Air power as a coercive instrument / / Daniel L. Byman, Matthew C. Waxman, Eric Larson |
Autore | Byman Daniel <1967-> |
Pubbl/distr/stampa | Santa Monica, CA, : Rand, 1999 |
Descrizione fisica | 1 online resource (193 p.) |
Disciplina | 358.4/14/0973 |
Altri autori (Persone) |
LarsonEric V <1957-> (Eric Victor)
WaxmanMatthew C. <1972-> |
Soggetto topico |
Air power - United States
Air power Military planning - United States |
ISBN |
1-282-45109-X
9786612451096 0-8330-4828-7 0-585-24548-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgements; Chapter One - Introduction; Coercion and U.S. National Security Policy; The Role of the USAF; Methodology and Cases Examined; Organization; Part 1. Definitions and Theory; Chapter Two - How to Think About Coercion; Definitions; A Theoretical Starting Point; Thinking about Coercion: a Policymaker's Perspective; Problem One: Limited Relevance; Problem Two: Measurement Pathologies; The Uncertain Meaning of "Success"; Conclusions; Part 2. Successful Coercive Diplomacy: Lessons from the Past
Chapter Three - Explaining Success or Failure: the Historical Record Conditions for Successful Coercion; Escalation Dominance; Threatening to Defeat an Adversary's Strategy; Coercion in Context: Magnifying Third-Party Threats; Common Challenges in Coercive Operations; Intelligence and Estimation Challenges; Misperceptions and Coercion; Credibility Challenges; Feasibility Challenges; Conclusions; Part 3. Coercive Diplomacy Today; Chapter Four - Domestic Constraints on Coercion; Domestic Politics and the Success of Coercive Diplomacy; Constraints and the Democratic System The Challenge of Obtaining Domestic Support Consequences of Low Support; Sources of Domestic Constraints; Declaratory Policy; Congressional Checks and Balances, and Other Restrictions; The Press; Some Correlates of Public Support; Some Conditions Under Which Support Is Typically High; How an Adversary can Exploit U.S. Domestic Politics; Diminishing the Interests; Tarnishing the Cause and Conduct of the Operation; Dragging Out a Conflict; Imposing Costs; Manipulating Asymmetries in Escalation Preferences; Conclusions; Chapter Five - Coercion and Coalitions The Advantages of Coalitions for Coercers Limits Imposed by Coalitions; Lack of a Common Agenda; Shared Control; Limits to Escalation; Reduced Credibility; Coalitions and Adversary Counter-Coercion; Conclusions; Chapter Six - Coercing Nonstate Actors: a Challenge for the Future; Types of Missions; Coercing Local Warlords; Coercing State Sponsors; Characteristics of Coercive Operations Against Nonstate Actors; Nonstate Adversaries May Lack Identifiable and Targetable Assets; Inaccurate Intelligence Estimates Are Particularly Common; Nonstate Adversaries May Lack Control over Constituent Elements Indirect Coercion Is Often Difficult, Unreliable, and Counterproductive Nonstate Actors Are Adept at Exploiting Countermeasures to Coercion; Conclusions; Part 4. Coercion and the U.S. Air Force; Chapter Seven - Implications and Recommendations for the USAF; Air Power and Escalation Dominance; Air Power and Adversary Military Operations; Air Power and the Magnification of Third-Party Threats; Air Power and Common Challenges in Coercive Operations; The Need for Restraint; Appendix A - Cases Examined for this Study; Appendix B - Cases and Conditions for Success Appendix C - Coercive Attempts and Common Challenges |
Record Nr. | UNINA-9910219991503321 |
Byman Daniel <1967->
![]() |
||
Santa Monica, CA, : Rand, 1999 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Assessing irregular warfare : a framework for intelligence analysis / / Eric V. Larson ... [et al.] |
Pubbl/distr/stampa | Santa Monica, CA, : RAND Arroyo Center, 2008 |
Descrizione fisica | 1 online resource (87 p.) |
Disciplina | 355.3/432 |
Altri autori (Persone) | LarsonEric V <1957-> (Eric Victor) |
Collana | Rand Corporation monograph series |
Soggetto topico |
Military intelligence - United States
Asymmetric warfare |
ISBN |
1-282-08159-4
9786612081590 0-8330-4702-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; CHAPTER ONE- Introduction; Background to the Study; Study Aims and Analytic Approach; Organization of This Monograph; CHAPTER TWO- Defining Irregular Warfare; A Review of Recent Efforts to Define Irregular Warfare; Irregular Warfare Operation Types; Irregular Warfare Common Logical Lines of Operation; Chapter Conclusions; CHAPTER THREE- A Framework for Assessing Irregular Warfare; Population-Centric Irregular Warfare Operations; Counterterrorism Operations; Comparison to the Standard IPB Process
Chapter ConclusionsCHAPTER FOUR- Conclusions; APPENDIX A- A Review of Defense Policy, Strategy, and Irregular Warfare; APPENDIX B- Irregular Warfare Analysis Doctrinal References; References |
Record Nr. | UNINA-9910219984503321 |
Santa Monica, CA, : RAND Arroyo Center, 2008 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
The economic costs and implications of high-technology hardware theft [[electronic resource] /] / James N. Dertouzos, Eric V. Larson, Patricia A. Ebener |
Autore | Dertouzos James N. <1950-> |
Pubbl/distr/stampa | Santa Monica, CA, : Rand, 1999 |
Descrizione fisica | 1 online resource (74 p.) |
Altri autori (Persone) |
LarsonEric V <1957-> (Eric Victor)
EbenerPatricia A <1949-> (Patricia Anne) |
Soggetto topico |
Computer crimes - Costs
Data protection - Costs High technology industries - Security measures - Costs |
Soggetto genere / forma | Electronic books. |
ISBN |
0-8330-4340-4
0-585-24767-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
""PREFACE""; ""FIGURES""; ""TABLES""; ""EXECUTIVE SUMMARY""; ""OVERVIEW""; ""STUDY METHODS""; ""SUMMARY OF FINDINGS Direct Costs of Hardware Theft Are Almost 250 Million""; ""Magnitude of Indirect Losses Exceeds That of Direct Losses by a Factor Greater Than Five""; ""Industry Losses Include Cost of Thefts from Business Customers""; ""Total Losses Could Exceed 5 Billion""; ""Industry and Customers Share the Price of High-Tech Losses""; ""Firms Don�t Have the Correct Incentives to Invest in Security Measures""; ""There Has Been a Significant Decline in Hardware Theft""
""POLICY IMPLICATIONS FOR FIRMS, INDUSTRY, AND THE PUBLIC SECTOR""""ACKNOWLEDGMENTS""; ""ACRONYMS""; ""INTRODUCTION""; ""BACKGROUND""; ""THE MANY DIMENSIONS OF HIGH-TECH HARDWARE THEFT""; ""METHOD""; ""ORGANIZATION OF THIS REPORT""; ""THE DIRECT COSTS OF HIGH-TECH HARDWARE THEFT""; ""ESTIMATE OF INDUSTRY DIRECT LOSSES""; ""KEY PATTERNS IN THE LOSS DATA""; ""Losses by Value""; ""Losses by Product Category""; ""Thefts by Incident Scenario""; ""Geographic Patterns""; ""Location of Thefts""; ""PREDICTING COMPANY LOSS EXPERIENCES""; ""THE INDIRECT COSTS OF HIGH-TECH HARDWARE THEFT"" ""DISPLACED DEMAND, OR LOST SALES""""SECURITY INVESTMENTS AND INSURANCE""; ""PRICING INCREASES DUE TO INCREASED COSTS""; ""EFFECTS ON MANUFACTURERS OF THEFTS FROM FINAL BUSINESS CUSTOMERS""; ""SIMULATING THE EFFECTS OF INDIRECT COSTS""; ""SECOND-ORDER EFFECTS OF HARDWARE THEFT""; ""RETURNS ON SECURITY INVESTMENTS""; ""SUMMARY OF FINDINGS AND POLICY CONCLUSIONS""; ""SUMMARY OF FINDINGS""; ""POLICY CONCLUSIONS Policy Implications for Firms""; ""Policy Implications for Industry""; ""Policy Implications for Society"" ""OVERVIEW OF THEFT INCIDENT REPORTING SYSTEM (TIRS) AND DATA COLLECTION PROTOCOLS""""RECRUITMENT, PARTICIPATION, AND VALIDATION""; ""THE THEFT INCIDENT REPORTING SYSTEM DATA COLLECTION INSTRUMENT""; ""Incident Report Variables and Codes""; ""MERCHANDISE REPORT VARIABLES AND CODES""; ""OPERATIONS""; ""CASE STUDY PROTOCOL""; ""MODELS OF THE INDIRECT COSTS OF THEFT""; ""STATISTICAL ANALYSIS OF LOSS PATTERNS""; ""BIBLIOGRAPHY"" |
Record Nr. | UNINA-9910455170503321 |
Dertouzos James N. <1950->
![]() |
||
Santa Monica, CA, : Rand, 1999 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
The economic costs and implications of high-technology hardware theft [[electronic resource] /] / James N. Dertouzos, Eric V. Larson, Patricia A. Ebener |
Autore | Dertouzos James N. <1950-> |
Pubbl/distr/stampa | Santa Monica, CA, : Rand, 1999 |
Descrizione fisica | 1 online resource (74 p.) |
Altri autori (Persone) |
LarsonEric V <1957-> (Eric Victor)
EbenerPatricia A <1949-> (Patricia Anne) |
Soggetto topico |
Computer crimes - Costs
Data protection - Costs High technology industries - Security measures - Costs |
ISBN |
0-8330-4340-4
0-585-24767-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
""PREFACE""; ""FIGURES""; ""TABLES""; ""EXECUTIVE SUMMARY""; ""OVERVIEW""; ""STUDY METHODS""; ""SUMMARY OF FINDINGS Direct Costs of Hardware Theft Are Almost 250 Million""; ""Magnitude of Indirect Losses Exceeds That of Direct Losses by a Factor Greater Than Five""; ""Industry Losses Include Cost of Thefts from Business Customers""; ""Total Losses Could Exceed 5 Billion""; ""Industry and Customers Share the Price of High-Tech Losses""; ""Firms Don�t Have the Correct Incentives to Invest in Security Measures""; ""There Has Been a Significant Decline in Hardware Theft""
""POLICY IMPLICATIONS FOR FIRMS, INDUSTRY, AND THE PUBLIC SECTOR""""ACKNOWLEDGMENTS""; ""ACRONYMS""; ""INTRODUCTION""; ""BACKGROUND""; ""THE MANY DIMENSIONS OF HIGH-TECH HARDWARE THEFT""; ""METHOD""; ""ORGANIZATION OF THIS REPORT""; ""THE DIRECT COSTS OF HIGH-TECH HARDWARE THEFT""; ""ESTIMATE OF INDUSTRY DIRECT LOSSES""; ""KEY PATTERNS IN THE LOSS DATA""; ""Losses by Value""; ""Losses by Product Category""; ""Thefts by Incident Scenario""; ""Geographic Patterns""; ""Location of Thefts""; ""PREDICTING COMPANY LOSS EXPERIENCES""; ""THE INDIRECT COSTS OF HIGH-TECH HARDWARE THEFT"" ""DISPLACED DEMAND, OR LOST SALES""""SECURITY INVESTMENTS AND INSURANCE""; ""PRICING INCREASES DUE TO INCREASED COSTS""; ""EFFECTS ON MANUFACTURERS OF THEFTS FROM FINAL BUSINESS CUSTOMERS""; ""SIMULATING THE EFFECTS OF INDIRECT COSTS""; ""SECOND-ORDER EFFECTS OF HARDWARE THEFT""; ""RETURNS ON SECURITY INVESTMENTS""; ""SUMMARY OF FINDINGS AND POLICY CONCLUSIONS""; ""SUMMARY OF FINDINGS""; ""POLICY CONCLUSIONS Policy Implications for Firms""; ""Policy Implications for Industry""; ""Policy Implications for Society"" ""OVERVIEW OF THEFT INCIDENT REPORTING SYSTEM (TIRS) AND DATA COLLECTION PROTOCOLS""""RECRUITMENT, PARTICIPATION, AND VALIDATION""; ""THE THEFT INCIDENT REPORTING SYSTEM DATA COLLECTION INSTRUMENT""; ""Incident Report Variables and Codes""; ""MERCHANDISE REPORT VARIABLES AND CODES""; ""OPERATIONS""; ""CASE STUDY PROTOCOL""; ""MODELS OF THE INDIRECT COSTS OF THEFT""; ""STATISTICAL ANALYSIS OF LOSS PATTERNS""; ""BIBLIOGRAPHY"" |
Record Nr. | UNINA-9910778964103321 |
Dertouzos James N. <1950->
![]() |
||
Santa Monica, CA, : Rand, 1999 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Understanding commanders' information needs for influence operations / / Eric V. Larson ... [et al.] |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Santa Monica, CA, : RAND, 2009 |
Descrizione fisica | 1 online resource (165 p.) |
Disciplina | 355.4/1 |
Altri autori (Persone) | LarsonEric V <1957-> (Eric Victor) |
Collana | Rand Corporation monograph series |
Soggetto topico |
Generals - United States - Information services
Command of troops Influence (Psychology) Information warfare - United States Combined operations (Military science) |
ISBN | 0-8330-4936-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; CHAPTER ONE - Introduction; Defining Terms; Study Tasks and Analytic Approach; Organization of This Monograph; CHAPTER TWO - Commanders' Information Needs for Influence Operations; Insights from Structured Conversations with Commanders; Insights from Recent Papers by Senior Commanders; Insights from Case Study Analyses; Insights from the National Training Center; Insights from 1st Information Operations Command; Observations from Unified Quest 2006
Insights from a Review of Doctrine, Tactics, Techniques, and Procedures, and Task Lists Chapter Conclusions; CHAPTER THREE - Sources of Commanders' Information Needs; Commanders' Guidance; The Operating Environment and Information Domain; Resources Available to the Commander; Chapter Conclusions; CHAPTER FOUR - Remaining Challenges; Vertical Coordination and Echelonment; Horizontal Coordination Across Areas of Operation; Ensuring Continuity in Transitions; Overcoming Doctrinal Stovepiping of Information Operations; APPENDIX A - Identified Information Requirements for Influence Operations APPENDIX B - Task List AnalysisAPPENDIX C - A Metrics-Based Planning and Assessment Approach for Influence Operations; APPENDIX D - Assessment of Expected Utility Modeling for Influence Operations; APPENDIX E - Assessment of Social Network Analysis for Influence Operations; References |
Record Nr. | UNINA-9910220079703321 |
Santa Monica, CA, : RAND, 2009 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|