Byting back : regaining information superiority against 21st-century insurgents / / Martin C. Libicki ... [et al.] ; prepared for the Office of the Secretary of Defense.

U.S. counterinsurgency efforts in Iraq and Afghanistan have failed to exploit information power, which could be a U.S. advantage but instead is being used advantageously by insurgents. Because insurgency and counterinsurgency involve a battle for the allegiance of a population between a government a...

Full description

Saved in:
Bibliographic Details
Superior document:Rand counterinsurgency study. Paper ; v. 1
:
TeilnehmendeR:
Year of Publication:2007
Edition:1st ed.
Language:English
Series:Rand counterinsurgency study. Paper ; 1.
Physical Description:1 online resource (194 p.)
Notes:"RAND National Defense Research Institute."
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993628470504498
ctrlnum (CKB)1000000000481426
(EBL)322567
(OCoLC)476120111
(SSID)ssj0000116545
(PQKBManifestationID)11128822
(PQKBTitleCode)TC0000116545
(PQKBWorkID)10035522
(PQKB)10153365
(Au-PeEL)EBL3031552
(CaPaEBR)ebr10225483
(OCoLC)923689297
(Au-PeEL)EBL4970007
(CaONFJC)MIL118127
(OCoLC)1027205403
(MiAaPQ)EBC3031552
(MiAaPQ)EBC4970007
(EXLCZ)991000000000481426
collection bib_alma
record_format marc
spelling Byting back [electronic resource] : regaining information superiority against 21st-century insurgents / Martin C. Libicki ... [et al.] ; prepared for the Office of the Secretary of Defense.
1st ed.
Santa Monica, CA : Rand Corporation, 2007.
1 online resource (194 p.)
text txt
computer c
online resource cr
Rand counterinsurgency study. Paper ; v. 1
Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One - Introduction; Chapter Two - The Influence of User Requirements; Chapter Three - The Registry-Census; Chapter Four - A Well-Wired Country; Chapter Five - Embedded Video; Chapter Six - A National Wiki; Chapter Seven - The Principles of ICON; Chapter Eight - Implications and Implementation; Appendix - Disaggregated Information Requirements; Bibliography
U.S. counterinsurgency efforts in Iraq and Afghanistan have failed to exploit information power, which could be a U.S. advantage but instead is being used advantageously by insurgents. Because insurgency and counterinsurgency involve a battle for the allegiance of a population between a government and an armed opposition movement, the key to exploiting information power is to connect with and learn from the population itself, increasing the effectiveness of both the local government and the U.S. military and civilian services engaged in supporting it. Utilizing mostly available networking tech
English
"RAND National Defense Research Institute."
Includes bibliographical references (p. 157-159).
Description based on publisher supplied metadata and other sources.
Insurgency.
Iraq War, 2003-2011.
Afghan War, 2001-2021.
Military art and science United States.
Libicki, Martin C.
National Defense Research Institute (U.S.)
0-8330-4189-4
Rand counterinsurgency study. Paper ; 1.
language English
format Electronic
eBook
author2 Libicki, Martin C.
National Defense Research Institute (U.S.)
author_facet Libicki, Martin C.
National Defense Research Institute (U.S.)
National Defense Research Institute (U.S.)
author2_variant m c l mc mcl
author2_role TeilnehmendeR
TeilnehmendeR
author_corporate National Defense Research Institute (U.S.)
author_sort Libicki, Martin C.
title Byting back regaining information superiority against 21st-century insurgents /
spellingShingle Byting back regaining information superiority against 21st-century insurgents /
Rand counterinsurgency study. Paper ;
Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One - Introduction; Chapter Two - The Influence of User Requirements; Chapter Three - The Registry-Census; Chapter Four - A Well-Wired Country; Chapter Five - Embedded Video; Chapter Six - A National Wiki; Chapter Seven - The Principles of ICON; Chapter Eight - Implications and Implementation; Appendix - Disaggregated Information Requirements; Bibliography
title_sub regaining information superiority against 21st-century insurgents /
title_full Byting back [electronic resource] : regaining information superiority against 21st-century insurgents / Martin C. Libicki ... [et al.] ; prepared for the Office of the Secretary of Defense.
title_fullStr Byting back [electronic resource] : regaining information superiority against 21st-century insurgents / Martin C. Libicki ... [et al.] ; prepared for the Office of the Secretary of Defense.
title_full_unstemmed Byting back [electronic resource] : regaining information superiority against 21st-century insurgents / Martin C. Libicki ... [et al.] ; prepared for the Office of the Secretary of Defense.
title_auth Byting back regaining information superiority against 21st-century insurgents /
title_new Byting back
title_sort byting back regaining information superiority against 21st-century insurgents /
series Rand counterinsurgency study. Paper ;
series2 Rand counterinsurgency study. Paper ;
publisher Rand Corporation,
publishDate 2007
physical 1 online resource (194 p.)
edition 1st ed.
contents Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One - Introduction; Chapter Two - The Influence of User Requirements; Chapter Three - The Registry-Census; Chapter Four - A Well-Wired Country; Chapter Five - Embedded Video; Chapter Six - A National Wiki; Chapter Seven - The Principles of ICON; Chapter Eight - Implications and Implementation; Appendix - Disaggregated Information Requirements; Bibliography
isbn 1-281-18127-7
9786611181277
0-8330-4288-2
0-8330-4189-4
callnumber-first J - Political Science
callnumber-subject JC - Political Theory
callnumber-label JC328
callnumber-sort JC 3328.5 B97 42007
geographic_facet United States.
illustrated Not Illustrated
dewey-hundreds 300 - Social sciences
dewey-tens 320 - Political science
350 - Public administration & military science
dewey-ones 322 - Relation of state to organized groups
355 - Military science
dewey-full 322.4
355.02/18
dewey-sort 3322.4
dewey-raw 322.4
355.02/18
dewey-search 322.4
355.02/18
oclc_num 476120111
923689297
1027205403
work_keys_str_mv AT libickimartinc bytingbackregaininginformationsuperiorityagainst21stcenturyinsurgents
AT nationaldefenseresearchinstituteus bytingbackregaininginformationsuperiorityagainst21stcenturyinsurgents
status_str n
ids_txt_mv (CKB)1000000000481426
(EBL)322567
(OCoLC)476120111
(SSID)ssj0000116545
(PQKBManifestationID)11128822
(PQKBTitleCode)TC0000116545
(PQKBWorkID)10035522
(PQKB)10153365
(Au-PeEL)EBL3031552
(CaPaEBR)ebr10225483
(OCoLC)923689297
(Au-PeEL)EBL4970007
(CaONFJC)MIL118127
(OCoLC)1027205403
(MiAaPQ)EBC3031552
(MiAaPQ)EBC4970007
(EXLCZ)991000000000481426
carrierType_str_mv cr
hierarchy_parent_title Rand counterinsurgency study. Paper ; v. 1
hierarchy_sequence 1.
is_hierarchy_title Byting back regaining information superiority against 21st-century insurgents /
container_title Rand counterinsurgency study. Paper ; v. 1
author2_original_writing_str_mv noLinkedField
noLinkedField
_version_ 1796653678805909504
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03158nam a2200637Ia 4500</leader><controlfield tag="001">993628470504498</controlfield><controlfield tag="005">20240410184339.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr#-n---------</controlfield><controlfield tag="008">070910s2007 cau ob 000 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1-281-18127-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786611181277</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0-8330-4288-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)1000000000481426</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EBL)322567</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)476120111</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(SSID)ssj0000116545</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBManifestationID)11128822</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBTitleCode)TC0000116545</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBWorkID)10035522</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKB)10153365</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL3031552</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr10225483</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)923689297</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL4970007</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaONFJC)MIL118127</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1027205403</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC3031552</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC4970007</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)991000000000481426</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">JC328.5</subfield><subfield code="b">.B97 2007</subfield></datafield><datafield tag="082" ind1="0" ind2="0"><subfield code="a">322.4</subfield><subfield code="a">355.02/18</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Byting back</subfield><subfield code="h">[electronic resource] :</subfield><subfield code="b">regaining information superiority against 21st-century insurgents /</subfield><subfield code="c">Martin C. Libicki ... [et al.] ; prepared for the Office of the Secretary of Defense.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Santa Monica, CA :</subfield><subfield code="b">Rand Corporation,</subfield><subfield code="c">2007.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (194 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Rand counterinsurgency study. Paper ;</subfield><subfield code="v">v. 1</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One - Introduction; Chapter Two - The Influence of User Requirements; Chapter Three - The Registry-Census; Chapter Four - A Well-Wired Country; Chapter Five - Embedded Video; Chapter Six - A National Wiki; Chapter Seven - The Principles of ICON; Chapter Eight - Implications and Implementation; Appendix - Disaggregated Information Requirements; Bibliography</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">U.S. counterinsurgency efforts in Iraq and Afghanistan have failed to exploit information power, which could be a U.S. advantage but instead is being used advantageously by insurgents. Because insurgency and counterinsurgency involve a battle for the allegiance of a population between a government and an armed opposition movement, the key to exploiting information power is to connect with and learn from the population itself, increasing the effectiveness of both the local government and the U.S. military and civilian services engaged in supporting it. Utilizing mostly available networking tech</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"RAND National Defense Research Institute."</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (p. 157-159).</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Insurgency.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Iraq War, 2003-2011.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Afghan War, 2001-2021.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Military art and science</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Libicki, Martin C.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">National Defense Research Institute (U.S.)</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">0-8330-4189-4</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Rand counterinsurgency study.</subfield><subfield code="p">Paper ;</subfield><subfield code="v">1.</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2024-04-12 07:39:53 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2012-02-26 00:45:55 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5350460940004498&amp;Force_direct=true</subfield><subfield code="Z">5350460940004498</subfield><subfield code="b">Available</subfield><subfield code="8">5350460940004498</subfield></datafield></record></collection>