Surprise Attack : : The Victim’s Perspective / / Ephraim Kam.

A new version of this book is now available. The striking thing about surprise attack is how frequently it succeeds--even in our own day, when improvements in communications and intelligence gathering should make it extremly difficult to sneak up on anyone. Ephraim Kam observes surprise attack throu...

Full description

Saved in:
Bibliographic Details
Superior document:Title is part of eBook package: De Gruyter HUP e-dition: Complete eBook Package
VerfasserIn:
TeilnehmendeR:
MitwirkendeR:
Place / Publishing House:Cambridge, MA : : Harvard University Press, , [2013]
©1988
Year of Publication:2013
Edition:Reprint 2014
Language:English
Online Access:
Physical Description:1 online resource (266 p.) :; 3 tables, 1 line illustration
Tags: Add Tag
No Tags, Be the first to tag this record!
id 9780674493957
ctrlnum (DE-B1597)250506
(OCoLC)900819619
collection bib_alma
record_format marc
spelling Kam, Ephraim, author. aut http://id.loc.gov/vocabulary/relators/aut
Surprise Attack : The Victim’s Perspective / Ephraim Kam.
Reprint 2014
Cambridge, MA : Harvard University Press, [2013]
©1988
1 online resource (266 p.) : 3 tables, 1 line illustration
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
text file PDF rda
Frontmatter -- Acknowledgments -- Contents -- Foreword -- Introduction -- PART ONE. The Components of Surprise Attack -- 1. The Essence of Surprise Attack -- 2. Information and Indicators -- 3. Intentions and Capabilities -- PART TWO. Judgmental Biases and Intelligence Analysis -- 4. Conceptions and Incoming Information -- 5. The Process of Analysis -- PART THREE. The Environment -- 6. The Analyst and the Small Group -- 7. Organizational Obstacles -- 8. Intelligence and Decision Makers -- CONCLUSION -- Notes. Bibliography. Index -- Notes -- Bibliography -- Index
restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star
A new version of this book is now available. The striking thing about surprise attack is how frequently it succeeds--even in our own day, when improvements in communications and intelligence gathering should make it extremly difficult to sneak up on anyone. Ephraim Kam observes surprise attack through the eyes of its victim in order to understand the causes of the victim's failure to to anticipate the coming war. Kam analyzes eleven major surprise attacks that have been launched since the outbreak of World War II (by no means the only ones that occured), starting with the German invasion of Denmark and Norway in 1940 and ending with the Eyptian-Syrian attack on Isreal in 1973, in a systematic comparative effort to find the elements that successful sorties have in common. He tackles the problem on four levels: the individual analyst, the small group, the large organization, and the decision makers. Emphasizing the psychological aspects of warfare, Kam traces the behavior of the victim at various functional levels and from several points of view in order to examine the difficulties, mistakes, and idées fixes that permit a nation to be taken by surprise. He argues that anticipation and prediction of a coming war are more complicated than any other issue of strategic estimation, involving such interdependent factors as analytical contradictions, judgmental biases, organizational obstacles, and political as well as military constraints.
Mode of access: Internet via World Wide Web.
In English.
Description based on online resource; title from PDF title page (publisher's Web site, viewed 24. Aug 2021)
Art et science militaires.
Attaque préventive (Science militaire).
Electronic books.
International relations.
Military art and science.
Military history, Modern.
Militär.
Preemptive attack (Military science).
Relations internationales.
Surprise (Military science).
Surprise (Science militaire).
Military history, Modern -- 20th century.
Surprise.
POLITICAL SCIENCE / General. bisacsh
Schelling, Thomas C.
Schelling, Thomas C., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Title is part of eBook package: De Gruyter HUP e-dition: Complete eBook Package 9783110353488 ZDB-23-HCO
Title is part of eBook package: De Gruyter HUP e-dition: Law & Political Science eBook Package 9783110353495 ZDB-23-HLP
Title is part of eBook package: De Gruyter HUP eBook Package Archive 1893-1999 9783110442212
print 9780674493964
https://doi.org/10.4159/harvard.9780674493957
https://www.degruyter.com/isbn/9780674493957
Cover https://www.degruyter.com/cover/covers/9780674493957.jpg
language English
format eBook
author Kam, Ephraim,
Kam, Ephraim,
spellingShingle Kam, Ephraim,
Kam, Ephraim,
Surprise Attack : The Victim’s Perspective /
Frontmatter --
Acknowledgments --
Contents --
Foreword --
Introduction --
PART ONE. The Components of Surprise Attack --
1. The Essence of Surprise Attack --
2. Information and Indicators --
3. Intentions and Capabilities --
PART TWO. Judgmental Biases and Intelligence Analysis --
4. Conceptions and Incoming Information --
5. The Process of Analysis --
PART THREE. The Environment --
6. The Analyst and the Small Group --
7. Organizational Obstacles --
8. Intelligence and Decision Makers --
CONCLUSION --
Notes. Bibliography. Index --
Notes --
Bibliography --
Index
author_facet Kam, Ephraim,
Kam, Ephraim,
Schelling, Thomas C.
Schelling, Thomas C.,
Schelling, Thomas C.,
author_variant e k ek
e k ek
author_role VerfasserIn
VerfasserIn
author2 Schelling, Thomas C.
Schelling, Thomas C.,
Schelling, Thomas C.,
author2_variant t c s tc tcs
t c s tc tcs
t c s tc tcs
author2_role TeilnehmendeR
MitwirkendeR
MitwirkendeR
author_sort Kam, Ephraim,
title Surprise Attack : The Victim’s Perspective /
title_sub The Victim’s Perspective /
title_full Surprise Attack : The Victim’s Perspective / Ephraim Kam.
title_fullStr Surprise Attack : The Victim’s Perspective / Ephraim Kam.
title_full_unstemmed Surprise Attack : The Victim’s Perspective / Ephraim Kam.
title_auth Surprise Attack : The Victim’s Perspective /
title_alt Frontmatter --
Acknowledgments --
Contents --
Foreword --
Introduction --
PART ONE. The Components of Surprise Attack --
1. The Essence of Surprise Attack --
2. Information and Indicators --
3. Intentions and Capabilities --
PART TWO. Judgmental Biases and Intelligence Analysis --
4. Conceptions and Incoming Information --
5. The Process of Analysis --
PART THREE. The Environment --
6. The Analyst and the Small Group --
7. Organizational Obstacles --
8. Intelligence and Decision Makers --
CONCLUSION --
Notes. Bibliography. Index --
Notes --
Bibliography --
Index
title_new Surprise Attack :
title_sort surprise attack : the victim’s perspective /
publisher Harvard University Press,
publishDate 2013
physical 1 online resource (266 p.) : 3 tables, 1 line illustration
edition Reprint 2014
contents Frontmatter --
Acknowledgments --
Contents --
Foreword --
Introduction --
PART ONE. The Components of Surprise Attack --
1. The Essence of Surprise Attack --
2. Information and Indicators --
3. Intentions and Capabilities --
PART TWO. Judgmental Biases and Intelligence Analysis --
4. Conceptions and Incoming Information --
5. The Process of Analysis --
PART THREE. The Environment --
6. The Analyst and the Small Group --
7. Organizational Obstacles --
8. Intelligence and Decision Makers --
CONCLUSION --
Notes. Bibliography. Index --
Notes --
Bibliography --
Index
isbn 9780674493957
9783110353488
9783110353495
9783110442212
9780674493964
url https://doi.org/10.4159/harvard.9780674493957
https://www.degruyter.com/isbn/9780674493957
https://www.degruyter.com/cover/covers/9780674493957.jpg
illustrated Not Illustrated
dewey-hundreds 300 - Social sciences
dewey-tens 350 - Public administration & military science
dewey-ones 355 - Military science
dewey-full 355.4/3
dewey-sort 3355.4 13
dewey-raw 355.4/3
dewey-search 355.4/3
doi_str_mv 10.4159/harvard.9780674493957
oclc_num 900819619
work_keys_str_mv AT kamephraim surpriseattackthevictimsperspective
AT schellingthomasc surpriseattackthevictimsperspective
status_str n
ids_txt_mv (DE-B1597)250506
(OCoLC)900819619
carrierType_str_mv cr
hierarchy_parent_title Title is part of eBook package: De Gruyter HUP e-dition: Complete eBook Package
Title is part of eBook package: De Gruyter HUP e-dition: Law & Political Science eBook Package
Title is part of eBook package: De Gruyter HUP eBook Package Archive 1893-1999
is_hierarchy_title Surprise Attack : The Victim’s Perspective /
container_title Title is part of eBook package: De Gruyter HUP e-dition: Complete eBook Package
author2_original_writing_str_mv noLinkedField
noLinkedField
noLinkedField
_version_ 1806143235192520704
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05846nam a22010455i 4500</leader><controlfield tag="001">9780674493957</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20210824034702.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">210824t20131988mau fo d z eng d</controlfield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)1013937843</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)1029825000</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)1032679060</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)1037981684</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)1042011531</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)1046612375</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)1047023660</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)1049625926</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)1054865220</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780674493957</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4159/harvard.9780674493957</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)250506</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)900819619</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">mau</subfield><subfield code="c">US-MA</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL000000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">355.4/3</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kam, Ephraim, </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Surprise Attack :</subfield><subfield code="b">The Victim’s Perspective /</subfield><subfield code="c">Ephraim Kam.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Reprint 2014</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge, MA : </subfield><subfield code="b">Harvard University Press, </subfield><subfield code="c">[2013]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©1988</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (266 p.) :</subfield><subfield code="b">3 tables, 1 line illustration</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Acknowledgments -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">Foreword -- </subfield><subfield code="t">Introduction -- </subfield><subfield code="t">PART ONE. The Components of Surprise Attack -- </subfield><subfield code="t">1. The Essence of Surprise Attack -- </subfield><subfield code="t">2. Information and Indicators -- </subfield><subfield code="t">3. Intentions and Capabilities -- </subfield><subfield code="t">PART TWO. Judgmental Biases and Intelligence Analysis -- </subfield><subfield code="t">4. Conceptions and Incoming Information -- </subfield><subfield code="t">5. The Process of Analysis -- </subfield><subfield code="t">PART THREE. The Environment -- </subfield><subfield code="t">6. The Analyst and the Small Group -- </subfield><subfield code="t">7. Organizational Obstacles -- </subfield><subfield code="t">8. Intelligence and Decision Makers -- </subfield><subfield code="t">CONCLUSION -- </subfield><subfield code="t">Notes. Bibliography. Index -- </subfield><subfield code="t">Notes -- </subfield><subfield code="t">Bibliography -- </subfield><subfield code="t">Index</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">A new version of this book is now available. The striking thing about surprise attack is how frequently it succeeds--even in our own day, when improvements in communications and intelligence gathering should make it extremly difficult to sneak up on anyone. Ephraim Kam observes surprise attack through the eyes of its victim in order to understand the causes of the victim's failure to to anticipate the coming war. Kam analyzes eleven major surprise attacks that have been launched since the outbreak of World War II (by no means the only ones that occured), starting with the German invasion of Denmark and Norway in 1940 and ending with the Eyptian-Syrian attack on Isreal in 1973, in a systematic comparative effort to find the elements that successful sorties have in common. He tackles the problem on four levels: the individual analyst, the small group, the large organization, and the decision makers. Emphasizing the psychological aspects of warfare, Kam traces the behavior of the victim at various functional levels and from several points of view in order to examine the difficulties, mistakes, and idées fixes that permit a nation to be taken by surprise. He argues that anticipation and prediction of a coming war are more complicated than any other issue of strategic estimation, involving such interdependent factors as analytical contradictions, judgmental biases, organizational obstacles, and political as well as military constraints.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 24. Aug 2021)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Art et science militaires.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Attaque préventive (Science militaire).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">International relations.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Military art and science.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Military history, Modern.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Militär.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Preemptive attack (Military science).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Relations internationales.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Surprise (Military science).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Surprise (Science militaire).</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">International relations.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Military art and science.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Military history, Modern -- 20th century.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Preemptive attack (Military science).</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Surprise.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Schelling, Thomas C.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Schelling, Thomas C., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">HUP e-dition: Complete eBook Package</subfield><subfield code="z">9783110353488</subfield><subfield code="o">ZDB-23-HCO</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">HUP e-dition: Law &amp; Political Science eBook Package</subfield><subfield code="z">9783110353495</subfield><subfield code="o">ZDB-23-HLP</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">HUP eBook Package Archive 1893-1999</subfield><subfield code="z">9783110442212</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">print</subfield><subfield code="z">9780674493964</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4159/harvard.9780674493957</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9780674493957</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/cover/covers/9780674493957.jpg</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-044221-2 HUP eBook Package Archive 1893-1999</subfield><subfield code="c">1893</subfield><subfield code="d">1999</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_BACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_PPALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_SSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_STMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA11SSHE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA12STME</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA13ENGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA17SSHEE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA5EBK</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-HCO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-HLP</subfield></datafield></record></collection>