did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780833032928

New Challenges, New Tools for Defense Decisionmaking

by ; ; ;
  • ISBN13:

    9780833032928

  • ISBN10:

    0833032925

  • Format: Hardcover
  • Copyright: 2003-05-01
  • Publisher: Natl Book Network
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $40.00

Summary

Though commonplace to say, it is still easy to underestimate how much the collapse of the Soviet Union and the end of the Cold War transformed the task of American foreign and defense policy. The terrorist attacks of September 11, 2001 have opened a new era whose shape and dimensions are yet to be understood. This volume addresses the challenges of this changed world, the difficulties for defense planning that those challenges engender, and new analytic techniques that have been developed at RAND and elsewhere for framing these complex problems. Meeting complex challenges such as counter-terrorism, countering the spread of weapons of mass destruction, peace enforcement and crisis response, enforcing economic and military sanctions, and combating narcotics trafficking is critical to maintaining the economic prosperity and security of the United States and its allies. During the last decade, Rand has worked to adapt traditional defense analysis techniques to today's security environment and develop new techniques where necessary. The chapters in this volume provide a new portfolio of tools to frame decisions, to solve problems, and to analyze alternatives. Book jacket.

Author Biography

Stuart E. Johnson has many years of experience in defense planning and analysis at the Department of Defense. NATO headquarters, and in private industry Martin C. Libicki's areas of expertise include the application of information technology to national security. Gregory F. Treverton has worked on intelligence and on Europe for Congress, the White House and the National Intelligence Council Bruce W. Bennett's research interests include military strategy and force planning, countering proliferation of weapons of mass destruction, Korea, and the Persian Gulf Nurith Berstein specializes in national and international security policy issues Frank Camm leads research at RAND on high-level Army resource management issues associated with force structure design, logistics policy, and acquisition of combat service support services David S.C. Chu has served in a variety of RAND and national security government posts Paul K. Davis's expertise includes strategic defense planning, future forces and force transformation, and advanced modeling and simulation Daniel B. Fox has over 30 years of experience in military operations analysis James R. Hosek is a senior economist at RAND and editor-in-chief of the RAND Journal of Economics David Mussington is an expert in critical infrastructure protection, information and technology security, and counterterrorism and cyberterrorism Stuart H. Starr is the Director of Plans at The MITRE Corporation; his areas of expertise include the assessment of information systems in the context of national security missions Harry J. Thie's research explores officer career management and military recruiting, retention, and compensation

Table of Contents

Prefacep. iii
Figuresp. xi
Tablesp. xv
Acknowledgmentsp. xvii
Abbreviationsp. xix
Introductionp. 1
From Old Challenges to Newp. 2
How This Volume Is Organizedp. 6
New Challenges for Defense
Introduction to Part Ip. 10
Decisionmaking for Defensep. 13
Deciding What Decisions Must Be Madep. 14
Deciding Who Makes the Decisionsp. 15
Deciding How to Allocate Resourcesp. 19
Deciding What Investments to Makep. 22
Alternative Approaches to Decisionmakingp. 27
Alternative Decisionmaking Stylesp. 29
Looking to the Futurep. 31
Responding to Asymmetric Threatsp. 33
From the Cold War to the Presentp. 34
Examples of Asymmetric Threatsp. 39
How Would Adversaries Shape Asymmetric Threats?p. 40
The Importance of Surprise and Anonymityp. 43
Challenge and Response Cyclesp. 45
The Challenge of Weapons of Mass Destructionp. 47
A Framework for Responding to Asymmetric Threatsp. 49
Institutionalization Through Protectionp. 50
Institutionalization Through Threat Managementp. 56
Internationalizationp. 63
Conclusionsp. 66
What Information Architecture for Defense?p. 67
What Is Architecture?p. 68
The Global Information Gridp. 70
Need There Be Architecture?p. 72
Architecture Follows Culture?p. 73
DoD as an Institution in Its Own Leaguep. 74
Elements of Architecturep. 78
Collectionp. 78
Accessp. 80
Presentationp. 82
Networkingp. 84
Knowledge Maintenance and Managementp. 86
Securityp. 89
Interoperabilityp. 90
Integrationp. 93
The Need to Think Nowp. 94
Coping with Uncertainty
Introduction to Part IIp. 98
Incorporating Information Technology in Defense Planningp. 103
Modest Propositions About the Futurep. 103
Real Revolutions on the Physical Battlefieldp. 107
Hitting What Can Be Seenp. 107
From Contingency to Necessityp. 112
The Coming Architecture of Military Organizationp. 114
Conventional War, Hyperwar, and Mud Warfarep. 117
False Revolutions on the Virtual Battlefieldp. 119
What Is Information Warfare?p. 119
Antisensor Operationsp. 121
Electronic Warfarep. 123
Command-and-Control Warfarep. 124
Psychological Operationsp. 125
The Ghost in the Machinep. 126
The Lesson of September 11p. 128
Uncertainty-Sensitive Planningp. 131
Why So Many Surprises?p. 132
Conceptual Strategic Planningp. 134
Uncertainty-Sensitive Strategic Planningp. 134
Operationalizing Strategic Planning in Portfolio-Management Termsp. 138
Capabilities-Based Planningp. 141
Key Featuresp. 142
Information Technology and Mission-System Analysisp. 144
Multiple Objectives and Measuresp. 145
The Concept of a Scenario Space (an Assumptions Space)p. 146
Choices and Resource Allocationp. 151
Planning the Future Military Workforcep. 157
Military Human Capitalp. 159
Historical Size, Source, and Composition of the Active Forcep. 159
Ongoing Revolutions: Composition, Characteristics, and Attributesp. 165
Looking to the Futurep. 169
Manpower and Personnel Analysisp. 172
The Processp. 172
Choosing Among Alternatives, an Examplep. 174
The Soldier of the 21st Centuryp. 181
Visions of the Futurep. 182
Cyber Soldierp. 182
Information Warriorp. 183
Peace Operationsp. 184
Rapid Response Forcep. 184
Low-Manning Vesselsp. 184
Evolutionary Changep. 185
Experience of the All-Volunteer Forcep. 186
Versatility and Leadershipp. 187
Attracting Quality Personnelp. 189
Economic Theories of Compensationp. 199
Issues for the Futurep. 207
Adapting Best Commercial Practices to Defensep. 211
What Is a Best Commercial Practice?p. 213
Examplesp. 213
Commercial Practice: Neither Monolithic nor Easy to Definep. 214
Why DoD Should Carep. 215
A BCP That DoD Uses Today: Lean Productionp. 217
What About Best Government Practice?p. 218
Operational Total Quality Management and BCPsp. 219
Key Benefits of TQM: Links Between Customers and Processes, and Continuous Improvement of Resulting Systemp. 219
TQM Viewed with Great Suspicion by Many in DoDp. 222
Identifying BCPsp. 223
Adapting BCPs for Use in DoDp. 224
Structural Differences Between DoD and Most Best Commercial Firmsp. 227
An Illustrative Example: Strategic Sourcing as a Basket of BCPsp. 231
BCPs Relevant to DoD's Strategic Goalsp. 233
Key Barriers to DoD's Adaptation of Sourcing BCPsp. 239
Insights from Commercial Experience on Overcoming Key Barriersp. 242
New Tools for Defense Decisionmaking
Introduction to Part IIIp. 248
Exploratory Analysis and Implications for Modelingp. 255
Introductionp. 255
Exploratory Analysisp. 256
Definitionp. 256
Types of Uncertainty in Modelingp. 258
Types of Exploratory Analysisp. 259
Enabling Exploratory Analysisp. 265
Using Occam's Razorp. 269
Multiresolution, Multiperspective Modeling and Model Familiesp. 270
Lessons from Recent Experiencep. 278
Reflecting Uncertainty with Parameters, an Examplep. 282
Using Exploratory Modelingp. 285
The Need for Exploratory Modelingp. 285
The Joint Integrated Contingency Modelp. 286
Sensitivity Analysis and Exploratory Modelingp. 288
Doing Exploratory Modelingp. 290
The Value of Exploratory Modelingp. 297
Assessing Military Information Systemsp. 299
Historical Perspectivep. 300
Context for Assessing Military Information Systems in the 21st Centuryp. 304
Additional Complicating and Supporting Factorsp. 307
NATO Code of Best Practicep. 309
Advances over the Past 25 Yearsp. 319
Residual Challenges: A New Agendap. 320
The "Day After" Methodology and National Security Analysisp. 323
The Methodology in Briefp. 324
Applications and Exercise Developmentp. 326
Strategic Information Warfarep. 327
Cyberpayments and Money Launderingp. 330
Comparison of the Two Implementations of the Methodologyp. 333
The Day After and Analytic Independencep. 335
The Value of the Day Afterp. 337
Using Electronic Meeting Systems to Aid Defense Decisionsp. 339
Electronic Meeting Systemsp. 340
Prioritizing Naval Programs: An Example of an EMS in Usep. 342
The Challengep. 342
Overview of Methodologyp. 344
Other Possible Usesp. 358
Afterwordp. 361
Indexp. 363
About the Authorsp. 389
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program