Emerging threats and security planning : : how should we decide what hypothetical threats to worry about? / / Brian A. Jackson, David R. Frelinger.
Concerns about how terrorists might attack in the future are central to the design of security efforts to protect both individual targets and the nation overall. In thinking about emerging threats, security planners are confronted by a panoply of possible future scenarios coming from sources ranging...
Saved in:
: | |
---|---|
TeilnehmendeR: | |
Year of Publication: | 2009 |
Language: | English |
Series: | Occasional paper (Rand Corporation)
|
Physical Description: | 1 online resource (x, 19 pages) |
Notes: | Description based upon print version of record. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
993628662004498 |
---|---|
ctrlnum |
(CKB)2520000000008278 (EBL)475034 (OCoLC)559031517 (SSID)ssj0000337123 (PQKBManifestationID)11256529 (PQKBTitleCode)TC0000337123 (PQKBWorkID)10284210 (PQKB)10352578 (MiAaPQ)EBC475034 (MiAaPQ)EBC4969986 (Au-PeEL)EBL4969986 (CaONFJC)MIL245116 (OCoLC)1027167245 (EXLCZ)992520000000008278 |
collection |
bib_alma |
record_format |
marc |
spelling |
Jackson, Brian A., 1972- Emerging threats and security planning : how should we decide what hypothetical threats to worry about? / Brian A. Jackson, David R. Frelinger. Santa Monica, CA : RAND, 2009. 1 online resource (x, 19 pages) text txt computer c online resource cr Occasional paper (Rand Corporation) Description based upon print version of record. Cover; Preface; Contents; Tables; Summary; Emerging Threats and Security Planning: How Should We Decide What Hypothetical Threats to Worry About?; The Variety of Emerging Threats Challenging Security Planning; Framing a Middle-Ground Approach to Addressing Emerging Threats; Identifying Niche Threats; Prioritizing Emerging Threat Scenarios; Conclusions: Security Planning for the Niche and the Novel; References Concerns about how terrorists might attack in the future are central to the design of security efforts to protect both individual targets and the nation overall. In thinking about emerging threats, security planners are confronted by a panoply of possible future scenarios coming from sources ranging from the terrorists themselves to red-team brainstorming efforts to explore ways adversaries might attack in the future. This paper explores an approach to assessing emerging and/or novel threats and deciding whether --or how much--they should concern security planners. English Includes bibliographical references. Description based on publisher supplied metadata and other sources. Civil defense United States. National security United States Planning. Terrorism United States Prevention. Strategic planning United States. United States Defenses Planning. Frelinger, Dave. 0-8330-4731-0 |
language |
English |
format |
eBook |
author |
Jackson, Brian A., 1972- |
spellingShingle |
Jackson, Brian A., 1972- Emerging threats and security planning : how should we decide what hypothetical threats to worry about? / Occasional paper (Rand Corporation) Cover; Preface; Contents; Tables; Summary; Emerging Threats and Security Planning: How Should We Decide What Hypothetical Threats to Worry About?; The Variety of Emerging Threats Challenging Security Planning; Framing a Middle-Ground Approach to Addressing Emerging Threats; Identifying Niche Threats; Prioritizing Emerging Threat Scenarios; Conclusions: Security Planning for the Niche and the Novel; References |
author_facet |
Jackson, Brian A., 1972- Frelinger, Dave. |
author_variant |
b a j ba baj |
author2 |
Frelinger, Dave. |
author2_variant |
d f df |
author2_role |
TeilnehmendeR |
author_sort |
Jackson, Brian A., 1972- |
title |
Emerging threats and security planning : how should we decide what hypothetical threats to worry about? / |
title_sub |
how should we decide what hypothetical threats to worry about? / |
title_full |
Emerging threats and security planning : how should we decide what hypothetical threats to worry about? / Brian A. Jackson, David R. Frelinger. |
title_fullStr |
Emerging threats and security planning : how should we decide what hypothetical threats to worry about? / Brian A. Jackson, David R. Frelinger. |
title_full_unstemmed |
Emerging threats and security planning : how should we decide what hypothetical threats to worry about? / Brian A. Jackson, David R. Frelinger. |
title_auth |
Emerging threats and security planning : how should we decide what hypothetical threats to worry about? / |
title_new |
Emerging threats and security planning : |
title_sort |
emerging threats and security planning : how should we decide what hypothetical threats to worry about? / |
series |
Occasional paper (Rand Corporation) |
series2 |
Occasional paper (Rand Corporation) |
publisher |
RAND, |
publishDate |
2009 |
physical |
1 online resource (x, 19 pages) |
contents |
Cover; Preface; Contents; Tables; Summary; Emerging Threats and Security Planning: How Should We Decide What Hypothetical Threats to Worry About?; The Variety of Emerging Threats Challenging Security Planning; Framing a Middle-Ground Approach to Addressing Emerging Threats; Identifying Niche Threats; Prioritizing Emerging Threat Scenarios; Conclusions: Security Planning for the Niche and the Novel; References |
isbn |
1-282-45116-2 9786612451164 0-8330-4864-3 0-8330-4731-0 |
callnumber-first |
U - Military Science |
callnumber-subject |
UA - Armies |
callnumber-label |
UA23 |
callnumber-sort |
UA 223 J25 42009 |
geographic |
United States Defenses Planning. |
geographic_facet |
United States. United States |
illustrated |
Not Illustrated |
dewey-hundreds |
300 - Social sciences |
dewey-tens |
350 - Public administration & military science |
dewey-ones |
355 - Military science |
dewey-full |
355 355.033573 355/.033573 |
dewey-sort |
3355 |
dewey-raw |
355 355.033573 355/.033573 |
dewey-search |
355 355.033573 355/.033573 |
oclc_num |
559031517 1027167245 |
work_keys_str_mv |
AT jacksonbriana emergingthreatsandsecurityplanninghowshouldwedecidewhathypotheticalthreatstoworryabout AT frelingerdave emergingthreatsandsecurityplanninghowshouldwedecidewhathypotheticalthreatstoworryabout |
status_str |
n |
ids_txt_mv |
(CKB)2520000000008278 (EBL)475034 (OCoLC)559031517 (SSID)ssj0000337123 (PQKBManifestationID)11256529 (PQKBTitleCode)TC0000337123 (PQKBWorkID)10284210 (PQKB)10352578 (MiAaPQ)EBC475034 (MiAaPQ)EBC4969986 (Au-PeEL)EBL4969986 (CaONFJC)MIL245116 (OCoLC)1027167245 (EXLCZ)992520000000008278 |
carrierType_str_mv |
cr |
is_hierarchy_title |
Emerging threats and security planning : how should we decide what hypothetical threats to worry about? / |
author2_original_writing_str_mv |
noLinkedField |
_version_ |
1796653678885601281 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02999nam a2200613Ia 4500</leader><controlfield tag="001">993628662004498</controlfield><controlfield tag="005">20230929043826.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr#|n|---|||||</controlfield><controlfield tag="008">090501s2009 cau ot o000 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2009018478</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1-282-45116-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786612451164</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0-8330-4864-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)2520000000008278</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EBL)475034</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)559031517</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(SSID)ssj0000337123</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBManifestationID)11256529</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBTitleCode)TC0000337123</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBWorkID)10284210</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKB)10352578</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC475034</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC4969986</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL4969986</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaONFJC)MIL245116</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1027167245</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)992520000000008278</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">UA23</subfield><subfield code="b">.J25 2009</subfield></datafield><datafield tag="082" ind1="0" ind2="0"><subfield code="a">355</subfield><subfield code="a">355.033573</subfield><subfield code="a">355/.033573</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Jackson, Brian A.,</subfield><subfield code="d">1972-</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Emerging threats and security planning :</subfield><subfield code="b">how should we decide what hypothetical threats to worry about? /</subfield><subfield code="c">Brian A. Jackson, David R. Frelinger.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Santa Monica, CA :</subfield><subfield code="b">RAND,</subfield><subfield code="c">2009.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (x, 19 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Occasional paper (Rand Corporation)</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based upon print version of record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover; Preface; Contents; Tables; Summary; Emerging Threats and Security Planning: How Should We Decide What Hypothetical Threats to Worry About?; The Variety of Emerging Threats Challenging Security Planning; Framing a Middle-Ground Approach to Addressing Emerging Threats; Identifying Niche Threats; Prioritizing Emerging Threat Scenarios; Conclusions: Security Planning for the Niche and the Novel; References</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Concerns about how terrorists might attack in the future are central to the design of security efforts to protect both individual targets and the nation overall. In thinking about emerging threats, security planners are confronted by a panoply of possible future scenarios coming from sources ranging from the terrorists themselves to red-team brainstorming efforts to explore ways adversaries might attack in the future. This paper explores an approach to assessing emerging and/or novel threats and deciding whether --or how much--they should concern security planners.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Civil defense</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">National security</subfield><subfield code="z">United States</subfield><subfield code="x">Planning.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Terrorism</subfield><subfield code="z">United States</subfield><subfield code="x">Prevention.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Strategic planning</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="651" ind1=" " ind2="0"><subfield code="a">United States</subfield><subfield code="x">Defenses</subfield><subfield code="x">Planning.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Frelinger, Dave.</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">0-8330-4731-0</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2024-02-15 01:09:33 Europe/Vienna</subfield><subfield code="d">00</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2012-02-26 01:21:58 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5350515810004498&Force_direct=true</subfield><subfield code="Z">5350515810004498</subfield><subfield code="b">Available</subfield><subfield code="8">5350515810004498</subfield></datafield></record></collection> |