Aptitude for Destruction, Volume 1 [[electronic resource] ] : Organizational Learning in Terrorist Groups and Its Implications for Combating Terrorism |
Autore | Jackson Brian A. <1972-> |
Pubbl/distr/stampa | Santa Monica, : RAND Corporation, 2005 |
Descrizione fisica | 1 online resource (105 p.) |
Disciplina |
303.6/25
303.625 |
Altri autori (Persone) |
BakerJohn C. <1949->
ChalkPeter |
Soggetto topico |
Organizational learning
Terrorism -- Prevention -- Government policy Terrorists |
ISBN | 0-8330-4076-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Preface; Figures; Summary; Acknowledgments; Abbreviations and Acronyms; Chapter One - Introduction; About This Study; About This Report; Chapter Two - What is Organizational Learning?; Organizational Learning as a Four-Part Process; The Need to Combine Explicit and Tacit Knowledge; Different Forms of Organizational Learning; Chapter Three - The Need to Learn in Order to Change Effectively; Development, Improvement, and Employmentof New Weapons or Tactics; Improving Skills with Current Weapons or Tactics; Collecting and Utilizing Intelligence Information
Thwarting Efforts to Combat Terrorist ActivitiesPreserving Organizational Capabilities Despite the Lossof Group Members; Chapter Four - How Understanding Terrorist Group Learning Can Aid in Combating Terrorism; Detecting Terrorist Groups' Efforts to Change; Anticipating the Outcome of Terrorist Groups' Efforts to Change; Acting More Effectively to Thwart Terrorist Efforts; Chapter Five - Limitations of an Organizational-Learning-Based Approach for Analysis and Operational Planning in Combating Terrorism; The Need to Understand Terrorist Group Structureand Membership Lack of Data on Terrorist Group Learning ProcessesThe Nature of Learning Models; Difficulties in Measuring the Results of Learning; Understanding the Contribution of Learning Ability toSpecific Terrorist Operations; Chapter Six - Conclusions; Assessing the Threat Posed by Individual Terrorist Groupsand Understanding Their Behavior; Developing and Implementing Effective Counterstrategies; Allocating Resources and Developing Metrics to Assessthe Effectiveness of Efforts to Combat Terrorism; Concluding Remarks; Appendix - Overview of the Case Study Groups; References |
Record Nr. | UNINA-9910219988003321 |
Jackson Brian A. <1972-> | ||
Santa Monica, : RAND Corporation, 2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Aptitude for Destruction, Volume 2 [[electronic resource] ] : Case Studies of Organizational Learning in Five Terrorist Groups |
Autore | Jackson Brian A. <1972-> |
Pubbl/distr/stampa | Santa Monica, : RAND Corporation, 2005 |
Descrizione fisica | 1 online resource (215 p.) |
Disciplina |
303.6/25
303.625 |
Altri autori (Persone) |
BakerJohn C. <1949->
ChalkPeter |
Soggetto topico |
Organizational learning
Terrorism -- Prevention -- Government policy Terrorists |
ISBN | 0-8330-4077-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Cover; Preface; Preface; Figures and Tables; Figures and Tables; Acknowledgments; Acknowledgments; Abbreviations and Acronyms; Abbreviations and Acronyms; Chapter One - Introduction; Chapter One - Introduction; The Need to Both Describe and Explain Learning; The Need to Both Describe and Explain Learning; About This Study; About This Study; About This Report; About This Report; References; References; Part I: Case Studies - Prologue; Part I: Case Studies - Prologue; Chapter Two - Aum Shinrikyo; Chapter Two - Aum Shinrikyo; Introduction; Introduction; Background; Background
Operations and Tactics Operations and Tactics; Training; Training; Logistics; Logistics; Intelligence and Operational Security; Intelligence and Operational Security; Conclusions; Conclusions; References; References; Chapter Three - Hizballah, the Party of God; Chapter Three - Hizballah, the Party of God; Introduction; Introduction; Background; Background; Operations and Tactics; Operations and Tactics; Training; Training; Logistics; Logistics; Intelligence and Operational Security; Intelligence and Operational Security; Conclusions; Conclusions; References; References Chapter Four - Jemaah Islamiyah Chapter Four - Jemaah Islamiyah; Introduction; Introduction; Background; Background; Operations and Tactics; Operations and Tactics; Training; Training; Logistics; Logistics; Intelligence and Operational Security; Intelligence and Operational Security; Conclusions; Conclusions; References; References; Chapter Five - Provisional Irish Republican Army; Chapter Five - Provisional Irish Republican Army; Introduction; Introduction; Background; Background; Operations and Tactics; Operations and Tactics; Training; Training; Logistics; Logistics Intelligence and Operational Security Intelligence and Operational Security; Conclusions; Conclusions; References; References; Chapter Six - The Radical Environmentalist Movement; Chapter Six - The Radical Environmentalist Movement; Introduction; Introduction; Background; Background; Operations and Tactics; Operations and Tactics; Training; Training; Intelligence and Operational Security; Intelligence and Operational Security; Conclusions; Conclusions; References; References; Part II: Theory and Application - Prologue; Part II: Theory and Application - Prologue Chapter Seven - Theory: Organizational Learning as a Four-Component Process Chapter Seven - Theory: Organizational Learning as a Four-Component Process; Acquisition; Acquisition; Interpretation; Interpretation; Distribution; Distribution; Storage; Storage; References; References; Chapter Eight - Application: The four Components of Organizational Learning in the Case Study Groups; Chapter Eight - Application: The four Components of Organizational Learning in the Case Study Groups; Acquisition; Acquisition; Interpretation; Interpretation; Distribution; Distribution; Storage; Storage Chapter Nine - Concluding Observations |
Record Nr. | UNINA-9910219984703321 |
Jackson Brian A. <1972-> | ||
Santa Monica, : RAND Corporation, 2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cooperative monitoring in the South China Sea [[electronic resource] ] : satellite imagery, confidence-building measures, and the Spratly Islands disputes / / edited by John C. Baker and David G. Wiencek ; foreword by Richard H. Solomon |
Pubbl/distr/stampa | Westport, Conn., : Praeger, 2002 |
Descrizione fisica | 1 online resource (238 p.) |
Disciplina | 341.4/2 |
Altri autori (Persone) |
BakerJohn C. <1949->
WiencekDavid G. <1958-> |
Soggetto topico |
Confidence and security building measures (International relations) - Technological innovations
Conflict management |
Soggetto genere / forma | Electronic books. |
ISBN |
1-280-31508-3
9786610315086 0-313-01069-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Contents; Tables; Figures; Foreword; Abbreviations; 1 Introduction; 2 The Spratly Islands Dispute: Legal Issues and Prospects for Diplomatic Accommodation; 3 Energy Issues in the South China Sea Region; 4 Security Risks of a South China Sea Conflict; 5 Commercial Observation Satellites for Conflict Avoidance; 6 Cooperative Remote Monitoring in the South China Sea: Comparing the Utility of Aerial and Satellite Imagery; 7 Remote Sensing Capabilities and Experience Available to the South China Sea Littoral States; 8 A Cooperative Monitoring Regime for the South China Sea
9 Environmental Remote Sensing of the South China Sea10 Contemporary Maritime Piracy in Southeast Asia; 11 Conclusions; Appendix: Occupied Locations among the Spratly Islands, circa 2000; Recommended Readings; Index; About the Contributors |
Record Nr. | UNINA-9910456027403321 |
Westport, Conn., : Praeger, 2002 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cooperative monitoring in the South China Sea : satellite imagery, confidence-building measures, and the Spratly Islands disputes / / edited by John C. Baker and David G. Wiencek ; foreword by Richard H. Solomon |
Pubbl/distr/stampa | Westport, Conn. : , : Praeger, , 2002 |
Descrizione fisica | 1 online resource (xviii, 220 pages) : illustrations, 1 map |
Disciplina | 341.4/2 |
Altri autori (Persone) |
BakerJohn C. <1949->
WiencekDavid G. <1958-> |
Soggetto topico |
Confidence and security building measures (International relations) - Technological innovations
Conflict management |
ISBN |
1-280-31508-3
9786610315086 0-313-01069-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Contents; Tables; Figures; Foreword; Abbreviations; 1 Introduction; 2 The Spratly Islands Dispute: Legal Issues and Prospects for Diplomatic Accommodation; 3 Energy Issues in the South China Sea Region; 4 Security Risks of a South China Sea Conflict; 5 Commercial Observation Satellites for Conflict Avoidance; 6 Cooperative Remote Monitoring in the South China Sea: Comparing the Utility of Aerial and Satellite Imagery; 7 Remote Sensing Capabilities and Experience Available to the South China Sea Littoral States; 8 A Cooperative Monitoring Regime for the South China Sea
9 Environmental Remote Sensing of the South China Sea; 10 Contemporary Maritime Piracy in Southeast Asia; 11 Conclusions; Appendix: Occupied Locations among the Spratly Islands, circa 2000; Recommended Readings; Index; About the Contributors |
Record Nr. | UNINA-9910780256903321 |
Westport, Conn. : , : Praeger, , 2002 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cooperative monitoring in the South China Sea : satellite imagery, confidence-building measures, and the Spratly Islands disputes / / edited by John C. Baker and David G. Wiencek ; foreword by Richard H. Solomon |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Westport, Conn. : , : Praeger, , 2002 |
Descrizione fisica | 1 online resource (xviii, 220 pages) : illustrations, 1 map |
Disciplina | 341.4/2 |
Altri autori (Persone) |
BakerJohn C. <1949->
WiencekDavid G. <1958-> |
Soggetto topico |
Confidence and security building measures (International relations) - Technological innovations
Conflict management |
ISBN |
1-280-31508-3
9786610315086 0-313-01069-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Contents; Tables; Figures; Foreword; Abbreviations; 1 Introduction; 2 The Spratly Islands Dispute: Legal Issues and Prospects for Diplomatic Accommodation; 3 Energy Issues in the South China Sea Region; 4 Security Risks of a South China Sea Conflict; 5 Commercial Observation Satellites for Conflict Avoidance; 6 Cooperative Remote Monitoring in the South China Sea: Comparing the Utility of Aerial and Satellite Imagery; 7 Remote Sensing Capabilities and Experience Available to the South China Sea Littoral States; 8 A Cooperative Monitoring Regime for the South China Sea
9 Environmental Remote Sensing of the South China Sea; 10 Contemporary Maritime Piracy in Southeast Asia; 11 Conclusions; Appendix: Occupied Locations among the Spratly Islands, circa 2000; Recommended Readings; Index; About the Contributors |
Record Nr. | UNINA-9910814146703321 |
Westport, Conn. : , : Praeger, , 2002 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Mapping the risks [[electronic resource] ] : assessing homeland security implications of publicly available geospatial information / / John C. Baker ... [et al] |
Pubbl/distr/stampa | Santa Monica, CA, : Rand Corporation, 2004 |
Descrizione fisica | 1 online resource (236 p.) |
Disciplina | 363.34/7/0285 |
Altri autori (Persone) | BakerJohn C. <1949-> |
Soggetto topico |
Civil defense - United States
Geographic information systems - Defense measures - United States |
ISBN |
1-283-59730-6
9786613909756 0-8330-3622-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Preface; Sponsor Guidance; The RAND Corporation Quality Assurance Process; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; CHAPTER ONE Introduction; Assessing the Homeland Security Implication of Geospatial Information; Public Access to Geospatial Information; Research Objectives; Research Methodology; Need for an Analytical Framework; How the Report Is Organized; CHAPTER TWO What Are the Attackers' Key Information Needs?; Methodology; Defining the Threat Space; The Attacker: Motivations, Strategies, and Modalities of Attack
The Attacker's Tool Box: Types of Weapons Considered A General Model of Attacker Information Needs; Attackers Have Substantial Flexibility in Fulfilling Their Information Needs; Summary; CHAPTER THREE What Publicly Available Geospatial Information Is Significant to Potential Attackers' Needs?; Federal Geospatial Information in the Public Domain; Structured Survey Used to Identify Federal Geospatial Data Sources; Availability of Nonfederal Geospatial Information; Assessing Whether Sources Contain Potentially Critical Site Information; Assessing the Potential Significance of This Information Case Studies Comparing Federal and Nonfederal Sources of Geospatial Information Other Observations About Publicly Accessible Federal Geospatial Information; Summary; CHAPTER FOUR An Analytical Framework for Assessing the Homeland Security Implications of Publicly Accessible Geospatial Information; Framework for Analysis: An Overview; Framework for Analysis: Three Analytical Filters; Illustrating the Framework; Considerations in Restricting Public Access to Sensitive Data; Long-Term Need for a More Comprehensive Model; Summary; CHAPTER FIVE Key Findings and Recommendations; Key Findings Broader Implications General Recommendations; Agency-Specific Recommendations; APPENDIX A Federal Agencies Examined; APPENDIX B Federal Geospatial Data Sources Identified; APPENDIX C Detailed Examples of Geospatial Information Analyses; APPENDIX D Overview of Critical U.S. Sites: Critical Infrastructure and Other Key Homeland Locations; Bibliography |
Record Nr. | UNINA-9910220135503321 |
Santa Monica, CA, : Rand Corporation, 2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|