Surprise Attack : : The Victim’s Perspective, With a New Preface / / Ephraim Kam.
Ephraim Kam observes surprise attack through the eyes of its victim in order to understand the causes of the victim’s failure to anticipate the coming of war. Emphasizing the psychological aspect of warfare, Kam traces the behavior of the victim at various functional levels and from several points o...
Saved in:
VerfasserIn: | |
---|---|
MitwirkendeR: | |
Place / Publishing House: | Cambridge, MA : : Harvard University Press, , [2009] ©2004 |
Year of Publication: | 2009 |
Language: | English |
Online Access: | |
Physical Description: | 1 online resource (304 p.) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
9780674039292 |
---|---|
ctrlnum |
(DE-B1597)574630 (OCoLC)1262307698 |
collection |
bib_alma |
record_format |
marc |
spelling |
Kam, Ephraim, author. aut http://id.loc.gov/vocabulary/relators/aut Surprise Attack : The Victim’s Perspective, With a New Preface / Ephraim Kam. Cambridge, MA : Harvard University Press, [2009] ©2004 1 online resource (304 p.) text txt rdacontent computer c rdamedia online resource cr rdacarrier text file PDF rda Frontmatter -- Acknowledgments -- Contents -- Foreword -- Preface, 2004: Old Patterns, New Lessons -- Introduction -- Part I. The Components of Surprise Attack -- 1. The Essence of Surprise Attack -- 2. Information and Indicators -- 3. Intentions and Capabilities -- Part II. Judgmental Biases and Intelligence Analysis -- 4. Conceptions and Incoming Information -- 5. The Process of Analysis -- Part III. The Environment -- 6. The Analyst and the Small Group -- 7. Organizational Obstacles -- 8. Intelligence and Decision Makers -- Conclusion: Is Surprise Attack Inevitable? -- Notes -- Bibliography -- Index restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star Ephraim Kam observes surprise attack through the eyes of its victim in order to understand the causes of the victim’s failure to anticipate the coming of war. Emphasizing the psychological aspect of warfare, Kam traces the behavior of the victim at various functional levels and from several points of view in order to examine the difficulties and mistakes that permit a nation to be taken by surprise. He argues that anticipation and prediction of a coming war are more complicated than any other issue of strategic estimation, involving such interdependent factors as analytical contradictions, judgmental biases, organizational obstacles, and political as well as military constraints. Mode of access: Internet via World Wide Web. In English. Description based on online resource; title from PDF title page (publisher's Web site, viewed 03. Jul 2024) HISTORY / Military / Strategy. bisacsh Schelling, Thomas C., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb https://doi.org/10.4159/9780674039292?locatt=mode:legacy https://www.degruyter.com/isbn/9780674039292 Cover https://www.degruyter.com/document/cover/isbn/9780674039292/original |
language |
English |
format |
eBook |
author |
Kam, Ephraim, Kam, Ephraim, |
spellingShingle |
Kam, Ephraim, Kam, Ephraim, Surprise Attack : The Victim’s Perspective, With a New Preface / Frontmatter -- Acknowledgments -- Contents -- Foreword -- Preface, 2004: Old Patterns, New Lessons -- Introduction -- Part I. The Components of Surprise Attack -- 1. The Essence of Surprise Attack -- 2. Information and Indicators -- 3. Intentions and Capabilities -- Part II. Judgmental Biases and Intelligence Analysis -- 4. Conceptions and Incoming Information -- 5. The Process of Analysis -- Part III. The Environment -- 6. The Analyst and the Small Group -- 7. Organizational Obstacles -- 8. Intelligence and Decision Makers -- Conclusion: Is Surprise Attack Inevitable? -- Notes -- Bibliography -- Index |
author_facet |
Kam, Ephraim, Kam, Ephraim, Schelling, Thomas C., Schelling, Thomas C., |
author_variant |
e k ek e k ek |
author_role |
VerfasserIn VerfasserIn |
author2 |
Schelling, Thomas C., Schelling, Thomas C., |
author2_variant |
t c s tc tcs t c s tc tcs |
author2_role |
MitwirkendeR MitwirkendeR |
author_sort |
Kam, Ephraim, |
title |
Surprise Attack : The Victim’s Perspective, With a New Preface / |
title_sub |
The Victim’s Perspective, With a New Preface / |
title_full |
Surprise Attack : The Victim’s Perspective, With a New Preface / Ephraim Kam. |
title_fullStr |
Surprise Attack : The Victim’s Perspective, With a New Preface / Ephraim Kam. |
title_full_unstemmed |
Surprise Attack : The Victim’s Perspective, With a New Preface / Ephraim Kam. |
title_auth |
Surprise Attack : The Victim’s Perspective, With a New Preface / |
title_alt |
Frontmatter -- Acknowledgments -- Contents -- Foreword -- Preface, 2004: Old Patterns, New Lessons -- Introduction -- Part I. The Components of Surprise Attack -- 1. The Essence of Surprise Attack -- 2. Information and Indicators -- 3. Intentions and Capabilities -- Part II. Judgmental Biases and Intelligence Analysis -- 4. Conceptions and Incoming Information -- 5. The Process of Analysis -- Part III. The Environment -- 6. The Analyst and the Small Group -- 7. Organizational Obstacles -- 8. Intelligence and Decision Makers -- Conclusion: Is Surprise Attack Inevitable? -- Notes -- Bibliography -- Index |
title_new |
Surprise Attack : |
title_sort |
surprise attack : the victim’s perspective, with a new preface / |
publisher |
Harvard University Press, |
publishDate |
2009 |
physical |
1 online resource (304 p.) |
contents |
Frontmatter -- Acknowledgments -- Contents -- Foreword -- Preface, 2004: Old Patterns, New Lessons -- Introduction -- Part I. The Components of Surprise Attack -- 1. The Essence of Surprise Attack -- 2. Information and Indicators -- 3. Intentions and Capabilities -- Part II. Judgmental Biases and Intelligence Analysis -- 4. Conceptions and Incoming Information -- 5. The Process of Analysis -- Part III. The Environment -- 6. The Analyst and the Small Group -- 7. Organizational Obstacles -- 8. Intelligence and Decision Makers -- Conclusion: Is Surprise Attack Inevitable? -- Notes -- Bibliography -- Index |
isbn |
9780674039292 |
url |
https://doi.org/10.4159/9780674039292?locatt=mode:legacy https://www.degruyter.com/isbn/9780674039292 https://www.degruyter.com/document/cover/isbn/9780674039292/original |
illustrated |
Not Illustrated |
doi_str_mv |
10.4159/9780674039292?locatt=mode:legacy |
oclc_num |
1262307698 |
work_keys_str_mv |
AT kamephraim surpriseattackthevictimsperspectivewithanewpreface AT schellingthomasc surpriseattackthevictimsperspectivewithanewpreface |
status_str |
n |
ids_txt_mv |
(DE-B1597)574630 (OCoLC)1262307698 |
carrierType_str_mv |
cr |
is_hierarchy_title |
Surprise Attack : The Victim’s Perspective, With a New Preface / |
author2_original_writing_str_mv |
noLinkedField noLinkedField |
_version_ |
1806143174958120960 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03333nam a2200553 4500 </leader><controlfield tag="001">9780674039292</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20240703114541.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">240703t20092004mau fo d z eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780674039292</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4159/9780674039292</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)574630</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1262307698</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">mau</subfield><subfield code="c">US-MA</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">HIS027060</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kam, Ephraim, </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Surprise Attack :</subfield><subfield code="b">The Victim’s Perspective, With a New Preface /</subfield><subfield code="c">Ephraim Kam.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge, MA : </subfield><subfield code="b">Harvard University Press, </subfield><subfield code="c">[2009]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2004</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (304 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Acknowledgments -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">Foreword -- </subfield><subfield code="t">Preface, 2004: Old Patterns, New Lessons -- </subfield><subfield code="t">Introduction -- </subfield><subfield code="t">Part I. The Components of Surprise Attack -- </subfield><subfield code="t">1. The Essence of Surprise Attack -- </subfield><subfield code="t">2. Information and Indicators -- </subfield><subfield code="t">3. Intentions and Capabilities -- </subfield><subfield code="t">Part II. Judgmental Biases and Intelligence Analysis -- </subfield><subfield code="t">4. Conceptions and Incoming Information -- </subfield><subfield code="t">5. The Process of Analysis -- </subfield><subfield code="t">Part III. The Environment -- </subfield><subfield code="t">6. The Analyst and the Small Group -- </subfield><subfield code="t">7. Organizational Obstacles -- </subfield><subfield code="t">8. Intelligence and Decision Makers -- </subfield><subfield code="t">Conclusion: Is Surprise Attack Inevitable? -- </subfield><subfield code="t">Notes -- </subfield><subfield code="t">Bibliography -- </subfield><subfield code="t">Index</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Ephraim Kam observes surprise attack through the eyes of its victim in order to understand the causes of the victim’s failure to anticipate the coming of war. Emphasizing the psychological aspect of warfare, Kam traces the behavior of the victim at various functional levels and from several points of view in order to examine the difficulties and mistakes that permit a nation to be taken by surprise. He argues that anticipation and prediction of a coming war are more complicated than any other issue of strategic estimation, involving such interdependent factors as analytical contradictions, judgmental biases, organizational obstacles, and political as well as military constraints.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 03. Jul 2024)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">HISTORY / Military / Strategy.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Schelling, Thomas C., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4159/9780674039292?locatt=mode:legacy</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9780674039292</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/document/cover/isbn/9780674039292/original</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_BACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_HICS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_HICS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_PPALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_SSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield></record></collection> |