Surprise Attack : : The Victim’s Perspective / / Ephraim Kam.
A new version of this book is now available. The striking thing about surprise attack is how frequently it succeeds--even in our own day, when improvements in communications and intelligence gathering should make it extremly difficult to sneak up on anyone. Ephraim Kam observes surprise attack throu...
Saved in:
Superior document: | Title is part of eBook package: De Gruyter HUP e-dition: Complete eBook Package |
---|---|
VerfasserIn: | |
TeilnehmendeR: | |
MitwirkendeR: | |
Place / Publishing House: | Cambridge, MA : : Harvard University Press, , [2013] ©1988 |
Year of Publication: | 2013 |
Edition: | Reprint 2014 |
Language: | English |
Online Access: | |
Physical Description: | 1 online resource (266 p.) :; 3 tables, 1 line illustration |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
9780674493957 |
---|---|
ctrlnum |
(DE-B1597)250506 (OCoLC)900819619 |
collection |
bib_alma |
record_format |
marc |
spelling |
Kam, Ephraim, author. aut http://id.loc.gov/vocabulary/relators/aut Surprise Attack : The Victim’s Perspective / Ephraim Kam. Reprint 2014 Cambridge, MA : Harvard University Press, [2013] ©1988 1 online resource (266 p.) : 3 tables, 1 line illustration text txt rdacontent computer c rdamedia online resource cr rdacarrier text file PDF rda Frontmatter -- Acknowledgments -- Contents -- Foreword -- Introduction -- PART ONE. The Components of Surprise Attack -- 1. The Essence of Surprise Attack -- 2. Information and Indicators -- 3. Intentions and Capabilities -- PART TWO. Judgmental Biases and Intelligence Analysis -- 4. Conceptions and Incoming Information -- 5. The Process of Analysis -- PART THREE. The Environment -- 6. The Analyst and the Small Group -- 7. Organizational Obstacles -- 8. Intelligence and Decision Makers -- CONCLUSION -- Notes. Bibliography. Index -- Notes -- Bibliography -- Index restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star A new version of this book is now available. The striking thing about surprise attack is how frequently it succeeds--even in our own day, when improvements in communications and intelligence gathering should make it extremly difficult to sneak up on anyone. Ephraim Kam observes surprise attack through the eyes of its victim in order to understand the causes of the victim's failure to to anticipate the coming war. Kam analyzes eleven major surprise attacks that have been launched since the outbreak of World War II (by no means the only ones that occured), starting with the German invasion of Denmark and Norway in 1940 and ending with the Eyptian-Syrian attack on Isreal in 1973, in a systematic comparative effort to find the elements that successful sorties have in common. He tackles the problem on four levels: the individual analyst, the small group, the large organization, and the decision makers. Emphasizing the psychological aspects of warfare, Kam traces the behavior of the victim at various functional levels and from several points of view in order to examine the difficulties, mistakes, and idées fixes that permit a nation to be taken by surprise. He argues that anticipation and prediction of a coming war are more complicated than any other issue of strategic estimation, involving such interdependent factors as analytical contradictions, judgmental biases, organizational obstacles, and political as well as military constraints. Mode of access: Internet via World Wide Web. In English. Description based on online resource; title from PDF title page (publisher's Web site, viewed 24. Aug 2021) Art et science militaires. Attaque préventive (Science militaire). Electronic books. International relations. Military art and science. Military history, Modern. Militär. Preemptive attack (Military science). Relations internationales. Surprise (Military science). Surprise (Science militaire). Military history, Modern -- 20th century. Surprise. POLITICAL SCIENCE / General. bisacsh Schelling, Thomas C. Schelling, Thomas C., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Title is part of eBook package: De Gruyter HUP e-dition: Complete eBook Package 9783110353488 ZDB-23-HCO Title is part of eBook package: De Gruyter HUP e-dition: Law & Political Science eBook Package 9783110353495 ZDB-23-HLP Title is part of eBook package: De Gruyter HUP eBook Package Archive 1893-1999 9783110442212 print 9780674493964 https://doi.org/10.4159/harvard.9780674493957 https://www.degruyter.com/isbn/9780674493957 Cover https://www.degruyter.com/cover/covers/9780674493957.jpg |
language |
English |
format |
eBook |
author |
Kam, Ephraim, Kam, Ephraim, |
spellingShingle |
Kam, Ephraim, Kam, Ephraim, Surprise Attack : The Victim’s Perspective / Frontmatter -- Acknowledgments -- Contents -- Foreword -- Introduction -- PART ONE. The Components of Surprise Attack -- 1. The Essence of Surprise Attack -- 2. Information and Indicators -- 3. Intentions and Capabilities -- PART TWO. Judgmental Biases and Intelligence Analysis -- 4. Conceptions and Incoming Information -- 5. The Process of Analysis -- PART THREE. The Environment -- 6. The Analyst and the Small Group -- 7. Organizational Obstacles -- 8. Intelligence and Decision Makers -- CONCLUSION -- Notes. Bibliography. Index -- Notes -- Bibliography -- Index |
author_facet |
Kam, Ephraim, Kam, Ephraim, Schelling, Thomas C. Schelling, Thomas C., Schelling, Thomas C., |
author_variant |
e k ek e k ek |
author_role |
VerfasserIn VerfasserIn |
author2 |
Schelling, Thomas C. Schelling, Thomas C., Schelling, Thomas C., |
author2_variant |
t c s tc tcs t c s tc tcs t c s tc tcs |
author2_role |
TeilnehmendeR MitwirkendeR MitwirkendeR |
author_sort |
Kam, Ephraim, |
title |
Surprise Attack : The Victim’s Perspective / |
title_sub |
The Victim’s Perspective / |
title_full |
Surprise Attack : The Victim’s Perspective / Ephraim Kam. |
title_fullStr |
Surprise Attack : The Victim’s Perspective / Ephraim Kam. |
title_full_unstemmed |
Surprise Attack : The Victim’s Perspective / Ephraim Kam. |
title_auth |
Surprise Attack : The Victim’s Perspective / |
title_alt |
Frontmatter -- Acknowledgments -- Contents -- Foreword -- Introduction -- PART ONE. The Components of Surprise Attack -- 1. The Essence of Surprise Attack -- 2. Information and Indicators -- 3. Intentions and Capabilities -- PART TWO. Judgmental Biases and Intelligence Analysis -- 4. Conceptions and Incoming Information -- 5. The Process of Analysis -- PART THREE. The Environment -- 6. The Analyst and the Small Group -- 7. Organizational Obstacles -- 8. Intelligence and Decision Makers -- CONCLUSION -- Notes. Bibliography. Index -- Notes -- Bibliography -- Index |
title_new |
Surprise Attack : |
title_sort |
surprise attack : the victim’s perspective / |
publisher |
Harvard University Press, |
publishDate |
2013 |
physical |
1 online resource (266 p.) : 3 tables, 1 line illustration |
edition |
Reprint 2014 |
contents |
Frontmatter -- Acknowledgments -- Contents -- Foreword -- Introduction -- PART ONE. The Components of Surprise Attack -- 1. The Essence of Surprise Attack -- 2. Information and Indicators -- 3. Intentions and Capabilities -- PART TWO. Judgmental Biases and Intelligence Analysis -- 4. Conceptions and Incoming Information -- 5. The Process of Analysis -- PART THREE. The Environment -- 6. The Analyst and the Small Group -- 7. Organizational Obstacles -- 8. Intelligence and Decision Makers -- CONCLUSION -- Notes. Bibliography. Index -- Notes -- Bibliography -- Index |
isbn |
9780674493957 9783110353488 9783110353495 9783110442212 9780674493964 |
url |
https://doi.org/10.4159/harvard.9780674493957 https://www.degruyter.com/isbn/9780674493957 https://www.degruyter.com/cover/covers/9780674493957.jpg |
illustrated |
Not Illustrated |
dewey-hundreds |
300 - Social sciences |
dewey-tens |
350 - Public administration & military science |
dewey-ones |
355 - Military science |
dewey-full |
355.4/3 |
dewey-sort |
3355.4 13 |
dewey-raw |
355.4/3 |
dewey-search |
355.4/3 |
doi_str_mv |
10.4159/harvard.9780674493957 |
oclc_num |
900819619 |
work_keys_str_mv |
AT kamephraim surpriseattackthevictimsperspective AT schellingthomasc surpriseattackthevictimsperspective |
status_str |
n |
ids_txt_mv |
(DE-B1597)250506 (OCoLC)900819619 |
carrierType_str_mv |
cr |
hierarchy_parent_title |
Title is part of eBook package: De Gruyter HUP e-dition: Complete eBook Package Title is part of eBook package: De Gruyter HUP e-dition: Law & Political Science eBook Package Title is part of eBook package: De Gruyter HUP eBook Package Archive 1893-1999 |
is_hierarchy_title |
Surprise Attack : The Victim’s Perspective / |
container_title |
Title is part of eBook package: De Gruyter HUP e-dition: Complete eBook Package |
author2_original_writing_str_mv |
noLinkedField noLinkedField noLinkedField |
_version_ |
1806143235192520704 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05846nam a22010455i 4500</leader><controlfield tag="001">9780674493957</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20210824034702.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">210824t20131988mau fo d z eng d</controlfield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)1013937843</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)1029825000</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)1032679060</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)1037981684</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)1042011531</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)1046612375</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)1047023660</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)1049625926</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)1054865220</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780674493957</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4159/harvard.9780674493957</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)250506</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)900819619</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">mau</subfield><subfield code="c">US-MA</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL000000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">355.4/3</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kam, Ephraim, </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Surprise Attack :</subfield><subfield code="b">The Victim’s Perspective /</subfield><subfield code="c">Ephraim Kam.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Reprint 2014</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge, MA : </subfield><subfield code="b">Harvard University Press, </subfield><subfield code="c">[2013]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©1988</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (266 p.) :</subfield><subfield code="b">3 tables, 1 line illustration</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Acknowledgments -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">Foreword -- </subfield><subfield code="t">Introduction -- </subfield><subfield code="t">PART ONE. The Components of Surprise Attack -- </subfield><subfield code="t">1. The Essence of Surprise Attack -- </subfield><subfield code="t">2. Information and Indicators -- </subfield><subfield code="t">3. Intentions and Capabilities -- </subfield><subfield code="t">PART TWO. Judgmental Biases and Intelligence Analysis -- </subfield><subfield code="t">4. Conceptions and Incoming Information -- </subfield><subfield code="t">5. The Process of Analysis -- </subfield><subfield code="t">PART THREE. The Environment -- </subfield><subfield code="t">6. The Analyst and the Small Group -- </subfield><subfield code="t">7. Organizational Obstacles -- </subfield><subfield code="t">8. Intelligence and Decision Makers -- </subfield><subfield code="t">CONCLUSION -- </subfield><subfield code="t">Notes. Bibliography. Index -- </subfield><subfield code="t">Notes -- </subfield><subfield code="t">Bibliography -- </subfield><subfield code="t">Index</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">A new version of this book is now available. The striking thing about surprise attack is how frequently it succeeds--even in our own day, when improvements in communications and intelligence gathering should make it extremly difficult to sneak up on anyone. Ephraim Kam observes surprise attack through the eyes of its victim in order to understand the causes of the victim's failure to to anticipate the coming war. Kam analyzes eleven major surprise attacks that have been launched since the outbreak of World War II (by no means the only ones that occured), starting with the German invasion of Denmark and Norway in 1940 and ending with the Eyptian-Syrian attack on Isreal in 1973, in a systematic comparative effort to find the elements that successful sorties have in common. He tackles the problem on four levels: the individual analyst, the small group, the large organization, and the decision makers. Emphasizing the psychological aspects of warfare, Kam traces the behavior of the victim at various functional levels and from several points of view in order to examine the difficulties, mistakes, and idées fixes that permit a nation to be taken by surprise. He argues that anticipation and prediction of a coming war are more complicated than any other issue of strategic estimation, involving such interdependent factors as analytical contradictions, judgmental biases, organizational obstacles, and political as well as military constraints.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 24. Aug 2021)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Art et science militaires.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Attaque préventive (Science militaire).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">International relations.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Military art and science.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Military history, Modern.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Militär.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Preemptive attack (Military science).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Relations internationales.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Surprise (Military science).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Surprise (Science militaire).</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">International relations.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Military art and science.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Military history, Modern -- 20th century.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Preemptive attack (Military science).</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Surprise.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Schelling, Thomas C.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Schelling, Thomas C., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">HUP e-dition: Complete eBook Package</subfield><subfield code="z">9783110353488</subfield><subfield code="o">ZDB-23-HCO</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">HUP e-dition: Law & Political Science eBook Package</subfield><subfield code="z">9783110353495</subfield><subfield code="o">ZDB-23-HLP</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">HUP eBook Package Archive 1893-1999</subfield><subfield code="z">9783110442212</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">print</subfield><subfield code="z">9780674493964</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4159/harvard.9780674493957</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9780674493957</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/cover/covers/9780674493957.jpg</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-044221-2 HUP eBook Package Archive 1893-1999</subfield><subfield code="c">1893</subfield><subfield code="d">1999</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_BACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_PPALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_SSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_STMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA11SSHE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA12STME</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA13ENGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA17SSHEE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA5EBK</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-HCO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-HLP</subfield></datafield></record></collection> |