computers succeeded slide rules, mechanical desk calculators, electric accounting machines, and analog computers. The memoir includes photographs and vignettes that reveal the collegial, creative, and often playful spirit in which the groundbreaking research was conducted at RAND
    Note: Includes bibliographical references (pages 177-190) and index , Use copy Restrictions unspecified star MiAaHDL , Electronic reproduction , Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    ISBN: 9780833045119 , 0833046764 , 9781282033399 , 1282033395 , 9780833046765 , 0833045113
    Language: English
    Pages: 1 Online-Ressource (xxx, 167 pages)
    Edition: [S.l.] HathiTrust Digital Library 2010 Electronic reproduction
    Parallel Title: Print version Bartis, James T., 1945- Producing liquid fuels from coal
    Keywords: Coal liquefaction ; Coal liquefaction Government policy ; Coal liquefaction ; Coal liquefaction ; POLITICAL SCIENCE ; Public Policy ; Environmental Policy ; POLITICAL SCIENCE ; International Relations ; General ; POLITICAL SCIENCE ; Political Freedom & Security ; International Security ; Coal liquefaction ; Chemical & Materials Engineering ; Engineering & Applied Sciences ; Chemical Engineering ; United States ; Electronic books
    Abstract: Introduction -- The coal resource base -- Coal-to-liquids technologies -- Other unconventional fuels -- Benefits of coal-to-liquids development -- Critical policy issues for coal-to-liquids development -- Designing incentives to encourage private investment -- Moving forward with a coal-to-liquids development effort -- Appendixes: A. Cost-estimation methodology and assumptions -- B. Greenhouse-gas emissions: supporting analysis -- C.A model of the global liquid-fuel market
    Abstract: Introduction -- The coal resource base -- Coal-to-liquids technologies -- Other unconventional fuels -- Benefits of coal-to-liquids development -- Critical policy issues for coal-to-liquids development -- Designing incentives to encourage private investment -- Moving forward with a coal-to-liquids development effort -- Appendixes: A. Cost-estimation methodology and assumptions -- B. Greenhouse-gas emissions: supporting analysis -- C.A model of the global liquid-fuel market
    Note: "Rand Project Air Force and Infrastructure, Safety, and Environment , Includes bibliographical references (pages 155-167) , Use copy Restrictions unspecified star MiAaHDL , Electronic reproduction , Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    ISBN: 9780833042897 , 0833045245 , 0833042890 , 9780833045249
    Language: English
    Pages: 1 Online-Ressource (xxv, 90 pages)
    Edition: [S.l.] HathiTrust Digital Library 2010 Electronic reproduction
    Parallel Title: Print version Sources of weapon system cost growth
    Keywords: United States Procurement ; Cost control ; United States ; TECHNOLOGY & ENGINEERING ; Military Science ; HISTORY ; Military ; Other ; Armed Forces ; Procurement ; Cost control ; Armed Forces ; Weapons systems ; Costs ; United States ; United States ; United States Armed Forces ; Weapons systems ; Costs ; United States ; Electronic books
    Abstract: Previous studies have shown that the Department of Defense (DoD) and the military departments have historically underestimated the cost of new weapon systems. Quantifying cost growth is important, but the larger issue is why cost growth occurs. To address that issue, this analysis uses data from Selected Acquisition Reports to examine 35 mature, but not necessarily complete, major defense acquisition programs similar to the type and complexity of those typically managed by the Air Force. The programs are first examined as a complete set, then Air Force and non-Air Force programs are analyzed separately to determine whether the causes of cost growth in the two groups differ. Four major sources of cost growth were identified: (1) errors in estimation and scheduling, (2) decisions made by the government, (3) financial matters, and (4) miscellaneous sources. Total (development plus procurement) cost growth, when measured as simple averages among the program set, is dominated by decisions, which account for more than two-thirds of the growth. Most decisions-related cost growth involves quantity changes (22 percent), requirements growth (13 percent), and schedule changes (9 percent). Cost estimation (10 percent) is the only large contributor in the errors category. Less than 4 percent of the overall cost growth is due to financial and miscellaneous causes. Because decisions involving changes in requirements, quantities, and production schedules dominate cost growth, program managers, service leadership, and Congress should look for ways to reduce changes in these areas
    Abstract: Previous studies have shown that the Department of Defense (DoD) and the military departments have historically underestimated the cost of new weapon systems. Quantifying cost growth is important, but the larger issue is why cost growth occurs. To address that issue, this analysis uses data from Selected Acquisition Reports to examine 35 mature, but not necessarily complete, major defense acquisition programs similar to the type and complexity of those typically managed by the Air Force. The programs are first examined as a complete set, then Air Force and non-Air Force programs are analyzed separately to determine whether the causes of cost growth in the two groups differ. Four major sources of cost growth were identified: (1) errors in estimation and scheduling, (2) decisions made by the government, (3) financial matters, and (4) miscellaneous sources. Total (development plus procurement) cost growth, when measured as simple averages among the program set, is dominated by decisions, which account for more than two-thirds of the growth. Most decisions-related cost growth involves quantity changes (22 percent), requirements growth (13 percent), and schedule changes (9 percent). Cost estimation (10 percent) is the only large contributor in the errors category. Less than 4 percent of the overall cost growth is due to financial and miscellaneous causes. Because decisions involving changes in requirements, quantities, and production schedules dominate cost growth, program managers, service leadership, and Congress should look for ways to reduce changes in these areas
    Note: Includes bibliographical references (pages 89-90) , Use copy Restrictions unspecified star MiAaHDL , Electronic reproduction , Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    Santa Monica, CA : Rand Corp
    ISBN: 9780833041890 , 0833042882 , 0833041894 , 9780833042880
    Language: English
    Pages: 1 Online-Ressource (xxxiv, 159 pages)
    Series Statement: Rand counterinsurgency study v. 1
    Parallel Title: Print version Byting back
    DDC: 322.42
    Keywords: Military art and science ; Afghan War, 2001- ; Insurgency ; Iraq War, 2003-2011 ; Military art and science ; Afghan War, 2001- ; Insurgency ; Iraq War, 2003-2011 ; POLITICAL SCIENCE ; Security (National & International) ; Insurgency ; Military art and science ; Political Science ; Military & Naval Science ; Law, Politics & Government ; Political Theory of the State ; Military Administration ; Iraq War (2003-2011) ; Iraq ; United States ; POLITICAL SCIENCE ; Political Process ; Political Advocacy ; Afghan War (2001- ) ; Electronic books
    Abstract: U.S. counterinsurgency efforts in Iraq and Afghanistan have failed to exploit information power, which could be a U.S. advantage but instead is being used advantageously by insurgents. Because insurgency and counterinsurgency involve a battle for the allegiance of a population between a government and an armed opposition movement, the key to exploiting information power is to connect with and learn from the population itself, increasing the effectiveness of both the local government and the U.S. military and civilian services engaged in supporting it. Utilizing mostly available networking technology, the United States could achieve early, affordable, and substantial gains in the effectiveness of counterinsurgency by more open, integrated, and inclusive information networking with the population, local authorities, and coalition partners. The most basic information link with the population would be an information technology (IT)-enhanced, fraud-resistant registry-census. The most promising link would come from utilizing local cell phone networks, which are proliferating even among poor countries. Access to data routinely collected by such networks can form the basis for security services such as enhanced-911 and forensics. The cell phones of a well-wired citizenry can be tantamount to sensor fields in settled areas. They can link indigenous forces with each other and with U.S. forces without interoperability problems; they can also track the responses of such forces to emergencies. Going further, outfitting weaponry with video cameras would bolster surveillance, provide lessons learned, and guard against operator misconduct. Establishing a national Wiki can help citizens describe their neighborhoods to familiarize U.S. forces with them and can promote accountable service delivery. All such information can improve counterinsurgency operations by making U.S. forces and agencies far better informed than they are at present. The authors argue that today's military and intelligence networks -- being closed, compartmentalized, controlled by information providers instead of users, and limited to U.S. war fighters -- hamper counterinsurgency and deprive the United States of what ought to be a strategic advantage. In contrast, based on a review of 160 requirements for counterinsurgency, the authors call for current networks to be replaced by an integrated counterinsurgency operating network (ICON) linking U.S. and indigenous operators, based on principles of inclusi ...
    Abstract: U.S. counterinsurgency efforts in Iraq and Afghanistan have failed to exploit information power, which could be a U.S. advantage but instead is being used advantageously by insurgents. Because insurgency and counterinsurgency involve a battle for the allegiance of a population between a government and an armed opposition movement, the key to exploiting information power is to connect with and learn from the population itself, increasing the effectiveness of both the local government and the U.S. military and civilian services engaged in supporting it. Utilizing mostly available networking technology, the United States could achieve early, affordable, and substantial gains in the effectiveness of counterinsurgency by more open, integrated, and inclusive information networking with the population, local authorities, and coalition partners. The most basic information link with the population would be an information technology (IT)-enhanced, fraud-resistant registry-census. The most promising link would come from utilizing local cell phone networks, which are proliferating even among poor countries. Access to data routinely collected by such networks can form the basis for security services such as enhanced-911 and forensics. The cell phones of a well-wired citizenry can be tantamount to sensor fields in settled areas. They can link indigenous forces with each other and with U.S. forces without interoperability problems; they can also track the responses of such forces to emergencies. Going further, outfitting weaponry with video cameras would bolster surveillance, provide lessons learned, and guard against operator misconduct. Establishing a national Wiki can help citizens describe their neighborhoods to familiarize U.S. forces with them and can promote accountable service delivery. All such information can improve counterinsurgency operations by making U.S. forces and agencies far better informed than they are at present. The authors argue that today's military and intelligence networks -- being closed, compartmentalized, controlled by information providers instead of users, and limited to U.S. war fighters -- hamper counterinsurgency and deprive the United States of what ought to be a strategic advantage. In contrast, based on a review of 160 requirements for counterinsurgency, the authors call for current networks to be replaced by an integrated counterinsurgency operating network (ICON) linking U.S. and indigenous operators, based on principles of inclusi ...
    Note: "RAND National Defense Research Institute , Includes bibliographical references (pages 157-159)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    ISBN: 9780833041494 , 083304270X , 9781281180780 , 1281180785 , 9780833042705 , 0833041495
    Language: English
    Pages: 1 Online-Ressource (xxvi, 275 pages)
    Edition: [S.l.] HathiTrust Digital Library 2010 Electronic reproduction
    Parallel Title: Print version Standards-based accountability under no child left behind
    DDC: 379.1580973
    RVK:
    Keywords: United States ; United States ; Educational accountability ; Educational accountability ; Educational accountability ; Education Standards ; Education Standards ; Education Standards ; Educational accountability ; Educational accountability ; Educational accountability ; Education ; Education ; Education ; No Child Left Behind Act of 2001 (United States) ; EDUCATION ; Finance ; SOCIAL SCIENCE ; Children's Studies ; Education ; Standards ; Educational accountability ; Educação ; Estados unidos ; Administração da educação ; Estados unidos ; Pennsylvania ; California ; Georgia ; Electronic books
    Abstract: Since 2001-2002, standards-based accountability (SBA) provisions of the No Child Left Behind Act of 2001 (NCLB) have shaped the work of public school teachers and administrators in the United States. NCLB requires each state to develop content and achievement standards in several subjects, administer tests to measure students' progress toward these standards, develop targets for performance on these tests, and impose a series of interventions on schools and districts that do not meet the targets. Many states had such systems in place before NCLB took effect, but, since 2001-2002, every state i
    Abstract: Since 2001-2002, standards-based accountability (SBA) provisions of the No Child Left Behind Act of 2001 (NCLB) have shaped the work of public school teachers and administrators in the United States. NCLB requires each state to develop content and achievement standards in several subjects, administer tests to measure students' progress toward these standards, develop targets for performance on these tests, and impose a series of interventions on schools and districts that do not meet the targets. Many states had such systems in place before NCLB took effect, but, since 2001-2002, every state i
    Note: Includes bibliographical references (pages 265-275) , Use copy Restrictions unspecified star MiAaHDL , Electronic reproduction , Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    ISBN: 9780833043030 , 0833044273 , 083304303X , 9780833044273
    Language: English
    Pages: 1 Online-Ressource (xli, 178 pages)
    Parallel Title: Print version Networked forces in stability operations
    DDC: 956.7044/342
    Keywords: United States History 21st century ; United States ; Stryker brigade combat teams Case studies Evaluation ; Iraq War, 2003-2011 Campaigns ; Communications, Military Case studies Evaluation ; Command and control systems Case studies Evaluation ; Stryker brigade combat teams ; Iraq War, 2003-2011 ; Communications, Military ; Command and control systems ; POLITICAL SCIENCE ; Political Freedom ; Command and control systems ; Evaluation ; Military campaigns ; Iraq War (2003-2011) ; Iraq ; United States ; United States ; Case studies ; History ; HISTORY ; Military ; United States Armed Forces ; Stability operations ; Evaluation ; United States ; Electronic books ; Fallstudiensammlung
    Abstract: "The Stryker brigade, one of the Army's newest units, has a full complement of Army digital networked communications and battle command systems. An important issue for the Department of Defense and the Army is whether these networking capabilities translate into an information advantage and, if so, whether that advantage results in greater mission effectiveness in stability operations. To answer those two questions, the authors compare three units that operated in the same area in Iraq's northern provinces between 2003 and 2005: the 101st Airborne Division (ABD) (which had only limited digital communications capabilities), the 3/2 Stryker brigade combat team (SBCT), and the 1/25 SBCT. Overall, the 1/25 SBCT and 101st ABD performed best in the stability phase in northern Iraq. They were particularly effective in social networking with the local populace and civilian leaders. The 3/2 SBCT did not perform as well as the 1/25 SBCT, even though it was equipped with some of the same digital networking capabilities. Some of the tactics it employed, such as indiscriminate sweeps, widened the gulf between coalition forces and the local populace. Although networking technologies confer obvious benefits, the authors conclude that command leadership, training, and the processes employed in stability operations are just as important for improving mission effectiveness in stability operations."--Publisher's website
    Abstract: "The Stryker brigade, one of the Army's newest units, has a full complement of Army digital networked communications and battle command systems. An important issue for the Department of Defense and the Army is whether these networking capabilities translate into an information advantage and, if so, whether that advantage results in greater mission effectiveness in stability operations. To answer those two questions, the authors compare three units that operated in the same area in Iraq's northern provinces between 2003 and 2005: the 101st Airborne Division (ABD) (which had only limited digital communications capabilities), the 3/2 Stryker brigade combat team (SBCT), and the 1/25 SBCT. Overall, the 1/25 SBCT and 101st ABD performed best in the stability phase in northern Iraq. They were particularly effective in social networking with the local populace and civilian leaders. The 3/2 SBCT did not perform as well as the 1/25 SBCT, even though it was equipped with some of the same digital networking capabilities. Some of the tactics it employed, such as indiscriminate sweeps, widened the gulf between coalition forces and the local populace. Although networking technologies confer obvious benefits, the authors conclude that command leadership, training, and the processes employed in stability operations are just as important for improving mission effectiveness in stability operations."--Publisher's website
    Note: Includes bibliographical references (pages 171-178)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    ISBN: 9780833041548 , 0833044451 , 9781281430090 , 1281430099 , 9780833044457 , 0833041541
    Language: English
    Pages: 1 Online-Ressource (xx, 69 pages)
    Series Statement: RAND Project Air Force
    Parallel Title: Print version Absorbing and developing qualified fighter pilots
    DDC: 358.433071
    Keywords: United States ; United States ; Fighter pilots Training of ; Fighter pilots ; BUSINESS & ECONOMICS ; Human Resources & Personnel Management ; Fighter pilots ; Training of ; Military & Naval Science ; Law, Politics & Government ; Air Forces ; United States ; United States ; TECHNOLOGY & ENGINEERING ; Military Science ; Electronic books
    Abstract: What does an individual need to be considered an experienced fighter pilot? The current formal definition is based on how many flying hours a person has, but in practice, the question is more complex and sometimes subjective because an individual requires different kinds of experience for combat positions and staff positions. The authors surveyed training experts to discover practical bases for judgments about the experience needed for different jobs. For flying positions, they found that time in advanced simulators is now also considered to be an important component of experience. Upgrade levels (say, from wingman to flight lead) and types of sorties flown are factors for both flying and staff positions. The results suggest that it is time for the Air Force to consider revising the view that a pilot is experienced or not is based only on the number of hours flown. The Air Force needs to measure and credit different types of experience-including time spent in advanced simulator systems-when revising its definitions of pilot experience
    Abstract: What does an individual need to be considered an experienced fighter pilot? The current formal definition is based on how many flying hours a person has, but in practice, the question is more complex and sometimes subjective because an individual requires different kinds of experience for combat positions and staff positions. The authors surveyed training experts to discover practical bases for judgments about the experience needed for different jobs. For flying positions, they found that time in advanced simulators is now also considered to be an important component of experience. Upgrade levels (say, from wingman to flight lead) and types of sorties flown are factors for both flying and staff positions. The results suggest that it is time for the Air Force to consider revising the view that a pilot is experienced or not is based only on the number of hours flown. The Air Force needs to measure and credit different types of experience-including time spent in advanced simulator systems-when revising its definitions of pilot experience
    Note: "Rand Project Air Force , Includes bibliographical references (pages 67-69)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    Santa Monica, CA : Rand Corp
    ISBN: 9780833041364 , 0833042823 , 0833041363 , 9780833042828
    Language: English
    Pages: 1 Online-Ressource (xiii, 60 pages)
    Series Statement: Rand counterinsurgency study paper 3
    Series Statement: Occasional paper (Rand Corporation) OP-178
    Parallel Title: Print version Byman, Daniel, 1967- Understanding proto-insurgencies
    DDC: 355.02/18
    Keywords: Insurgency ; Terrorism Prevention ; Counterinsurgency ; Insurgency ; Terrorism ; Counterinsurgency ; Counterinsurgency ; Influence (Literary, artistic, etc.) ; Insurgency ; Diplomatic relations ; Terrorism ; Prevention ; TECHNOLOGY & ENGINEERING ; Military Science ; HISTORY ; Military ; Other ; United States ; POLITICAL SCIENCE ; Security (National & International) ; United States Foreign relations ; United States Influence ; United States ; United States ; Electronic books
    Abstract: To gain the size and capabilities of an insurgency, a would-be insurgent movement must create a politically relevant identity; it must espouse a cause that is popular beyond the group; it must gain dominance over rival organizations; and it must find a sanctuary that provides respite from police, intelligence, and military services. Violence is instrumental in all the tasks proto-insurgencies seek to accomplish. However, violence can also backfire on them, since few people support it. Support from outside states offers numerous advantages to groups seeking to become insurgencies. It can provide safe haven, money, training, and help with political mobilization. It can also help groups overcome logistical difficulties, hinder intelligence-gathering against them, and legitimize them, making government delegitimization efforts almost impossible. Outside states, however, often deliberately try to control or even weaken the group and at times can reduce its political popularity. The reaction of the state is often the most important factor in a movement's overall success. Perhaps the best and most efficient way to prevent proto-insurgents from gaining ground is through in-group policing, since groups know their own members and can enable arrests or other forms of pressure. The government can also promote rival identities. Governments must, however, recognize the proto-insurgents' weaknesses and avoid overreaction that may inadvertently strengthen them. The most obvious action for the United States is to anticipate the possibility of an insurgency developing before it materializes. It can also provide behind-the-scenes training and advisory programs and can help inhibit outside support
    Abstract: To gain the size and capabilities of an insurgency, a would-be insurgent movement must create a politically relevant identity; it must espouse a cause that is popular beyond the group; it must gain dominance over rival organizations; and it must find a sanctuary that provides respite from police, intelligence, and military services. Violence is instrumental in all the tasks proto-insurgencies seek to accomplish. However, violence can also backfire on them, since few people support it. Support from outside states offers numerous advantages to groups seeking to become insurgencies. It can provide safe haven, money, training, and help with political mobilization. It can also help groups overcome logistical difficulties, hinder intelligence-gathering against them, and legitimize them, making government delegitimization efforts almost impossible. Outside states, however, often deliberately try to control or even weaken the group and at times can reduce its political popularity. The reaction of the state is often the most important factor in a movement's overall success. Perhaps the best and most efficient way to prevent proto-insurgents from gaining ground is through in-group policing, since groups know their own members and can enable arrests or other forms of pressure. The government can also promote rival identities. Governments must, however, recognize the proto-insurgents' weaknesses and avoid overreaction that may inadvertently strengthen them. The most obvious action for the United States is to anticipate the possibility of an insurgency developing before it materializes. It can also provide behind-the-scenes training and advisory programs and can help inhibit outside support
    Note: "RAND National Defense Research Institute , "Prepared for the Office of the Secretary of Defense , Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    Santa Monica, CA : Rand Corp
    ISBN: 9780833042118 , 083304429X , 0833042114 , 9780833044297
    Language: English
    Pages: 1 Online-Ressource (xxii, 100 pages)
    Parallel Title: Print version Building partner capabilities for coalition operations
    DDC: 355.4/6
    Keywords: United States Organization ; United States ; Multinational armed forces Organization ; Military planning ; Combined operations (Military science) ; Multinational armed forces ; Military planning ; Combined operations (Military science) ; HISTORY ; Military ; Strategy ; POLITICAL SCIENCE ; Security (National & International) ; Armed Forces ; Organization ; Combined operations (Military science) ; Military planning ; Military relations ; United States ; United States ; Case studies ; United States Military relations ; United States ; Electronic book
    Abstract: Ongoing operations and emerging mission requirements place a heavy burden on Army resources, resulting in capability gaps that the Army is unable to fill by itself. This report argues that one way to fill those gaps is by building the appropriate capabilities in allies and partner armies through focused security cooperation. It argues that U.S. Army planners need a more comprehensive understanding of the types of capability gaps that partner armies might fill and a process for matching those gaps with candidate partner armies. The report begins by providing a theoretical context for building partner capacity and capabilities. It then discusses seven illustrative train and equip programs (TEPs) to identify specific lessons to inform Army planning and execution of TEPs in the future. It gives insights on the importance of developing and implementing metrics for security cooperation, an essential step in ensuring that Army activities are successful. The report then identifies U.S. Army capability gaps through a review of strategic and operational guidance documents and Army and joint studies. It outlines a five-step process for matching U.S. Army capability gaps with candidate partner armies, which include (1) determining the relative importance of capability gaps to the U.S. Army in specific situations, (2) considering the level of effort required to build the capability in a partner army, (3) identifying capabilities of shared interest to the U.S. Army and the partner army, (4) identifying candidate partner armies based on past participation in U.S.-led operations, and (5) determining existing partner army capabilities. The process aims to help Army planners identify which capabilities are of mutual benefit to the United States and partner nations. The report concludes with specific recommendations for Headquarters, Department of the Army, which should, at a minimum, include adopting this five-step process and focusing its efforts on those capability gaps that best support joint requirements
    Abstract: Ongoing operations and emerging mission requirements place a heavy burden on Army resources, resulting in capability gaps that the Army is unable to fill by itself. This report argues that one way to fill those gaps is by building the appropriate capabilities in allies and partner armies through focused security cooperation. It argues that U.S. Army planners need a more comprehensive understanding of the types of capability gaps that partner armies might fill and a process for matching those gaps with candidate partner armies. The report begins by providing a theoretical context for building partner capacity and capabilities. It then discusses seven illustrative train and equip programs (TEPs) to identify specific lessons to inform Army planning and execution of TEPs in the future. It gives insights on the importance of developing and implementing metrics for security cooperation, an essential step in ensuring that Army activities are successful. The report then identifies U.S. Army capability gaps through a review of strategic and operational guidance documents and Army and joint studies. It outlines a five-step process for matching U.S. Army capability gaps with candidate partner armies, which include (1) determining the relative importance of capability gaps to the U.S. Army in specific situations, (2) considering the level of effort required to build the capability in a partner army, (3) identifying capabilities of shared interest to the U.S. Army and the partner army, (4) identifying candidate partner armies based on past participation in U.S.-led operations, and (5) determining existing partner army capabilities. The process aims to help Army planners identify which capabilities are of mutual benefit to the United States and partner nations. The report concludes with specific recommendations for Headquarters, Department of the Army, which should, at a minimum, include adopting this five-step process and focusing its efforts on those capability gaps that best support joint requirements
    Note: Includes bibliographical references (pages 97-100)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    Santa Monica, CA : Rand Corp
    ISBN: 9780833041852 , 0833044281 , 9781281430144 , 1281430145 , 9780833044280 , 0833041851
    Language: English
    Pages: 1 Online-Ressource (xxv, 138 pages)
    Series Statement: RAND Project Air Force
    Parallel Title: Print version Common battlefield training for airmen
    DDC: 358.415071073
    Keywords: United States Airmen ; United States ; Aeronautics, Military Study and teaching ; Aeronautics, Military ; TECHNOLOGY & ENGINEERING ; Military Science ; BUSINESS & ECONOMICS ; Human Resources & Personnel Management ; Aeronautics, Military ; Study and teaching ; Armed Forces ; Airmen ; United States ; United States ; Electronic books
    Abstract: "Members of Air Force specialties that normally work inside the defended perimeter of a base or deployed location may sometimes have to cross that perimeter. What might seem fairly benign in some locations, such as Germany, would be hazardous in others, such as Iraq. And some initially deployed to a "safe" location may be redeployed to a more hazardous one. While those who routinely go "outside the wire" receive appropriate training, the others historically have not. The Air Force is thus seeking to establish common battlefield airman training (CBAT) and asked RAND Project Air Force to examine the content and resources both for this course and a companion course for non-ground combat personnel. RAND conducted surveys and interviews to determine the kinds of experiences airmen have had "outside the wire" and worked with subject-matter experts to categorize them and suggest appropriate types and amounts of training for them. This report presents the results of these activities."--Publisher's website
    Abstract: "Members of Air Force specialties that normally work inside the defended perimeter of a base or deployed location may sometimes have to cross that perimeter. What might seem fairly benign in some locations, such as Germany, would be hazardous in others, such as Iraq. And some initially deployed to a "safe" location may be redeployed to a more hazardous one. While those who routinely go "outside the wire" receive appropriate training, the others historically have not. The Air Force is thus seeking to establish common battlefield airman training (CBAT) and asked RAND Project Air Force to examine the content and resources both for this course and a companion course for non-ground combat personnel. RAND conducted surveys and interviews to determine the kinds of experiences airmen have had "outside the wire" and worked with subject-matter experts to categorize them and suggest appropriate types and amounts of training for them. This report presents the results of these activities."--Publisher's website
    Note: Includes bibliographical references (pages 137-138)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    Santa Monica, CA : Rand Corp
    ISBN: 9780833041227 , 083304267X , 0833041223 , 9780833042675
    Language: English
    Pages: 1 Online-Ressource (xxxi, 183 pages)
    Edition: [S.l.] HathiTrust Digital Library 2010 Electronic reproduction
    Series Statement: Rand Corporation monograph series
    Parallel Title: Print version Building moderate Muslim networks
    DDC: 320.557090511
    Keywords: Islam 21st century ; Islamic fundamentalism ; Islam ; Islamic fundamentalism ; Islamic fundamentalism ; International relations ; Islam ; Politik ; Netzwerk ; Außenpolitik ; Netzwerk ; Islamic countries ; United States ; Islamische Staaten ; POLITICAL SCIENCE ; Political Ideologies ; General ; USA ; POLITICAL SCIENCE ; International Relations ; General ; Islam ; Islamic countries Relations ; United States Relations ; Islamic countries ; United States ; Electronic books
    Abstract: Radical and dogmatic interpretations of Islam have gained ground in recent years in many Muslim societies via extensive Islamist networks spanning the Muslim world and the Muslim diaspora communities of North America and Europe. Although a majority throughout the Muslim world, moderates have not developed similar networks to amplify their message and to provide protection from violence and intimidation. With considerable experience fostering networks of people committed to free and democratic ideas during the Cold War, the United States has a critical role to play in leveling the playing field for Muslim moderates. The authors derive lessons from the U.S. and allied Cold War network-building experience, determine their applicability to the current situation in the Muslim world, assess the effectiveness of U.S. government programs of engagement with the Muslim world, and develop a "road map" to foster the construction of moderate Muslim networks
    Abstract: Radical and dogmatic interpretations of Islam have gained ground in recent years in many Muslim societies via extensive Islamist networks spanning the Muslim world and the Muslim diaspora communities of North America and Europe. Although a majority throughout the Muslim world, moderates have not developed similar networks to amplify their message and to provide protection from violence and intimidation. With considerable experience fostering networks of people committed to free and democratic ideas during the Cold War, the United States has a critical role to play in leveling the playing field for Muslim moderates. The authors derive lessons from the U.S. and allied Cold War network-building experience, determine their applicability to the current situation in the Muslim world, assess the effectiveness of U.S. government programs of engagement with the Muslim world, and develop a "road map" to foster the construction of moderate Muslim networks
    Note: "The research described in this report was sponsored by the Smith Richardson Foundation and was conducted under the auspices of the RAND Center for Middle East Public Policy"--Title page verso , Includes bibliographical references (pages 171-183) , Use copy Restrictions unspecified star MiAaHDL , Electronic reproduction , Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    Santa Monica, CA : Rand Corp
    ISBN: 9780833039323 , 0833041053 , 9781433709425 , 1433709422 , 9780833041050 , 0833039326
    Language: English
    Pages: 1 Online-Ressource (1 volume)
    Series Statement: Beyond al-Qaeda 2
    Parallel Title: Print version Beyond al-Qaeda. Part 2, The outer rings of the terrorist universe
    Keywords: Qaida (Organization) ; Qaida (Organization) ; Terrorists ; Terrorism Government policy ; War on Terrorism, 2001-2009 ; Terrorism Prevention ; Terrorists ; Terrorism ; War on Terrorism, 2001-2009 ; Terrorism ; POLITICAL SCIENCE ; Terrorism ; Terrorism ; Government policy ; Terrorism ; Prevention ; Terrorists ; Terrorisme ; Al-Qaida ; Strategie ; War on Terrorism (2001-2009) ; United States ; Qaida (Organization) ; POLITICAL SCIENCE ; Political Freedom & Security ; Terrorism ; Electronic books
    Abstract: This book examines terrorist groups that, while not formally allied with al-Qaeda, pose a threat to Americans, at home and abroad, and to the security of our friends and allies. Although the temptation for policymakers is to set aside as less dangerous those groups that have not chosen to join al-Qaeda, such terrorist or insurgent groups and criminal organizations still pose a threat to the United States, its interests, and its allies. The authors first look at violent Islamist terrorist and insurgent groups without formal links to al-Qaeda, such as Hamas and Hezbollah in the Middle East and Islamist groups in Africa. They then examine a number of non-Islamist terrorist groups-for example, the Tamil Tigers in Sri Lanka, the FARC and ELN in Colombia, Maoist insurgencies, and the violent antiglobalist movement-and explain how these groups might fit into the al-Qaeda agenda and how they use criminal organizations and connections to finance their activities. Finally, they show how the presence of these threats affects U.S. security interests, and they identify distinct strategies that the United States may take to neutralize or mitigate each of them
    Abstract: This book examines terrorist groups that, while not formally allied with al-Qaeda, pose a threat to Americans, at home and abroad, and to the security of our friends and allies. Although the temptation for policymakers is to set aside as less dangerous those groups that have not chosen to join al-Qaeda, such terrorist or insurgent groups and criminal organizations still pose a threat to the United States, its interests, and its allies. The authors first look at violent Islamist terrorist and insurgent groups without formal links to al-Qaeda, such as Hamas and Hezbollah in the Middle East and Islamist groups in Africa. They then examine a number of non-Islamist terrorist groups-for example, the Tamil Tigers in Sri Lanka, the FARC and ELN in Colombia, Maoist insurgencies, and the violent antiglobalist movement-and explain how these groups might fit into the al-Qaeda agenda and how they use criminal organizations and connections to finance their activities. Finally, they show how the presence of these threats affects U.S. security interests, and they identify distinct strategies that the United States may take to neutralize or mitigate each of them
    Note: "MG-430"--Page 4 of cover , Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    Santa Monica, CA : Rand Corp
    ISBN: 9780833039309 , 0833041045 , 9781433709418 , 1433709414 , 9780833041043 , 083303930X
    Language: English
    Pages: 1 Online-Ressource (1 volume)
    Series Statement: Beyond al-Qaeda 1
    Parallel Title: Print version Beyond al-Qaeda. Part 1, The global jihadist movement
    Keywords: Qaida (Organization) ; Qaida (Organization) ; Terrorists ; War on Terrorism, 2001-2009 ; Terrorism Prevention ; Terrorism Government policy ; Terrorists ; War on Terrorism, 2001-2009 ; Terrorism ; Terrorism ; POLITICAL SCIENCE ; Terrorism ; Terrorism ; Government policy ; Terrorism ; Prevention ; Terrorists ; Terrorisme ; Al-Qaida ; Strategie ; War on Terrorism (2001-2009) ; United States ; Qaida (Organization) ; POLITICAL SCIENCE ; Political Freedom & Security ; Terrorism ; Electronic books
    Abstract: Five years after September 11, 2001, al-Qaeda and other terrorist groups continue to threaten the lives and well being of Americans and the security of our friends and allies. This study first examines how al-Qaeda has changed since September 11. It then turns to an analysis of the broader global jihadist movement-al-Qaeda and affiliated or associated terrorist groups or groups that may not be formally part of the al-Qaeda network but that have assimilated its worldview and concept of mass-casualty terrorist attacks. These groups, the authors believe, are where the center of gravity of the current global terrorist threat now lies. They conclude by setting out a four-pronged strategy against terrorist groups: Attack the ideological underpinnings of global jihadism; seek to sever the links-ideological and otherwise-between local and global jihadists; deny sanctuaries to terrorists; and strengthen the capabilities of front-line states to counter local terrorist threats
    Abstract: Five years after September 11, 2001, al-Qaeda and other terrorist groups continue to threaten the lives and well being of Americans and the security of our friends and allies. This study first examines how al-Qaeda has changed since September 11. It then turns to an analysis of the broader global jihadist movement-al-Qaeda and affiliated or associated terrorist groups or groups that may not be formally part of the al-Qaeda network but that have assimilated its worldview and concept of mass-casualty terrorist attacks. These groups, the authors believe, are where the center of gravity of the current global terrorist threat now lies. They conclude by setting out a four-pronged strategy against terrorist groups: Attack the ideological underpinnings of global jihadism; seek to sever the links-ideological and otherwise-between local and global jihadists; deny sanctuaries to terrorists; and strengthen the capabilities of front-line states to counter local terrorist threats
    Note: "MG-429"--Page 4 of cover , Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    ISBN: 9780833041050 , 0833041126 , 9781282283046 , 1282283049 , 9781598752991 , 1598752995 , 9780833037190 , 9780833041128 , 0833037196 , 0833041053
    Language: English
    Pages: 1 Online-Ressource (vii, 28 pages)
    Series Statement: Technical report
    Parallel Title: Print version Balkovich, Edward 9 to 5
    DDC: 331.25/98
    Keywords: Privacy, Right of ; Radio frequency Identification ; Electronic monitoring in the workplace ; Employee rights ; Radio frequency identification systems ; Privacy, Right of ; Radio frequency ; Electronic monitoring in the workplace ; Employee rights ; Radio frequency identification systems ; Electronic monitoring in the workplace ; Employee rights ; Privacy, Right of ; Radio frequency ; Radio frequency identification systems ; United States ; BUSINESS & ECONOMICS ; Training ; Field guides ; TECHNOLOGY & ENGINEERING ; General ; Electronic books
    Abstract: Describes a case study of six enterprises that use Radio Frequence Identification (RFID) tags to control access in the workplace to understand their policies about personally identifiable records obtained by sensing RFID-based access cards. These policies have a number of common features, but the policies are neither documented nor shared with employees. While employees ought to be informed about uses of access control system records, implementing traditional fair information practices for such records would be impractical in some situations
    Abstract: Describes a case study of six enterprises that use Radio Frequence Identification (RFID) tags to control access in the workplace to understand their policies about personally identifiable records obtained by sensing RFID-based access cards. These policies have a number of common features, but the policies are neither documented nor shared with employees. While employees ought to be informed about uses of access control system records, implementing traditional fair information practices for such records would be impractical in some situations
    Note: "Technical report , Includes bibliographical references (pages 27-28)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    Santa Monica, CA : Rand Corp
    ISBN: 9780833040640 , 0833040642 , 9780833037343 , 083303734X , 9781598753950 , 1598753959
    Language: English
    Pages: 1 Online-Ressource (xxiii, 127 pages)
    Parallel Title: Print version Bodilly, Susan J Making out-of-school-time matter
    DDC: 371.8
    Keywords: School-age child care ; After-school programs ; School-age child care ; After-school programs ; United States ; After-school programs ; School-age child care ; Electronic books
    Abstract: Presents the findings of a broad-ranging literature review intended to identify, frame, and assess relevant issues concerning effective out-of-school-time (OST) programs. Drawing on recent studies the authors identify and address the level of demand for OST services, the effectiveness of offerings, what constitutes quality in OST programs, how to encourage participation, and how to build further community capacity. They make recommendations for improving the information used in policy making
    Abstract: Presents the findings of a broad-ranging literature review intended to identify, frame, and assess relevant issues concerning effective out-of-school-time (OST) programs. Drawing on recent studies the authors identify and address the level of demand for OST services, the effectiveness of offerings, what constitutes quality in OST programs, how to encourage participation, and how to build further community capacity. They make recommendations for improving the information used in policy making
    Note: Includes bibliographical references (pages 115-127) and index
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    Santa Monica, CA : Rand Corp
    ISBN: 9780833040701 , 0833040707 , 9780833037602 , 0833040693 , 9781282283022 , 1282283022 , 9780833040695 , 0833037609
    Language: English
    Pages: 1 Online-Ressource (xxiv, 101 pages)
    Parallel Title: Print version Bower, Anthony G Diffusion and value of healthcare information technology
    DDC: 610/.28
    Keywords: Medicine Information technology ; Evaluation ; Medicine Information technology ; Government policy ; Medical records Data processing ; Cost effectiveness ; Diffusion of innovations ; Medicine ; Medicine ; Medical records ; Diffusion of innovations ; Medical Records Systems, Computerized utilization ; TECHNOLOGY & ENGINEERING ; Biomedical ; MEDICAL ; Family & General Practice ; MEDICAL ; Allied Health Services ; Medical Technology ; MEDICAL ; Biotechnology ; MEDICAL ; Lasers in Medicine ; Diffusion of innovations ; United States ; Electronic books
    Abstract: This report characterizes the diffusion of use of electronic health records (EHRs). The author uses a series of interviews and surveys and an extensive literature review to investigate whether healthcare can duplicate the gains enabled by information technology seen in a number of prominent industries. To accomplish this, the report answers the following questions: What is the current diffusion of health information technology, especially EHR systems? How does EHR diffusion compare to innovations in other industries? What is such diffusion worth to society? And, what should the government do, if anything, to speed the adoption of EHR systems? The author finds that EHRs are diffusing at a rate consistent with other similar information technologies in other industries-rapidly in many segments of the healthcare industry yet more slowly in physicians' offices. Labor productivity increases are being seen and speeding adoption may be beneficial. The author provides a broad list of possible policy options that may be suitable for further study: Coordinate EHR standards immediately; work to improve quality measurement to encourage adoption and thereby alleviate the dauntingly labor-intensive process of quality management by using automation; reduce network externalities to encourage more, and more effective, adoption of EHR; encourage vigorous competition and deregulation; encourage firms to use health information technology as a competitive weapon; decide whether EHR is a societal goal and, if it is, provide subsidies; encourage government intervention in an incremental way, with rapid review of results to evaluate policies and strategies and adapt quickly
    Abstract: This report characterizes the diffusion of use of electronic health records (EHRs). The author uses a series of interviews and surveys and an extensive literature review to investigate whether healthcare can duplicate the gains enabled by information technology seen in a number of prominent industries. To accomplish this, the report answers the following questions: What is the current diffusion of health information technology, especially EHR systems? How does EHR diffusion compare to innovations in other industries? What is such diffusion worth to society? And, what should the government do, if anything, to speed the adoption of EHR systems? The author finds that EHRs are diffusing at a rate consistent with other similar information technologies in other industries-rapidly in many segments of the healthcare industry yet more slowly in physicians' offices. Labor productivity increases are being seen and speeding adoption may be beneficial. The author provides a broad list of possible policy options that may be suitable for further study: Coordinate EHR standards immediately; work to improve quality measurement to encourage adoption and thereby alleviate the dauntingly labor-intensive process of quality management by using automation; reduce network externalities to encourage more, and more effective, adoption of EHR; encourage vigorous competition and deregulation; encourage firms to use health information technology as a competitive weapon; decide whether EHR is a societal goal and, if it is, provide subsidies; encourage government intervention in an incremental way, with rapid review of results to evaluate policies and strategies and adapt quickly
    Note: "MG-272 , "Prepared for Cerner, General Electric, Hewlett Packard, Johnson & Johnson, and Xerox , Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...