You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This description of the application of the RAND Corporation's PortMan portfolio analysis and management method and Delphi consensus-building method for the National Security Agency (NSA) Information Sharing Services (ISS) division highlights how these methods enable the data-driven analysis of project portfolios and the allocation of research and development (R&D) and operations and maintenance (O&M) resources according to value, risk, and cost.
Describes a framework to guide assessments of the availability of data regarding U.S. anti- and counterterrorism systems, countermeasures, and defenses for planning attacks on the U.S. air, rail, and sea transportation infrastructure. Overall, the framework is useful for assessing what kind of information would be easy or hard for potential attackers to find.
In 2020, areas of particular importance for technology trends will include biotechnology, nanotechnology, materials technology, and information technology. This report, the companion document to The Global Technology Revolution 2020, Executive Summary (Silberglitt et al., MG-475-NIC, 2006), assesses in detail a sample of 29 countries with respect to their ability to acquire and implement 16 key technology applications.
What are the challenges the National Institute for Occupational Safety and Health (NIOSH) and related federal agencies face when allocating limited resources so that worker health and safety go hand in hand with innovation and technical progress? This was the central issue addressed at a workshop on nanotechnology and occupational safety and health hosted by the RAND Corporation on October 17, 2005. The workshop focused on policy and planning issues (as opposed to scientific issues) that are key to understanding the options available to NIOSH in formulating and implementing its strategic objectives to protect the safety and health of workers exposed to nanoscale materials. This document of the conference proceedings draws on discussions during the workshop and places the discussions within a policy framework for further consideration by NIOSH.
In 2020, areas of particular importance for technology trends will include biotechnology, nanotechnology, materials technology, and information technology. The authors of this report assessed a sample of 29 countries across the spectrum of scientific advancement (low to high) with respect to their ability to acquire and implement 16 key technology applications (e.g., cheap solar energy, rural wireless communications, genetically modified crops).
While the United States government has historically undertaken strategic reviews and produced numerous strategy documents, these have provided only very general directions for U.S. policymakers. This paper defines an approach to strategic planning and illustrates its application using the example of the critical national security topic of counterterrorism.
China's Tianjin Binhai New Area and the Tianjin Economic-Technological Development Area commissioned a technology-foresight study to help them plan for economic growth. The authors recommend seven emerging technology applications (TAs)--solar energy, mobile communications, rapid bioassays, new water-purification systems, molecular-scale drugs, electric and hybrid vehicles, and green manufacturing--and describe drivers, barriers, and plans for each.
The emergence of nanotechnology as a major science and technology research topic has sparked substantial interest by the intelligence community. In particular the community is interested both in the potential for nanotechnology to assist intelligence operations and threats it could create. To explore these questions, the Intelligence Technology Innovation Center asked the National Research Council to conduct a number of activities to illustrate the potential for nanotechnology to address key intelligence community needs. The second of these was a workshop to explore how nanotechnology might enable advances in sensing and locating technology. This report presents a summary of that workshop. In includes an overview of security technologies, and discussions of systems, natural chemical/biological tags, passive chemical/biological tags, and radio/radar/optical tags.
Owing to the expansion of network-centric operating concepts across the Department of Defense (DOD) and the growing threat to information and cybersecurity from lone actors, groups of like-minded actors, nation-states, and malicious insiders, information assurance is an area of significant and growing importance and concern. Because of the forward positioning of both the Navy's afloat and the Marine Corps expeditionary forces, IA issues for naval forces are exacerbated, and are tightly linked to operational success. Broad-based IA success is viewed by the NRC's Committee on Information Assurance for Network-Centric Naval Forces as providing a central underpinning to the DOD's network-centric operational concept and the Department of the Navy's (DON's) FORCEnet operational vision. Accordingly, this report provides a view and analysis of information assurance in the context of naval 'mission assurance'.
Al Qaeda seeks a restored caliphate free of Western influence, using terror as its means. But how does terrorism serve the ends of Al Qaeda? Based on the analysis of 14 major terrorist attacks, this book seeks to understand its strategic logic and suggest what types of U.S. targets it might seek and why. It examines four different hypotheses : coercion, damage, rally and franchise, to link means and ends.