feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Santa Monica, CA :RAND Corporation,
    UID:
    almafu_9958279002502883
    Format: 1 online resource (215 p.)
    Edition: 1st ed.
    ISBN: 0-8330-4077-4
    Content: Case studies of the organizational learning activities of five major terrorist groups and a methodology for ascertaining what and why they learned
    Note: "Prepared for the National Institute of Justice." , "MG-331-NIJ"--V. 1, p. [4] of cover. , "MG-332-NIJ"--V. 2, p. [4] of cover. , v. 1. Organizational learning in terrorist groups and its implications for combating terrorism -- v. 2. Case studies of organizational learnings in five terrorist groups , English
    Additional Edition: ISBN 0-8330-3767-6
    Language: English
    Keywords: Electronic books
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almafu_9958279005102883
    Format: 1 online resource (183 p.)
    Edition: 1st ed.
    ISBN: 1-281-18090-4 , 9786611180904 , 0-8330-4247-5
    Series Statement: Rand Corporation monograph series
    Content: The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to target groups' efforts and protect the public from the threat of terrorist violence. Terrorist organizations are acutely aware of government efforts to deploy these systems and actively seek ways to evade or counteract them. This study draws on relevant data from the history of a variety of terroris
    Note: "Prepared for the Department of Homeland Security." , "MG-481-DHS". , Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One - Introduction; Defensive Technologies and the Effort to CombatTerrorism; Terrorist Efforts to Overcome Defensive Technologies; About the Study; About This Monograph; Chapter Two - Palestinian Terrorist Groups; Introduction; Information Acquisition and Management; Preventive Action; Denial; Response; Conclusion; Chapter Three - Jemaah Islamiyah and Affiliated Groups; Introduction; Information Acquisition and Management; Preventive Action; Denial; Investigation; Conclusion , Chapter Four - Liberation Tigers of Tamil EelamIntroduction; Information Acquisition and Management; Denial; Conclusion; Chapter Five - Provisional Irish Republican Army; Introduction; Information Acquisition and Management; Preventive Action; Denial; Response; Investigation; Conclusion; Chapter Six - Conclusions: Understanding Terrorists' Countertechnology Efforts; Terrorist Strategies for Countering DefensiveTechnologies; Transferability of Terrorist Countertechnology Strategies; Implications of Terrorist Countertechnology Activities forHomeland Security Efforts , In Conclusion:The Role of Technology in Combating TerrorismAppendix - Prominent Acts of LTTE Suicide Terrorism, 1987-2002; Bibliography , English
    Additional Edition: ISBN 0-8330-3914-8
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    almahu_9949577335302882
    Format: 1 online resource (x, 19 pages)
    ISBN: 1-282-45116-2 , 9786612451164 , 0-8330-4864-3
    Series Statement: Occasional paper (Rand Corporation)
    Content: Concerns about how terrorists might attack in the future are central to the design of security efforts to protect both individual targets and the nation overall. In thinking about emerging threats, security planners are confronted by a panoply of possible future scenarios coming from sources ranging from the terrorists themselves to red-team brainstorming efforts to explore ways adversaries might attack in the future. This paper explores an approach to assessing emerging and/or novel threats and deciding whether --or how much--they should concern security planners.
    Note: Description based upon print version of record. , Cover; Preface; Contents; Tables; Summary; Emerging Threats and Security Planning: How Should We Decide What Hypothetical Threats to Worry About?; The Variety of Emerging Threats Challenging Security Planning; Framing a Middle-Ground Approach to Addressing Emerging Threats; Identifying Niche Threats; Prioritizing Emerging Threat Scenarios; Conclusions: Security Planning for the Niche and the Novel; References , English
    Additional Edition: ISBN 0-8330-4731-0
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    almahu_9949576890002882
    Format: 1 online resource (226 p.)
    Edition: 1st ed.
    ISBN: 1-282-94038-4 , 9786612940385 , 0-8330-5014-1
    Series Statement: RAND Corporation monograph series
    Content: The ability to measure emergency preparedness - to predict the likely performance of emergency response systems in future events - is critical for policy analysis in homeland security. Yet it remains difficult to know how prepared a response system is to deal with large-scale incidents, whether it be a natural disaster, terrorist attack, or industrial or transportation accident. This research draws on the fields of systems analysis and engineering to apply the concept of system reliability to the evaluation of emergency response systems. The authors describe a method for modeling an emergency response system; identifying how individual parts of the system might fail; and assessing the likelihood of each failure and the severity of its effects on the overall response effort. The authors walk the reader through two applications of this method: a simplified example in which responders must deliver medical treatment to a certain number of people in a specified time window, and a more complex scenario involving the release of chlorine gas. The authors also describe an exploratory analysis in which they parsed a set of after-action reports describing real-world incidents, to demonstrate how this method can be used to quantitatively analyze data on past response performance. The authors conclude with a discussion of how this method of measuring emergency response system reliability could inform policy discussion of emergency preparedness, how system reliability might be improved, and the costs of doing so. --From publisher description.
    Note: "This research was sponsored by the Federal Emergency Management Agency and conducted under the auspices of the RAND Homeland Security and Defense Center, a joint center of the RAND National Security Research Division and RAND Infrastructure, Safety, and Environment." -- T.p. verso. , Cover; Title Page; Copyright; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One - Introduction: Measurement and Emergency Preparedness; Chapter Two - Defining and Demonstrating Response Reliability Analysis; Chapter Three - Describing a Chlorine Release Scenario and Relevant Response Parameters; Chapter Four - A Simplified Model of an Emergency Response to a Chlorine Release; Chapter Five - Exploring What Can Go Wrong During a Chlorine Response Operation: Identifying Relevant Failure Modes , Chapter Six - Assessing the Probability, Effects, and Severity of Failure Modes: An Exploratory Analysis Using Response After-Action ReportsChapter Seven - Concluding Observations; Appendixes; Bibliography; Back Cover , English
    Additional Edition: ISBN 0-8330-5005-2
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    almahu_9949576893602882
    Format: 1 online resource (217 p.)
    ISBN: 1-282-45113-8 , 9786612451133 , 0-8330-4823-6
    Content: With terrorism still prominent on the U.S. agenda, whether the country's prevention efforts match the threat the United States faces continues to be central in policy debate. One element of this debate is questioning whether the United States should create a dedicated domestic intelligence agency. Case studies of five other democracies--Australia, Canada, France, Germany, and the UK--provide lessons and common themes that may help policymakers decide. The authors find that* most of the five countries separate the agency that conducts domestic intelligence gathering from any arrest and detentio
    Note: Description based upon print version of record. , Cover; Preface; Contents; Figure and Tables; Acknowledgments; Abbreviations; Chapter One - Introduction; Chapter Two - Australia; Chapter Three - Canada; Chapter Four - France; Chapter Five - Germany; Chapter Six - The United Kingdom; Chapter Seven - Domestic Intelligence Agencies After September11, 2001: How Five Nations Have Grappled with the Evolving Threat; Chapter Eight - Conclusions: Lessons for the United States , English
    Additional Edition: ISBN 0-8330-4617-9
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    almahu_9949577241402882
    Format: 1 online resource (111 p.)
    Edition: 1st ed.
    ISBN: 1-283-59727-6 , 9786613909725 , 0-8330-3257-7
    Content: Based on a 2001 conference held in New York City that looked at ways of improving health and safety for emergency workers who respond to terrorist attacks. It is intended for managers and decisionmakers to help them understand the working and safety environment associated with such attacks.
    Note: Description based upon print version of record. , PREFACE; EXECUTIVE SUMMARY; ACKNOWLEDGMENTS; ACRONYMS AND ABBREVIATIONS; Chapter One INTRODUCTION; ABOUT THE CONFERENCE; THE REPORT; Chapter Two THE TERRORIST INCIDENTS; LONG-TERM CAMPAIGNS; LARGE-SCALE EVENTS; MULTIPLE THREATS, MULTIPLE EVENTS; CRIME-SCENE DESIGNATION; OFF-DUTY AND VOLUNTEER INVOLVEMENT; NEW ROLES, NEW RISKS; Chapter Three PERFORMANCE AND AVAILABILITY OF PERSONAL PROTECTIVE EQUIPMENT; PERFORMANCE; AVAILABILITY AND SUITABILITY; MAINTENANCE AND DECONTAMINATION; Chapter Four INFORMATION AND TRAINING; HAZARD ASSESSMENT; RISK COMMUNICATION , PERSONAL PROTECTIVE EQUIPMENT INFORMATION AND TRAININGChapter Five SITE MANAGEMENT FOR PERSONAL PROTECTION; COMMANDING AUTHORITY; INCIDENT DEFINITION; SCENE CONTROL; INTERNAL PERIMETER CONTROL; PERSONAL PROTECTIVE EQUIPMENT ENFORCEMENT; Chapter Six RECOMMENDATIONS FOR MOVING FORWARD; PERSONAL PROTECTIVE EQUIPMENT; AVAILABILITY OF PERSONAL PROTECTIVE EQUIPMENT; INFORMATION AND TRAINING; MANAGEMENT; Chapter Seven CONCLUDING REMARKS; GUIDELINES; COST; RESEARCH, DEVELOPMENT, AND TECHNOLOGY TRANSFER; EQUIPMENT STANDARDIZATION AND INTEROPERABILITY; SAFETY MANAGEMENT; Appendix A ORGANIZING PARTNERS , Appendix B CONFERENCE PARTICIPANTSAppendix C CONFERENCE AGENDA; Appendix D SUMMARIES OF PLENARY PRESENTATIONS , English
    Additional Edition: ISBN 0-8330-3149-X
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Santa Monica, CA :RAND Corporation,
    UID:
    almafu_9958279005802883
    Format: 1 online resource (105 p.)
    Edition: 1st ed.
    ISBN: 0-8330-4076-6
    Content: Understanding how terrorist groups learn may aid in developing strategies to combat terrorist activities
    Note: "Prepared for the National Institute of Justice." , "MG-331-NIJ"--V. 1, p. [4] of cover. , "MG-332-NIJ"--V. 2, p. [4] of cover. , v. 1. Organizational learning in terrorist groups and its implications for combating terrorism -- v. 2. Case studies of organizational learnings in five terrorist groups
    Additional Edition: ISBN 0-8330-3764-1
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    almahu_9948312383102882
    Format: xxii, 106 p. : , ill., map.
    Edition: Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.
    Note: "Prepared for the Defense Threat Reduction Agency."
    Language: English
    Keywords: Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    almahu_9949577207702882
    Format: 1 online resource (309 p.)
    ISBN: 1-282-08163-2 , 9786612081637 , 0-8330-4703-5
    Content: Whether U.S. terrorism-prevention efforts match the threat continues to be central in policy debate. Part of this debate is whether the United States needs a dedicated domestic counterterrorism intelligence agency. This book examines such an agency's possible capability, comparing its potential effectiveness with that of current efforts, and its acceptability to the public, as well as various balances and trade-offs involved.
    Note: Description based upon print version of record. , Introduction -- The history of domestic intelligence in the United States: lessons for assessing the creation of a new counterterrorism intelligence agency / Agnes Gereben Schaefer -- Current domestic intelligence efforts in the United States / Brian A. Jackson, Darcy Noricks, and Benjamin W. Goldsmith -- Societal acceptability of domestic intelligence / Genevieve Lester -- The law and the creation of a new domestic intelligence agency in the United States / Jeremiah Goulka with Michael A. Wermuth -- Weighing organizational models for a new domestic intelligence agency / Genevieve Lester and Brian A. Jackson -- Privacy and civil liberties protections in a new domestic intelligence agency / Martin C. Libicki and David R. Howell -- Exploring measures of effectiveness for domestic intelligence: addressing questions of capability and acceptability / Brian A. Jackson -- Exploring the utility for considering cost-effectiveness analysis of domestic intelligence policy change / Brian A. Jackson -- Conclusion. , English
    Additional Edition: ISBN 0-8330-4616-0
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    almafu_BV035325193
    Format: XXIII, 283 S.
    ISBN: 978-0-8330-4616-1
    Content: Whether U.S. terrorism-prevention efforts match the threat continues to be central in policy debate. Part of this debate is whether the United States needs a dedicated domestic counterterrorism intelligence agency. This book examines such an agency's possible capability, comparing its potential effectiveness with that of current efforts, and its acceptability to the public, as well as various balances and trade-offs involved.
    Note: Includes bibliographical references
    Language: English
    Keywords: Terrorismus ; Prävention ; Geheimdienst ; Aufsatzsammlung
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages