top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Air power as a coercive instrument / / Daniel L. Byman, Matthew C. Waxman, Eric Larson
Air power as a coercive instrument / / Daniel L. Byman, Matthew C. Waxman, Eric Larson
Autore Byman Daniel <1967->
Pubbl/distr/stampa Santa Monica, CA, : Rand, 1999
Descrizione fisica 1 online resource (193 p.)
Disciplina 358.4/14/0973
Altri autori (Persone) LarsonEric V <1957-> (Eric Victor)
WaxmanMatthew C. <1972->
Soggetto topico Air power - United States
Air power
Military planning - United States
ISBN 1-282-45109-X
9786612451096
0-8330-4828-7
0-585-24548-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgements; Chapter One - Introduction; Coercion and U.S. National Security Policy; The Role of the USAF; Methodology and Cases Examined; Organization; Part 1. Definitions and Theory; Chapter Two - How to Think About Coercion; Definitions; A Theoretical Starting Point; Thinking about Coercion: a Policymaker's Perspective; Problem One: Limited Relevance; Problem Two: Measurement Pathologies; The Uncertain Meaning of "Success"; Conclusions; Part 2. Successful Coercive Diplomacy: Lessons from the Past
Chapter Three - Explaining Success or Failure: the Historical Record Conditions for Successful Coercion; Escalation Dominance; Threatening to Defeat an Adversary's Strategy; Coercion in Context: Magnifying Third-Party Threats; Common Challenges in Coercive Operations; Intelligence and Estimation Challenges; Misperceptions and Coercion; Credibility Challenges; Feasibility Challenges; Conclusions; Part 3. Coercive Diplomacy Today; Chapter Four - Domestic Constraints on Coercion; Domestic Politics and the Success of Coercive Diplomacy; Constraints and the Democratic System
The Challenge of Obtaining Domestic Support Consequences of Low Support; Sources of Domestic Constraints; Declaratory Policy; Congressional Checks and Balances, and Other Restrictions; The Press; Some Correlates of Public Support; Some Conditions Under Which Support Is Typically High; How an Adversary can Exploit U.S. Domestic Politics; Diminishing the Interests; Tarnishing the Cause and Conduct of the Operation; Dragging Out a Conflict; Imposing Costs; Manipulating Asymmetries in Escalation Preferences; Conclusions; Chapter Five - Coercion and Coalitions
The Advantages of Coalitions for Coercers Limits Imposed by Coalitions; Lack of a Common Agenda; Shared Control; Limits to Escalation; Reduced Credibility; Coalitions and Adversary Counter-Coercion; Conclusions; Chapter Six - Coercing Nonstate Actors: a Challenge for the Future; Types of Missions; Coercing Local Warlords; Coercing State Sponsors; Characteristics of Coercive Operations Against Nonstate Actors; Nonstate Adversaries May Lack Identifiable and Targetable Assets; Inaccurate Intelligence Estimates Are Particularly Common; Nonstate Adversaries May Lack Control over Constituent Elements
Indirect Coercion Is Often Difficult, Unreliable, and Counterproductive Nonstate Actors Are Adept at Exploiting Countermeasures to Coercion; Conclusions; Part 4. Coercion and the U.S. Air Force; Chapter Seven - Implications and Recommendations for the USAF; Air Power and Escalation Dominance; Air Power and Adversary Military Operations; Air Power and the Magnification of Third-Party Threats; Air Power and Common Challenges in Coercive Operations; The Need for Restraint; Appendix A - Cases Examined for this Study; Appendix B - Cases and Conditions for Success
Appendix C - Coercive Attempts and Common Challenges
Record Nr. UNINA-9910219991503321
Byman Daniel <1967->  
Santa Monica, CA, : Rand, 1999
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Assessing irregular warfare : a framework for intelligence analysis / / Eric V. Larson ... [et al.]
Assessing irregular warfare : a framework for intelligence analysis / / Eric V. Larson ... [et al.]
Pubbl/distr/stampa Santa Monica, CA, : RAND Arroyo Center, 2008
Descrizione fisica 1 online resource (87 p.)
Disciplina 355.3/432
Altri autori (Persone) LarsonEric V <1957-> (Eric Victor)
Collana Rand Corporation monograph series
Soggetto topico Military intelligence - United States
Asymmetric warfare
ISBN 1-282-08159-4
9786612081590
0-8330-4702-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; CHAPTER ONE- Introduction; Background to the Study; Study Aims and Analytic Approach; Organization of This Monograph; CHAPTER TWO- Defining Irregular Warfare; A Review of Recent Efforts to Define Irregular Warfare; Irregular Warfare Operation Types; Irregular Warfare Common Logical Lines of Operation; Chapter Conclusions; CHAPTER THREE- A Framework for Assessing Irregular Warfare; Population-Centric Irregular Warfare Operations; Counterterrorism Operations; Comparison to the Standard IPB Process
Chapter ConclusionsCHAPTER FOUR- Conclusions; APPENDIX A- A Review of Defense Policy, Strategy, and Irregular Warfare; APPENDIX B- Irregular Warfare Analysis Doctrinal References; References
Record Nr. UNINA-9910219984503321
Santa Monica, CA, : RAND Arroyo Center, 2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The economic costs and implications of high-technology hardware theft [[electronic resource] /] / James N. Dertouzos, Eric V. Larson, Patricia A. Ebener
The economic costs and implications of high-technology hardware theft [[electronic resource] /] / James N. Dertouzos, Eric V. Larson, Patricia A. Ebener
Autore Dertouzos James N. <1950->
Pubbl/distr/stampa Santa Monica, CA, : Rand, 1999
Descrizione fisica 1 online resource (74 p.)
Altri autori (Persone) LarsonEric V <1957-> (Eric Victor)
EbenerPatricia A <1949-> (Patricia Anne)
Soggetto topico Computer crimes - Costs
Data protection - Costs
High technology industries - Security measures - Costs
Soggetto genere / forma Electronic books.
ISBN 0-8330-4340-4
0-585-24767-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto ""PREFACE""; ""FIGURES""; ""TABLES""; ""EXECUTIVE SUMMARY""; ""OVERVIEW""; ""STUDY METHODS""; ""SUMMARY OF FINDINGS Direct Costs of Hardware Theft Are Almost 250 Million""; ""Magnitude of Indirect Losses Exceeds That of Direct Losses by a Factor Greater Than Five""; ""Industry Losses Include Cost of Thefts from Business Customers""; ""Total Losses Could Exceed 5 Billion""; ""Industry and Customers Share the Price of High-Tech Losses""; ""Firms Don�t Have the Correct Incentives to Invest in Security Measures""; ""There Has Been a Significant Decline in Hardware Theft""
""POLICY IMPLICATIONS FOR FIRMS, INDUSTRY, AND THE PUBLIC SECTOR""""ACKNOWLEDGMENTS""; ""ACRONYMS""; ""INTRODUCTION""; ""BACKGROUND""; ""THE MANY DIMENSIONS OF HIGH-TECH HARDWARE THEFT""; ""METHOD""; ""ORGANIZATION OF THIS REPORT""; ""THE DIRECT COSTS OF HIGH-TECH HARDWARE THEFT""; ""ESTIMATE OF INDUSTRY DIRECT LOSSES""; ""KEY PATTERNS IN THE LOSS DATA""; ""Losses by Value""; ""Losses by Product Category""; ""Thefts by Incident Scenario""; ""Geographic Patterns""; ""Location of Thefts""; ""PREDICTING COMPANY LOSS EXPERIENCES""; ""THE INDIRECT COSTS OF HIGH-TECH HARDWARE THEFT""
""DISPLACED DEMAND, OR LOST SALES""""SECURITY INVESTMENTS AND INSURANCE""; ""PRICING INCREASES DUE TO INCREASED COSTS""; ""EFFECTS ON MANUFACTURERS OF THEFTS FROM FINAL BUSINESS CUSTOMERS""; ""SIMULATING THE EFFECTS OF INDIRECT COSTS""; ""SECOND-ORDER EFFECTS OF HARDWARE THEFT""; ""RETURNS ON SECURITY INVESTMENTS""; ""SUMMARY OF FINDINGS AND POLICY CONCLUSIONS""; ""SUMMARY OF FINDINGS""; ""POLICY CONCLUSIONS Policy Implications for Firms""; ""Policy Implications for Industry""; ""Policy Implications for Society""
""OVERVIEW OF THEFT INCIDENT REPORTING SYSTEM (TIRS) AND DATA COLLECTION PROTOCOLS""""RECRUITMENT, PARTICIPATION, AND VALIDATION""; ""THE THEFT INCIDENT REPORTING SYSTEM DATA COLLECTION INSTRUMENT""; ""Incident Report Variables and Codes""; ""MERCHANDISE REPORT VARIABLES AND CODES""; ""OPERATIONS""; ""CASE STUDY PROTOCOL""; ""MODELS OF THE INDIRECT COSTS OF THEFT""; ""STATISTICAL ANALYSIS OF LOSS PATTERNS""; ""BIBLIOGRAPHY""
Record Nr. UNINA-9910455170503321
Dertouzos James N. <1950->  
Santa Monica, CA, : Rand, 1999
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The economic costs and implications of high-technology hardware theft [[electronic resource] /] / James N. Dertouzos, Eric V. Larson, Patricia A. Ebener
The economic costs and implications of high-technology hardware theft [[electronic resource] /] / James N. Dertouzos, Eric V. Larson, Patricia A. Ebener
Autore Dertouzos James N. <1950->
Pubbl/distr/stampa Santa Monica, CA, : Rand, 1999
Descrizione fisica 1 online resource (74 p.)
Altri autori (Persone) LarsonEric V <1957-> (Eric Victor)
EbenerPatricia A <1949-> (Patricia Anne)
Soggetto topico Computer crimes - Costs
Data protection - Costs
High technology industries - Security measures - Costs
ISBN 0-8330-4340-4
0-585-24767-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto ""PREFACE""; ""FIGURES""; ""TABLES""; ""EXECUTIVE SUMMARY""; ""OVERVIEW""; ""STUDY METHODS""; ""SUMMARY OF FINDINGS Direct Costs of Hardware Theft Are Almost 250 Million""; ""Magnitude of Indirect Losses Exceeds That of Direct Losses by a Factor Greater Than Five""; ""Industry Losses Include Cost of Thefts from Business Customers""; ""Total Losses Could Exceed 5 Billion""; ""Industry and Customers Share the Price of High-Tech Losses""; ""Firms Don�t Have the Correct Incentives to Invest in Security Measures""; ""There Has Been a Significant Decline in Hardware Theft""
""POLICY IMPLICATIONS FOR FIRMS, INDUSTRY, AND THE PUBLIC SECTOR""""ACKNOWLEDGMENTS""; ""ACRONYMS""; ""INTRODUCTION""; ""BACKGROUND""; ""THE MANY DIMENSIONS OF HIGH-TECH HARDWARE THEFT""; ""METHOD""; ""ORGANIZATION OF THIS REPORT""; ""THE DIRECT COSTS OF HIGH-TECH HARDWARE THEFT""; ""ESTIMATE OF INDUSTRY DIRECT LOSSES""; ""KEY PATTERNS IN THE LOSS DATA""; ""Losses by Value""; ""Losses by Product Category""; ""Thefts by Incident Scenario""; ""Geographic Patterns""; ""Location of Thefts""; ""PREDICTING COMPANY LOSS EXPERIENCES""; ""THE INDIRECT COSTS OF HIGH-TECH HARDWARE THEFT""
""DISPLACED DEMAND, OR LOST SALES""""SECURITY INVESTMENTS AND INSURANCE""; ""PRICING INCREASES DUE TO INCREASED COSTS""; ""EFFECTS ON MANUFACTURERS OF THEFTS FROM FINAL BUSINESS CUSTOMERS""; ""SIMULATING THE EFFECTS OF INDIRECT COSTS""; ""SECOND-ORDER EFFECTS OF HARDWARE THEFT""; ""RETURNS ON SECURITY INVESTMENTS""; ""SUMMARY OF FINDINGS AND POLICY CONCLUSIONS""; ""SUMMARY OF FINDINGS""; ""POLICY CONCLUSIONS Policy Implications for Firms""; ""Policy Implications for Industry""; ""Policy Implications for Society""
""OVERVIEW OF THEFT INCIDENT REPORTING SYSTEM (TIRS) AND DATA COLLECTION PROTOCOLS""""RECRUITMENT, PARTICIPATION, AND VALIDATION""; ""THE THEFT INCIDENT REPORTING SYSTEM DATA COLLECTION INSTRUMENT""; ""Incident Report Variables and Codes""; ""MERCHANDISE REPORT VARIABLES AND CODES""; ""OPERATIONS""; ""CASE STUDY PROTOCOL""; ""MODELS OF THE INDIRECT COSTS OF THEFT""; ""STATISTICAL ANALYSIS OF LOSS PATTERNS""; ""BIBLIOGRAPHY""
Record Nr. UNINA-9910778964103321
Dertouzos James N. <1950->  
Santa Monica, CA, : Rand, 1999
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Understanding commanders' information needs for influence operations / / Eric V. Larson ... [et al.]
Understanding commanders' information needs for influence operations / / Eric V. Larson ... [et al.]
Edizione [1st ed.]
Pubbl/distr/stampa Santa Monica, CA, : RAND, 2009
Descrizione fisica 1 online resource (165 p.)
Disciplina 355.4/1
Altri autori (Persone) LarsonEric V <1957-> (Eric Victor)
Collana Rand Corporation monograph series
Soggetto topico Generals - United States - Information services
Command of troops
Influence (Psychology)
Information warfare - United States
Combined operations (Military science)
ISBN 0-8330-4936-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; CHAPTER ONE - Introduction; Defining Terms; Study Tasks and Analytic Approach; Organization of This Monograph; CHAPTER TWO - Commanders' Information Needs for Influence Operations; Insights from Structured Conversations with Commanders; Insights from Recent Papers by Senior Commanders; Insights from Case Study Analyses; Insights from the National Training Center; Insights from 1st Information Operations Command; Observations from Unified Quest 2006
Insights from a Review of Doctrine, Tactics, Techniques, and Procedures, and Task Lists Chapter Conclusions; CHAPTER THREE - Sources of Commanders' Information Needs; Commanders' Guidance; The Operating Environment and Information Domain; Resources Available to the Commander; Chapter Conclusions; CHAPTER FOUR - Remaining Challenges; Vertical Coordination and Echelonment; Horizontal Coordination Across Areas of Operation; Ensuring Continuity in Transitions; Overcoming Doctrinal Stovepiping of Information Operations; APPENDIX A - Identified Information Requirements for Influence Operations
APPENDIX B - Task List AnalysisAPPENDIX C - A Metrics-Based Planning and Assessment Approach for Influence Operations; APPENDIX D - Assessment of Expected Utility Modeling for Influence Operations; APPENDIX E - Assessment of Social Network Analysis for Influence Operations; References
Record Nr. UNINA-9910220079703321
Santa Monica, CA, : RAND, 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui