Cargando…

Emerging threats and security planning : how should we decide what hypothetical threats to worry about? /

"Concerns about how terrorists might attack in the future are central to the design of security efforts to protect both individual targets and the nation overall. In thinking about emerging threats, security planners are confronted by a panoply of possible future scenarios coming from sources r...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Jackson, Brian A., 1972-
Otros Autores: Frelinger, Dave
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Santa Monica, CA : RAND, 2009.
Colección:Occasional paper (Rand Corporation) ; OP-256-RC.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Ia 4500
001 JSTOR_ocn559031517
003 OCoLC
005 20231005004200.0
006 m o d
007 cr cnu---unuuu
008 100318s2009 cau ob 000 0 eng d
010 |z  2009018478 
040 |a N$T  |b eng  |e pn  |c N$T  |d OCLCE  |d OCLCQ  |d E7B  |d IDEBK  |d DOS  |d OCLCQ  |d EBLCP  |d MHW  |d OCLCQ  |d B24X7  |d YDXCP  |d OCLCQ  |d JSTOR  |d OCLCF  |d UBY  |d OCLCQ  |d OCLCO  |d EJB  |d DEBSZ  |d OCLCQ  |d CUS  |d AGLDB  |d PIFSG  |d OCLCQ  |d MERUC  |d OCLCQ  |d VT2  |d OCLCA  |d WY@  |d LOA  |d LND  |d LUE  |d ICG  |d U3W  |d VTS  |d CEF  |d REC  |d ICN  |d EZ9  |d AU@  |d OCLCQ  |d ERL  |d JBG  |d WYU  |d STF  |d TXR  |d NJT  |d HS0  |d OCLCQ  |d UKBTH  |d OCLCQ  |d K6U  |d OCLCQ  |d OCLCO  |d OCLCQ 
019 |a 354972910  |a 609104243  |a 616737866  |a 620436307  |a 656140727  |a 748210299  |a 816361316  |a 977475035  |a 992109298  |a 1006967173  |a 1008949916  |a 1039133796  |a 1047934833  |a 1054117703  |a 1066439573  |a 1069453723  |a 1109090108  |a 1113579473  |a 1115111273  |a 1119090886  |a 1125691569  |a 1154206915 
020 |a 9780833048646  |q (electronic bk.) 
020 |a 0833048643  |q (electronic bk.) 
020 |a 1282451162 
020 |a 9781282451162 
020 |a 9786612451164 
020 |a 6612451165 
020 |z 9780833047311  |q (pbk. ;  |q alk. paper) 
020 |z 0833047310  |q (pbk. ;  |q alk. paper) 
027 |a RAND/OP-256-RC 
029 1 |a AU@  |b 000048836911 
029 1 |a AU@  |b 000051546276 
029 1 |a AU@  |b 000054171377 
029 1 |a DEBBG  |b BV043144989 
029 1 |a DEBSZ  |b 421916273 
029 1 |a GBVCP  |b 100865339X 
035 |a (OCoLC)559031517  |z (OCoLC)354972910  |z (OCoLC)609104243  |z (OCoLC)616737866  |z (OCoLC)620436307  |z (OCoLC)656140727  |z (OCoLC)748210299  |z (OCoLC)816361316  |z (OCoLC)977475035  |z (OCoLC)992109298  |z (OCoLC)1006967173  |z (OCoLC)1008949916  |z (OCoLC)1039133796  |z (OCoLC)1047934833  |z (OCoLC)1054117703  |z (OCoLC)1066439573  |z (OCoLC)1069453723  |z (OCoLC)1109090108  |z (OCoLC)1113579473  |z (OCoLC)1115111273  |z (OCoLC)1119090886  |z (OCoLC)1125691569  |z (OCoLC)1154206915 
037 |a 22573/cttd8vf  |b JSTOR 
042 |a dlr 
043 |a n-us--- 
050 4 |a UA23  |b .J257 2009eb 
072 7 |a POL  |x 037000  |2 bisacsh 
072 7 |a POL037000  |2 bisacsh 
072 7 |a JPWL, TTM  |2 bicssc 
082 0 4 |a 355/.033573  |2 22 
049 |a UAMI 
100 1 |a Jackson, Brian A.,  |d 1972- 
245 1 0 |a Emerging threats and security planning :  |b how should we decide what hypothetical threats to worry about? /  |c Brian A. Jackson, David R. Frelinger. 
260 |a Santa Monica, CA :  |b RAND,  |c 2009. 
300 |a 1 online resource (x, 19 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a RAND Corporation occasional paper series ;  |v OP-256-RC 
504 |a Includes bibliographical references (pages 17-19). 
520 |a "Concerns about how terrorists might attack in the future are central to the design of security efforts to protect both individual targets and the nation overall. In thinking about emerging threats, security planners are confronted by a panoply of possible future scenarios coming from sources ranging from the terrorists themselves to red-team brainstorming efforts to explore ways adversaries might attack in the future. This paper explores an approach to assessing emerging and/or novel threats and deciding whether, or how much, they should concern security planners by asking two questions: (1) Are some of the novel threats 'niche threats' that should be addressed within existing security efforts? (2) Which of the remaining threats are attackers most likely to execute successfully and should therefore be of greater concern for security planners? If threats can reasonably be considered niche threats, they can be prudently addressed in the context of existing security activities. If threats are unusual enough, suggest significant new vulnerabilities, or their probability or consequences means they cannot be considered lesser included cases within other threats, prioritizing them based on their ease of execution provides a guide for which threats merit the greatest concern and most security attention. This preserves the opportunity to learn from new threats yet prevents security planners from being pulled in many directions simultaneously by attempting to respond to every threat at once."--Page 4 of cover. 
505 0 |a Cover; Preface; Contents; Tables; Summary; Emerging Threats and Security Planning: How Should We Decide What Hypothetical Threats to Worry About?; The Variety of Emerging Threats Challenging Security Planning; Framing a Middle-Ground Approach to Addressing Emerging Threats; Identifying Niche Threats; Prioritizing Emerging Threat Scenarios; Conclusions: Security Planning for the Niche and the Novel; References. 
588 0 |a Print version record. 
506 |3 Use copy  |f Restrictions unspecified  |2 star  |5 MiAaHDL 
533 |a Electronic reproduction.  |b [Place of publication not identified] :  |c HathiTrust Digital Library,  |d 2010.  |5 MiAaHDL 
538 |a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.  |u http://purl.oclc.org/DLF/benchrepro0212  |5 MiAaHDL 
583 1 |a digitized  |c 2010  |h HathiTrust Digital Library  |l committed to preserve  |2 pda  |5 MiAaHDL 
546 |a English. 
590 |a JSTOR  |b Books at JSTOR Open Access 
590 |a JSTOR  |b Books at JSTOR All Purchased 
650 0 |a National security  |z United States  |x Planning. 
650 0 |a Terrorism  |z United States  |x Prevention. 
651 0 |a United States  |x Defenses  |x Planning. 
650 0 |a Strategic planning  |z United States. 
650 0 |a Civil defense  |z United States. 
651 6 |a États-Unis  |x Défense nationale  |x Planification. 
650 6 |a Planification stratégique  |z États-Unis. 
650 7 |a POLITICAL SCIENCE  |x Political Freedom & Security  |x Terrorism.  |2 bisacsh 
650 7 |a POLITICAL SCIENCE  |x Terrorism.  |2 bisacsh 
650 7 |a Civil defense.  |2 fast  |0 (OCoLC)fst00862456 
650 7 |a Military readiness  |x Planning.  |2 fast  |0 (OCoLC)fst01353790 
650 7 |a National security  |x Planning.  |2 fast  |0 (OCoLC)fst01033734 
650 7 |a Strategic planning.  |2 fast  |0 (OCoLC)fst01134371 
650 7 |a Terrorism  |x Prevention.  |2 fast  |0 (OCoLC)fst01148123 
651 7 |a United States.  |2 fast  |0 (OCoLC)fst01204155 
650 7 |a Armies.  |2 hilcc 
650 7 |a Military & Naval Science.  |2 hilcc 
650 7 |a Law, Politics & Government.  |2 hilcc 
700 1 |a Frelinger, Dave. 
776 0 8 |i Print version:  |a Jackson, Brian A., 1972-  |t Emerging threats and security planning.  |d Santa Monica, CA : RAND, 2009  |z 9780833047311  |w (DLC) 2009018478  |w (OCoLC)320131993 
830 0 |a Occasional paper (Rand Corporation) ;  |v OP-256-RC. 
856 4 0 |u https://jstor.uam.elogim.com/stable/10.7249/op256rc  |z Texto completo 
887 |a ProductForm=BC  |2 onix 
887 |a Publisher/PublisherName=RAND Corporation  |2 onix 
938 |a Books 24x7  |b B247  |n bkg00033326 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL475034 
938 |a ebrary  |b EBRY  |n ebr10355424 
938 |a EBSCOhost  |b EBSC  |n 304905 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n 245116 
938 |a YBP Library Services  |b YANK  |n 3151702 
994 |a 92  |b IZTAP