Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • 1995-1999  (6)
  • Rand Corporation
Datasource
Language
Year
  • 1
    Journal/Serial
    Journal/Serial
    Santa Monica, Calif. ; Nachgewiesen 92.1949 -
    Language: Undetermined
    Dates of Publication: Nachgewiesen 92.1949 -
    Series Statement: Rand publications
    Former Title: Research memorandum
    Former Title: Memorandum
    DDC: 600
    Keywords: Monografische Reihe
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 0585247706 , 9780585247700
    Language: English
    Pages: xv, 37, 18 p , ill , 28 cm
    Edition: Boulder, Colo NetLibrary 2000 Online-Ressource E-Books von NetLibrary
    Series Statement: EBSCOhost eBook Collection
    Parallel Title: Erscheint auch als Ebener, Patricia A. (Patricia Anne), 1949- Welfare reform in California
    Keywords: California Work Opportunity and Responsibility to Kids (Program) California Work Opportunity and Responsibility to Kids (Program) ; California Work Opportunity and Responsibility to Kids (Program) ; California Work Opportunity and Responsibility to Kids (Program) ; California Work Opportunity and Responsibility to Kids (Program) ; Welfare recipients Employment ; Public welfare ; Evaluation research (Social action programs) ; Welfare recipients Employment ; California ; Public welfare California ; Evaluation research (Social action programs) California ; California ; Welfare recipients Employment ; Public welfare ; Evaluation research (Social action programs) ; Welfare recipients Employment ; Public welfare ; Evaluation research (Social action programs) ; Public welfare ; Welfare recipients ; Employment ; SOCIAL SCIENCE ; Human Services ; Evaluation research (Social action programs) ; POLITICAL SCIENCE ; Public Policy ; Social Services & Welfare ; Sozialhilfe ; Sozialreform ; California ; Kalifornien ; Electronic books. ; Electronic books ; Electronic books. ; Electronic books ; Kalifornien ; Sozialreform ; Sozialhilfe ; Kalifornien ; Sozialreform ; Sozialhilfe
    Abstract: [v. 1. No special title] -- [v. 2.] Appendix
    Abstract: The California Work Opportunity and Responsibility to Kids (CalWORKs) program is California's response to the welfare reforms Congress set in motion in 1996. In late 1998, RAND conducted the first of three statewide surveys on CalWORKs implementation. Survey responses indicate that the counties have made significant administrative changes in welfare operations, in the structure and organization of their welfare departments and other agencies, in staffing, and in information systems. Many counties have completed planning activities and have fully operational program components. Most counties report no major implementation problems to date but anticipate problems in the future with cumulative lifetime limits and work requirements. A majority of counties agreed that environmental characteristics such as the job market, housing, and transportation have hindered implementation; interagency relationships, planning, and experience with welfare reform have facilitated it. Nearly all agree that special-needs child care and transportation are inadequate. Complete survey responses from the 58 counties are contained in a companion volume, MR-1052/1-CDSS
    Note: "MR-1052-CDSS"--Cover p. [4] , "Prepared for the California Department of Social Services." , Accompanied by: Appendix / Patricia A. Ebener, Elizabeth A. Roth, Jacob Alex Klerman. viii, 1159 p. : ill. ; 28 cm , Includes bibliographical references , Electronic reproduction, Boulder, Colo : NetLibrary, 2000
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Santa Monica, CA : Rand
    ISBN: 9780833026675 , 0833026674 , 0585239576 , 9780585239576 , 9780833032560 , 0833032569
    Language: English
    Pages: Online Ressource (xxi, 153 pages) , illustrations
    Edition: Online-Ausg.
    Parallel Title: Print version Countering the new terrorism
    DDC: 303.625
    Keywords: United States / Air Force Security measures ; United States / Air Force ; United States Security measures ; United States Security measures ; United States ; Terrorism Prevention ; United States ; Information warfare Prevention ; United States ; National security United States ; Air power United States ; National security ; Information warfare Prevention ; Air power ; Terrorism Prevention ; Information warfare Prevention ; National security ; Air power ; Terrorism Prevention ; Air power ; Information warfare ; Prevention ; Military policy ; National security ; Armed Forces ; Security measures ; Terrorism ; Prevention ; POLITICAL SCIENCE ; Political Freedom & Security ; Terrorism ; United States Military policy ; United States ; United States Military policy ; United States Military policy ; United States ; Electronic book ; Electronic books
    Abstract: The contours of terrorism are changing, and the new terrorism has more diverse sources, motivations, and tactics than the old. It is more lethal, global in reach, and characterized by network forms of organization. Terrorist sponsorship is becoming hazier and "privatized." The August 1998 terrorist bombings of U.S. embassies in Kenya and Tanzania fit in many ways the new mold. The chapters in this book trace the evolution of international terrorism against civilian and U.S. military targets, look ahead to where terrorism is going, and assess how it might be contained. Terrorism and counterterrorism are placed in strategic perspective, including how terrorism might be applied as an asymmetric strategy by less-capable adversaries. The report builds on a existing body of RAND research on terrorism and political violence, and makes extensive use of the RAND-St. Andrews Chronology of International Terrorism
    Note: "Prepared for the United States Air Force. - "Project Air Force. - "MR-989-AF"--Page 4 of cover. - Includes bibliographical references and index. - Description based on print version record , "Project Air Force , "MR-989-AF"--P. [4] of cover , Includes bibliographical references and index
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Santa Monica, Calif : Rand
    ISBN: 9780833048288 , 0833048287 , 9780833027436 , 0585245487 , 0833027433 , 9780585245485
    Language: English
    Pages: 1 Online-Ressource (xviii, 174 pages)
    Parallel Title: Print version Byman, Daniel, 1967- Air power as a coercive instrument
    Keywords: Military planning ; Air power ; Air power ; Military planning ; Air power ; Air power ; Air power ; Military planning ; United States ; Air power ; Military doctrine ; TECHNOLOGY & ENGINEERING ; Military Science ; Air Force ; Coercive force ; POLITICAL SCIENCE ; Security (National & International) ; Electronic books
    Abstract: Coercion--the use of threatened force to induce an adversary to change its behavior--is a critical function of the U.S. military. U.S. forces have recently fought in the Balkans, the Persian Gulf, and the Horn of Africa to compel recalcitrant regimes and warlords to stop repression, abandon weapons programs, permit humanitarian relief, and otherwise modify their actions. Yet despite its overwhelming military might, the United States often fails to coerce successfully. This report examines the phenomenon of coercion and how air power can contribute to its success. Three factors increase the likelihood of successful coercion: (1) the coercer's ability to raise the costs it imposes while denying the adversary the chance to respond (escalation dominance); (2) an ability to block an adversary's military strategy for victory; and (3) an ability to magnify third-party threats, such as internal instability or the danger posed by another enemy. Domestic political concerns (such as casualty sensitivity) and coalition dynamics often constrain coercive operations and impair the achievement of these conditions. Air power can deliver potent and credible threats that foster the above factors while neutralizing adversary countercoercive moves. When the favorable factors are absent, however, air power--or any other military instrument--will probably fail to coerce. Policymakers' use of coercive air power under inauspicious conditions diminishes the chances of using it elsewhere when the prospects of success would be greater
    Note: "Project Air Force, Rand , "MR-1061-AF , Includes bibliographical references (pages 161-174)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    ISBN: 9780833043337 , 0833043331 , 9780833026637 , 0585250073 , 0833026631 , 9780585250076
    Language: English
    Pages: 1 Online-Ressource (xxiii, 452 pages)
    Parallel Title: Print version Strategic appraisal
    Keywords: Military art and science Automation ; Military art and science ; Military art and science ; Automation ; POLITICAL SCIENCE ; Security (National & International) ; HISTORY ; Military ; Biological & Chemical Warfare ; Electronic books
    Abstract: Advances in information technology have led us to rely on easy communication and readily available information--both in our personal lives and in the life of our nation. For the most part, we have rightly welcomed these changes. But information that is readily available is available to friend and foe alike; a system that relies on communication can become useless if its ability to communicate is interfered with or destroyed. Because this reliance is so general, attacks on the information infrastructure can have widespread effects, both for the military and for society. And such attacks can come from a variety of sources, some difficult or impossible to identify. This, the third volume in the Strategic Appraisal series, draws on the expertise of researchers from across RAND to explore the opportunities and vulnerabilities inherent in the increasing reliance on information technology, looking both at its usefulness to the warrior and the need to protect its usefulness for everyone. The Strategic Appraisal series is intended to review, for a broad audience, issues bearing on national security and defense planning
    Note: "Prepared for the United State Air Force , "Project AIR FORCE , "Rand , Includes bibliographical references , Introduction , The American military enterprise in the information age , Right makes might : freedom and power in the information age , Networks, netwar, and information-age terrorism , Information and war : is it a revolution? , Information and warfare : new opportunities for U.S. military forces , U.S. military opportunities : information-warfare concepts of operation , The information revolution and psychological effects , U.S. strategic vulnerabilities : threats against society , Implications of information vulnerabilities for military operations , Military organization in the information age : lessons from the world of business , Arms control, export regimes, and multilateral cooperation , Ethics and information warfare , Defense in a weird world : protection, deterrence, and prevention , Conclusion : The changing role of information in warfare
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    ISBN: 9780833023520 , 0833048465 , 0833023527 , 9780833048462
    Language: English
    Pages: 1 Online-Ressource (xxiii, 90 pages)
    Edition: [S.l.] HathiTrust Digital Library 2010 Electronic reproduction
    Parallel Title: Print version Molander, Roger C Strategic information warfare
    Keywords: Information warfare ; Strategy ; Information warfare ; Strategy ; Strategy ; Information warfare ; TECHNOLOGY & ENGINEERING ; Military Science ; Electronic books
    Abstract: Future U.S. national security strategy is likely to be profoundly affected by the ongoing, rapid evolution of cyberspace--the global information infrastructure--and in particular by the growing dependence of the U.S. military and other national institutions and infrastructures on potentially vulnerable elements of the U.S. national information infrastructure. To examine these effects, the authors conducted a series of exercises employing a methodology known as the "Day After ..." in which participants are presented with an "information warfare crisis" scenario and asked to advise the president on possible responses. Participants included senior national security community members and representatives from security-related telecommunications and information-systems industries. The report synthesizes the exercise results and presents the instructions from the exercise materials in their entirety
    Note: Includes bibliographical references , Use copy Restrictions unspecified star MiAaHDL , Electronic reproduction , Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...