Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Item Type
      Item Type
      Clear All
      Item Type
  • Subject
      Subject
      Clear All
      Subject
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Source
    • Language
292 result(s) for "Larson, Eric V"
Sort by:
Preparing the U.S. Army for Homeland Security
Homeland security encompasses five distinct missions: domestic preparednessand civil support in case of attacks on civilians, continuity of government, continuity ofmilitary operations, border and coastal defense, and national missile defense. This reportextensively details four of those mission areas (national missile defense having beencovered in great detail elsewhere). The authors define homeland security and its missionareas, provide a methodology for assessing homeland security response options, and reviewrelevant trend data for each mission area. They also assess the adequacy of the doctrine,organizations, training, leadership, materiel, and soldier systems and provide illustrativescenarios to help clarify Army planning priorities. The report concludes with options andrecommendations for developing more cost-effective programs and recommends a planningframework that can facilitate planning to meet homeland security needs.
American Public Support for U.S. Military Operations from Mogadishu to Baghdad
The support of the American public is widely held to be a critical prerequisite for undertaking military action abroad. This monograph describes American public opinion toward wars and other large military operations over the last decade, to delineate the sources of support and opposition for each war or operation, to identify the principal fault lines in support, and to illuminate those factors that are consistent predictors of support for and opposition to military operations.
Understanding Commanders' Information Needs for Influence Operations
Documents a study whose goals were to develop an understanding of commanders' information requirements for cultural and other \"soft\" factors in order to improve the effectiveness of combined arms operations, and to develop practical ways for commanders to integrate information and influence operations activities into combined arms planning/assessment in order to increase the usefulness to ground commanders of such operations.
Misfortunes of War
This monograph, part of a larger study of ways to reduce collateral damage undertaken for the U.S. Air Force, analyzes media and public reactions to civilian casualty incidents, whether these incidents affect media reporting or public support for military operations, and, if so, how. It analyzes case studies of incidents of civilian deaths in the February 1991 bombing of the Al Firdos bunker in the Gulf War, the April and May 1999 attacks on the Djakovica convoy and Chinese embassy during the war in Kosovo, the June 2002 attack involving an Afghan wedding party during operations in Afghanistan, and the March 2003 incident involving a large explosion in a crowded Baghdad marketplace to describe and explain how the U.S. and foreign media and publics have responded. For each case study, the study team examined press, public, and leadership responses to these incidents and found the following. First, while avoiding civilian casualties is important to the American public, it has realistic expectations about the actual possibilities for avoiding casualties. Second, the press reports heavily on civilian casualty incidents. Third, adversaries understand the publicÂ's sensitivities to civilian deaths and have sought to exploit them. Fourth, during armed conflict, the belief that the United States and its allies are trying to avoid casualties most affects support for U.S. military operations, both at home and abroad. Fifth, while strong majorities of Americans typically give U.S. military and political leaders the benefit of the doubt when civilian casualty incidents occur, this does not necessarily extend to foreign audiences. Sixth, when civilian casualty incidents occur, it is at least as important to get the story right as to get the story out. Finally, attention to and concern about civilian casualties both at home and abroad have increased in recent years and may continue to do so.
Economic Costs & Implications of High-Technology Hardware Theft
This report presents the results of a study undertaken at the request of the American Electronics Association and a consortium of high-tech industries. This report presents the results of a study undertaken at the request of the American Electronics Association and a consortium of high-tech industries. Based on a nine-month survey of 95 firms, representing approximately 40 percent of the sales volume for the computer, semiconductor, hard disk drive, and cellular telephone industries, the authors estimate that direct costs of hardware theft are almost $250 million. Indirect costs (such as lost sales and expensive theft-reduction strategies) and industry losses could push total losses past $5 billion. Industry and consumers share the price of high-tech losses, but firms do not always have the economic incentive to invest in appropriate security measures. Since 1996, hardware theft has declined significantly, and recent security measures adopted by individual firms appear to be very cost-effective. The authors recommend more such investments and suggest that the largest payoff will come from anticipating what products are most vulnerable and devising targeted procedures to protect them. In addition, they recommend strengthening collaborative industry-law enforcement efforts to help track the threat, anticipate targets, and identify and disable stolen property.
Understanding and Influencing Public Support for Insurgency and Terrorism
Using and testing a conceptual model that draws on social science and particularly social movement theory, this volume examines public support for al-Qa'ida's transnational jihadist movement, the Taliban insurgency in Afghanistan, the Kurdistan Workers' Party (PKK) in Turkey, and the Maoist insurgency in Nepal. The authors discuss which factors were most salient across cases, how their importance varied in each case, and how this understanding can inform strategy.
China and India, 2025
China and India, the world's two most populous countries, will exercise increasing influence in international affairs in the coming decades. This document assesses the relative prospects of China and India through 2025 in four domains: demography, macroeconomics, science and technology, and defense spending and procurement. In each domain, the authors try to answer the following questions: Who is ahead? By how much? and Why?
Sexual Orientation and U.S. Military Personnel Policy
This study on sexual orientation and U.S. military policy, requested by the Senate Armed Services Committee and the Secretary of Defense in order to weigh repeal of the \"Don't Ask, Don't Tell\" policy, examines public and military opinion on allowing gay men and lesbians to serve without restriction; research on sexual orientation, unit cohesion, and recruiting and retention; and experiences of domestic agencies and foreign militaries.