Matokeo ya Utafutaji
-
How Do We Know What Information Sharing Is Really Worth?: Exploring Methodologies to Measure the Value of Information Sharing and Fusion Efforts
How Do We Know What Information Sharing Is Really Worth?: Exporing Methodologies to Measure the Value of Information Sharing and Fusion Efforts (Research Reports) ... More
Language: ENGHakimiliki: 2014 -
Understanding the Role of Deterrence in Counterterrorism Security
Deterrence--a central feature of counterterrorism security systems and a major factor in the cost-effectiveness of many security programs--is not well understood or measured. This paper offers a framework for understanding how security systems may deter or displace attacks and how to measure the rel... More
Language: ENGHakimiliki: 2009 -
Sharing the Dragon's Teeth: Terrorist Groups and the Exchange of New Technologies
Case studies of 11 terrorist groups in Mindanao, the West Bank and Gaza Strip, and southwest Colombia show how these groups have exchanged technologies and knowledge in an effort to innovate (i.e., improve their operational capabilities). The analysis provides national security policymakers with ins... More
Language: ENGHakimiliki: 2007 -
Challenges and Choices for Crime-Fighting Technology Federal Support of State and Local Law Enforcement
Under the American federal system, most law is cast as state statutes and local ordinances; accordingly, most law enforcement is the responsibility of state and local agencies. Federal law and federal law enforcement come into play only where there is rationale for it, consistent with the Constituti... More
Language: ENGHakimiliki: 2001 -
Stealing the Sword: Limiting Terrorist Use of Advanced Conventional Weapons
Examines how terrorists make technology choices and how the United States can discourage terrorists' use of advanced conventional weapons. Concludes that the United States should urgently start discussions with key producer nations and also decide on an architecture needed to impose technical contro... More
Language: ENGHakimiliki: 2007 -
Evaluating the Reliability of Emergency Response Systems for Large-Scale Incident Operations
The ability to measure emergency preparedness is critical for policy analysis in homeland security. Yet it remains difficult to know how prepared a response system is to deal with large-scale incidents, whether it be a natural disaster, terrorist attack, or industrial or transportation accident. Thi... More
Language: ENGHakimiliki: 2010 -
Considering the Creation of a Domestic Intelligence Agency in the United States
With terrorism still prominent on the U.S. agenda, whether the country's prevention efforts match the threat the United States faces continues to be central in policy debate. One element of this debate is questioning whether the United States should create a dedicated domestic intelligence agency. C... More
Language: ENGHakimiliki: 2009 -
Protecting Emergency Responders
In December 2001, a conference held in New York City brought together individuals with firsthand knowledge of emergency responses to terrorist attacks to discuss ways to improve the health and safety of emergency workers who respond to large-scale disasters. The meeting considered the responses to t... More
Language: ENGHakimiliki: 2002 -
Protecting Emergency Responders Volume 2
Firefighters, law enforcement officers, and emergency medical service responders play a critical role in protecting people and property in the event of fires, medical emergencies, terrorist acts, and numerous other emergencies. The authors examine the hazards that responders face and the personal p... More
Language: ENGHakimiliki: 2003 -
Emerging Threats and Security Planning
Concerns about how terrorists might attack in the future are central to the design of security efforts to protect both individual targets and the nation overall. This paper explores an approach for assessing novel or emerging threats and prioritizing which merit specific security attention and which... More
Language: ENGHakimiliki: 2009 -
Evaluating Novel Threats to the Homeland
Changes in technology and adversary behavior will invariably produce new threats that must be assessed by defense and homeland security planners. An example of such a novel threat is the use of cruise missiles or unmanned aerial vehicles (UAVs) by terrorist groups. Individual threats cannot be asse... More
Language: ENGHakimiliki: 2008 -
Addressing Emerging Trends to Support the Future of Criminal Justice: Findings of the Criminal Justice Technology Forecasting Group
The Criminal Justice Technology Forecasting Group (CJTFG) deliberated on the effects that major technology and social trends could have on criminal justice in the next two to five years and identified potential responses. This report captures the results of the group’s meetings and initiatives, pres... More
Language: ENGHakimiliki: 2018 -
Aptitude for Destruction, Volume 2
Better ways are needed to understand how terrorist groups increase their effectiveness and become more dangerous. Learning is the link between what a group wants to do and its ability to actually do it; therefore, a better understanding of group learning might contribute to the design of better meas... More
Language: ENGHakimiliki: 2005 -
Breaching the Fortress Wall: Understanding Terrorist Efforts to Overcome Defensive Technologies
Technology systems play a key role within a larger, integrated strategy to target groups' efforts and protect the public from the threat of terrorist violence. This study draws on relevant data from the history of a variety of terrorist conflicts to understand terrorists' counter-technology efforts.... More
Language: ENGHakimiliki: 2007 -
Securing America's Passenger-Rail Systems
U.S. communities depend on reliable, safe, and secure rail systems. Each weekday, more than 12 million passengers take to U.S. railways. This book explains a framework for security planners and policymakers to guide cost-effective rail-security planning, specifically for the risk of terrorism. Risk ... More
Language: ENGHakimiliki: 2007 -
Fostering Innovation in Community and Institutional Corrections: Identifying High-Priority Technology and Other Needs for the U.S. Corrections Sector
by Richard Silberglitt • Brian A. Jackson • Brian G. Chow • John S. Hollywood • Dulani Woods • Joe Russo • George B. Drake • John S. Shaffer • Mikhail ZaydmanGiven the challenges posed to the U. S. corrections sector, such as tightened budgets and increasingly complex populations under its charge, it is valuable to identify opportunities where changes in tools, practices, or approaches could improve performance. In this report, RAND researchers, with t... More
Language: ENGHakimiliki: 2015 -
Mapping White Identity Terrorism and Racially or Ethnically Motivated Violent Extremism: A Social Network Analysis of Online Activity
by Heather J. Williams • Luke J. Matthews • Pauline Moore • Matthew A. DeNardo • James V. Marrone • Brian A. Jackson • William Marcellino • Todd C. HelmusThe authors reviewed literature on White identity terrorism and racially or ethnically motivated violent extremism (REMVE) and analyzed social media data from six platforms that host extremist content. They developed a network map that evaluates REMVE network construction, connectivity, geographic l... More
Language: ENGHakimiliki: 2022 -
The Psychology of Assessment Centers
Research on the reliability and validity of assessment centers (ACs) has been ongoing for at least 50 years and continues to this day. The assessment center method is a technique or process that is used to assess individual performance and potential. One of the most heavily researched topics over th... More
Language: ENGHakimiliki: 2012 -
Reconstruction and Empire: The Legacies of Abolition and Union Victory for an Imperial Age (Reconstructing America)
by Mark Elliott • Rebecca Edwards • Lawrence B. Glickman • David V. Holtby • David Prior • Adrian Brettle • Christina C. Davidson • Andre Fleche • Gregg French • Reilly Ben Hatch • Justin F. Jackson • Dj Polite • Brian ShottThis volume examines the historical connections between the United States’ Reconstruction and the country’s emergence as a geopolitical power a few decades later. It shows how the processes at work during the postbellum decade variously foreshadowed, inhibited, and conditioned the development of the... More
Language: ENGHakimiliki: 2022 -
The Razor's Edge
by Steve Perry • Sharon Lee • Steve Miller • Kay Kenyon • William C. Dietz • Walter H. Hunt • L. E. Modesitt • Joshua Palmatier • Gerald Brandt • Seanan McGuire • D. B. Jackson • Troy Carrol Bucher • Blake Jessop • Sharon P. Goza • Christopher Allenby • Chris Kennedy • Alex Gideon • Brian Hugenbruch • Y. M. PangOne man’s insurgent is another man’s freedom fighter… From The Moon is a Harsh Mistress to The Hunger Games, everyone enjoys a good rebellion. There is something compelling about a group (or individual) who throws caution to the wind and rises up in armed defiance against oppression, tyranny, religi... More
Language: ENGHakimiliki: 2018 -
Next Steps: New Directions for/in Writing about Writing
by Nancy Wilson • Rebecca Jackson • Elizabeth Wardle • Linda Adler-Kassner • Christian Smith • Christina Grant • Elizabeth Kleinfeld • Jennifer DeWinter • Rebecca Robinson • Emma Gaier • Megan Wallace • Lisa Tremain • Hiroki Sugimoto • Joy Arbor • Valerie Vera • Gwen Hart • Mysti Rudd • Kristen Di Gennaro • Cat Mahaffey • Shawn Casey • Andrew Ogilvie • Olga Aksakalova • Dominique Zino • Andrew Lucchesi • Gabriel Cutrufello • Michael Michaud • Sarah Read • Francis Johnson • Samuel Stinson • Rebecca Nowacek • Kimberly Hoover • Elle Limesand • Maggie Hammond • Max Wellman • Matthew Bryan • Kevin Roozen • Nicole Stack • Christy I. Wenger • Gabrielle Frick • Patrick Siebel • Katie Jo LaRiviereNext Steps: New Directions for/in Writing about Writing is the first collection of teacher and student voices on a writing pedagogy that puts expert knowledge at the center of the writing classroom. More than forty contributors report on implementations of writing-about-writing pedagogies from the b... More
Language: ENGHakimiliki: 2019 -
Transgenic Insects: Techniques and Applications (CABI Biotechnology Series #3)
by Brian L. Weiss • Arvind Sharma • Andrew Hammond • Nicole Klein • John Mumford • Ricardo Pereira • Lucy Carter • Claudia Emerson • Guy Smagghe • Ravi V. Durvasula • Tony Nolan • Serap Aksoy • Aaron Roberts • Hassan M. Ahmed • Omar S. Akbar • Yehonatan Alcalay • Luke Alphey • Yael Arien • Rotem Daniel Avraham • Camilla Beech • Nicholas J. Bongio • Vanessa Bottino-Rojas • L. Roman Carrasco • Jackson Champer • Isabelle Coche • Carolina Concha • Rocco D’Amato • Brinda Dass • Jason A. Delborne • Ellen M. Dotson • Matthew P. Edgington • Guido Favia • Adam P. Forshaw • Alexander W.E. Franz • Marisa L. Guido • Monika Gulia-Nuss • Daniella An Haber • Alfred M. Handler • Keith R. Hayes • Ivy Hurwitz • Anthony A. James • Thomas P. Kelly • Ana Kormos • Lee Benjamin Lamdan • David J. Lampe • Rosemary S. Lees • Maria Vittoria Mancini • Aditi Mankad • Andrew Nuss • David A. O’Brochta • Riccardo Papa • Philippos Aris Papathanos • Michael Pham • Megan Quinlan • Robyn Raban • Jason L. Rasgon • Yasha Rohwer • Nathan Rose • Marc F. Schetelig • Kristof De Schutter • Hideki Sezutsu • Gregory S. Simmons • Toshiki Tamura • Delphine Thizy • Lea Pare Toe • Ernst A. Wimmer • Liu YangTechnology for modifying the genotypes and phenotypes of insects and other arthropods has steadily progressed with the development of more precise and powerful methods, most prominently transgenic modification. For many insect pests, there is now almost unlimited ability to modify phenotypes to bene... More
Language: ENGHakimiliki: 2022