Byting back : regaining information superiority against 21st-century insurgents / / Martin C. Libicki ... [et al.] ; prepared for the Office of the Secretary of Defense.
U.S. counterinsurgency efforts in Iraq and Afghanistan have failed to exploit information power, which could be a U.S. advantage but instead is being used advantageously by insurgents. Because insurgency and counterinsurgency involve a battle for the allegiance of a population between a government a...
Saved in:
Superior document: | Rand counterinsurgency study. Paper ; v. 1 |
---|---|
: | |
TeilnehmendeR: | |
Year of Publication: | 2007 |
Edition: | 1st ed. |
Language: | English |
Series: | Rand counterinsurgency study. Paper ;
1. |
Physical Description: | 1 online resource (194 p.) |
Notes: | "RAND National Defense Research Institute." |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
993628470504498 |
---|---|
ctrlnum |
(CKB)1000000000481426 (EBL)322567 (OCoLC)476120111 (SSID)ssj0000116545 (PQKBManifestationID)11128822 (PQKBTitleCode)TC0000116545 (PQKBWorkID)10035522 (PQKB)10153365 (Au-PeEL)EBL3031552 (CaPaEBR)ebr10225483 (OCoLC)923689297 (Au-PeEL)EBL4970007 (CaONFJC)MIL118127 (OCoLC)1027205403 (MiAaPQ)EBC3031552 (MiAaPQ)EBC4970007 (EXLCZ)991000000000481426 |
collection |
bib_alma |
record_format |
marc |
spelling |
Byting back [electronic resource] : regaining information superiority against 21st-century insurgents / Martin C. Libicki ... [et al.] ; prepared for the Office of the Secretary of Defense. 1st ed. Santa Monica, CA : Rand Corporation, 2007. 1 online resource (194 p.) text txt computer c online resource cr Rand counterinsurgency study. Paper ; v. 1 Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One - Introduction; Chapter Two - The Influence of User Requirements; Chapter Three - The Registry-Census; Chapter Four - A Well-Wired Country; Chapter Five - Embedded Video; Chapter Six - A National Wiki; Chapter Seven - The Principles of ICON; Chapter Eight - Implications and Implementation; Appendix - Disaggregated Information Requirements; Bibliography U.S. counterinsurgency efforts in Iraq and Afghanistan have failed to exploit information power, which could be a U.S. advantage but instead is being used advantageously by insurgents. Because insurgency and counterinsurgency involve a battle for the allegiance of a population between a government and an armed opposition movement, the key to exploiting information power is to connect with and learn from the population itself, increasing the effectiveness of both the local government and the U.S. military and civilian services engaged in supporting it. Utilizing mostly available networking tech English "RAND National Defense Research Institute." Includes bibliographical references (p. 157-159). Description based on publisher supplied metadata and other sources. Insurgency. Iraq War, 2003-2011. Afghan War, 2001-2021. Military art and science United States. Libicki, Martin C. National Defense Research Institute (U.S.) 0-8330-4189-4 Rand counterinsurgency study. Paper ; 1. |
language |
English |
format |
Electronic eBook |
author2 |
Libicki, Martin C. National Defense Research Institute (U.S.) |
author_facet |
Libicki, Martin C. National Defense Research Institute (U.S.) National Defense Research Institute (U.S.) |
author2_variant |
m c l mc mcl |
author2_role |
TeilnehmendeR TeilnehmendeR |
author_corporate |
National Defense Research Institute (U.S.) |
author_sort |
Libicki, Martin C. |
title |
Byting back regaining information superiority against 21st-century insurgents / |
spellingShingle |
Byting back regaining information superiority against 21st-century insurgents / Rand counterinsurgency study. Paper ; Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One - Introduction; Chapter Two - The Influence of User Requirements; Chapter Three - The Registry-Census; Chapter Four - A Well-Wired Country; Chapter Five - Embedded Video; Chapter Six - A National Wiki; Chapter Seven - The Principles of ICON; Chapter Eight - Implications and Implementation; Appendix - Disaggregated Information Requirements; Bibliography |
title_sub |
regaining information superiority against 21st-century insurgents / |
title_full |
Byting back [electronic resource] : regaining information superiority against 21st-century insurgents / Martin C. Libicki ... [et al.] ; prepared for the Office of the Secretary of Defense. |
title_fullStr |
Byting back [electronic resource] : regaining information superiority against 21st-century insurgents / Martin C. Libicki ... [et al.] ; prepared for the Office of the Secretary of Defense. |
title_full_unstemmed |
Byting back [electronic resource] : regaining information superiority against 21st-century insurgents / Martin C. Libicki ... [et al.] ; prepared for the Office of the Secretary of Defense. |
title_auth |
Byting back regaining information superiority against 21st-century insurgents / |
title_new |
Byting back |
title_sort |
byting back regaining information superiority against 21st-century insurgents / |
series |
Rand counterinsurgency study. Paper ; |
series2 |
Rand counterinsurgency study. Paper ; |
publisher |
Rand Corporation, |
publishDate |
2007 |
physical |
1 online resource (194 p.) |
edition |
1st ed. |
contents |
Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One - Introduction; Chapter Two - The Influence of User Requirements; Chapter Three - The Registry-Census; Chapter Four - A Well-Wired Country; Chapter Five - Embedded Video; Chapter Six - A National Wiki; Chapter Seven - The Principles of ICON; Chapter Eight - Implications and Implementation; Appendix - Disaggregated Information Requirements; Bibliography |
isbn |
1-281-18127-7 9786611181277 0-8330-4288-2 0-8330-4189-4 |
callnumber-first |
J - Political Science |
callnumber-subject |
JC - Political Theory |
callnumber-label |
JC328 |
callnumber-sort |
JC 3328.5 B97 42007 |
geographic_facet |
United States. |
illustrated |
Not Illustrated |
dewey-hundreds |
300 - Social sciences |
dewey-tens |
320 - Political science 350 - Public administration & military science |
dewey-ones |
322 - Relation of state to organized groups 355 - Military science |
dewey-full |
322.4 355.02/18 |
dewey-sort |
3322.4 |
dewey-raw |
322.4 355.02/18 |
dewey-search |
322.4 355.02/18 |
oclc_num |
476120111 923689297 1027205403 |
work_keys_str_mv |
AT libickimartinc bytingbackregaininginformationsuperiorityagainst21stcenturyinsurgents AT nationaldefenseresearchinstituteus bytingbackregaininginformationsuperiorityagainst21stcenturyinsurgents |
status_str |
n |
ids_txt_mv |
(CKB)1000000000481426 (EBL)322567 (OCoLC)476120111 (SSID)ssj0000116545 (PQKBManifestationID)11128822 (PQKBTitleCode)TC0000116545 (PQKBWorkID)10035522 (PQKB)10153365 (Au-PeEL)EBL3031552 (CaPaEBR)ebr10225483 (OCoLC)923689297 (Au-PeEL)EBL4970007 (CaONFJC)MIL118127 (OCoLC)1027205403 (MiAaPQ)EBC3031552 (MiAaPQ)EBC4970007 (EXLCZ)991000000000481426 |
carrierType_str_mv |
cr |
hierarchy_parent_title |
Rand counterinsurgency study. Paper ; v. 1 |
hierarchy_sequence |
1. |
is_hierarchy_title |
Byting back regaining information superiority against 21st-century insurgents / |
container_title |
Rand counterinsurgency study. Paper ; v. 1 |
author2_original_writing_str_mv |
noLinkedField noLinkedField |
_version_ |
1796653678805909504 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03158nam a2200637Ia 4500</leader><controlfield tag="001">993628470504498</controlfield><controlfield tag="005">20240410184339.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr#-n---------</controlfield><controlfield tag="008">070910s2007 cau ob 000 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1-281-18127-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786611181277</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0-8330-4288-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)1000000000481426</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EBL)322567</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)476120111</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(SSID)ssj0000116545</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBManifestationID)11128822</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBTitleCode)TC0000116545</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBWorkID)10035522</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKB)10153365</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL3031552</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr10225483</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)923689297</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL4970007</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaONFJC)MIL118127</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1027205403</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC3031552</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC4970007</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)991000000000481426</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">JC328.5</subfield><subfield code="b">.B97 2007</subfield></datafield><datafield tag="082" ind1="0" ind2="0"><subfield code="a">322.4</subfield><subfield code="a">355.02/18</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Byting back</subfield><subfield code="h">[electronic resource] :</subfield><subfield code="b">regaining information superiority against 21st-century insurgents /</subfield><subfield code="c">Martin C. Libicki ... [et al.] ; prepared for the Office of the Secretary of Defense.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Santa Monica, CA :</subfield><subfield code="b">Rand Corporation,</subfield><subfield code="c">2007.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (194 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Rand counterinsurgency study. Paper ;</subfield><subfield code="v">v. 1</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One - Introduction; Chapter Two - The Influence of User Requirements; Chapter Three - The Registry-Census; Chapter Four - A Well-Wired Country; Chapter Five - Embedded Video; Chapter Six - A National Wiki; Chapter Seven - The Principles of ICON; Chapter Eight - Implications and Implementation; Appendix - Disaggregated Information Requirements; Bibliography</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">U.S. counterinsurgency efforts in Iraq and Afghanistan have failed to exploit information power, which could be a U.S. advantage but instead is being used advantageously by insurgents. Because insurgency and counterinsurgency involve a battle for the allegiance of a population between a government and an armed opposition movement, the key to exploiting information power is to connect with and learn from the population itself, increasing the effectiveness of both the local government and the U.S. military and civilian services engaged in supporting it. Utilizing mostly available networking tech</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"RAND National Defense Research Institute."</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (p. 157-159).</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Insurgency.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Iraq War, 2003-2011.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Afghan War, 2001-2021.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Military art and science</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Libicki, Martin C.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">National Defense Research Institute (U.S.)</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">0-8330-4189-4</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Rand counterinsurgency study.</subfield><subfield code="p">Paper ;</subfield><subfield code="v">1.</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2024-04-12 07:39:53 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2012-02-26 00:45:55 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5350460940004498&Force_direct=true</subfield><subfield code="Z">5350460940004498</subfield><subfield code="b">Available</subfield><subfield code="8">5350460940004498</subfield></datafield></record></collection> |