Emerging threats and security planning :: how should we decide what hypothetical threats to worry about? /
"Concerns about how terrorists might attack in the future are central to the design of security efforts to protect both individual targets and the nation overall. In thinking about emerging threats, security planners are confronted by a panoply of possible future scenarios coming from sources r...
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Santa Monica, CA :
RAND,
2009.
|
Schriftenreihe: | Occasional paper (Rand Corporation) ;
OP-256-RC. |
Schlagworte: | |
Online-Zugang: | DE-862 DE-863 |
Zusammenfassung: | "Concerns about how terrorists might attack in the future are central to the design of security efforts to protect both individual targets and the nation overall. In thinking about emerging threats, security planners are confronted by a panoply of possible future scenarios coming from sources ranging from the terrorists themselves to red-team brainstorming efforts to explore ways adversaries might attack in the future. This paper explores an approach to assessing emerging and/or novel threats and deciding whether, or how much, they should concern security planners by asking two questions: (1) Are some of the novel threats 'niche threats' that should be addressed within existing security efforts? (2) Which of the remaining threats are attackers most likely to execute successfully and should therefore be of greater concern for security planners? If threats can reasonably be considered niche threats, they can be prudently addressed in the context of existing security activities. If threats are unusual enough, suggest significant new vulnerabilities, or their probability or consequences means they cannot be considered lesser included cases within other threats, prioritizing them based on their ease of execution provides a guide for which threats merit the greatest concern and most security attention. This preserves the opportunity to learn from new threats yet prevents security planners from being pulled in many directions simultaneously by attempting to respond to every threat at once."--Page 4 of cover. |
Beschreibung: | 1 online resource (x, 19 pages) |
Format: | Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. |
Bibliographie: | Includes bibliographical references (pages 17-19). |
ISBN: | 9780833048646 0833048643 1282451162 9781282451162 9786612451164 6612451165 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn559031517 | ||
003 | OCoLC | ||
005 | 20250103110447.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 100318s2009 cau ob 000 0 eng d | ||
010 | |z 2009018478 | ||
040 | |a N$T |b eng |e pn |c N$T |d OCLCE |d OCLCQ |d E7B |d IDEBK |d DOS |d OCLCQ |d EBLCP |d MHW |d OCLCQ |d B24X7 |d YDXCP |d OCLCQ |d JSTOR |d OCLCF |d UBY |d OCLCQ |d OCLCO |d EJB |d DEBSZ |d OCLCQ |d CUS |d AGLDB |d PIFSG |d OCLCQ |d MERUC |d OCLCQ |d VT2 |d OCLCA |d WY@ |d LOA |d LND |d LUE |d ICG |d U3W |d VTS |d CEF |d REC |d ICN |d EZ9 |d AU@ |d OCLCQ |d ERL |d JBG |d WYU |d STF |d TXR |d NJT |d HS0 |d OCLCQ |d UKBTH |d OCLCQ |d K6U |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d OCLCQ | ||
019 | |a 354972910 |a 609104243 |a 616737866 |a 620436307 |a 656140727 |a 748210299 |a 816361316 |a 977475035 |a 992109298 |a 1006967173 |a 1008949916 |a 1039133796 |a 1047934833 |a 1054117703 |a 1066439573 |a 1069453723 |a 1109090108 |a 1113579473 |a 1115111273 |a 1119090886 |a 1125691569 |a 1154206915 | ||
020 | |a 9780833048646 |q (electronic bk.) | ||
020 | |a 0833048643 |q (electronic bk.) | ||
020 | |a 1282451162 | ||
020 | |a 9781282451162 | ||
020 | |a 9786612451164 | ||
020 | |a 6612451165 | ||
020 | |z 9780833047311 |q (pbk. ; |q alk. paper) | ||
020 | |z 0833047310 |q (pbk. ; |q alk. paper) | ||
027 | |a RAND/OP-256-RC | ||
035 | |a (OCoLC)559031517 |z (OCoLC)354972910 |z (OCoLC)609104243 |z (OCoLC)616737866 |z (OCoLC)620436307 |z (OCoLC)656140727 |z (OCoLC)748210299 |z (OCoLC)816361316 |z (OCoLC)977475035 |z (OCoLC)992109298 |z (OCoLC)1006967173 |z (OCoLC)1008949916 |z (OCoLC)1039133796 |z (OCoLC)1047934833 |z (OCoLC)1054117703 |z (OCoLC)1066439573 |z (OCoLC)1069453723 |z (OCoLC)1109090108 |z (OCoLC)1113579473 |z (OCoLC)1115111273 |z (OCoLC)1119090886 |z (OCoLC)1125691569 |z (OCoLC)1154206915 | ||
037 | |a 22573/cttd8vf |b JSTOR | ||
042 | |a dlr | ||
043 | |a n-us--- | ||
050 | 4 | |a UA23 |b .J257 2009eb | |
072 | 7 | |a POL |x 037000 |2 bisacsh | |
072 | 7 | |a POL037000 |2 bisacsh | |
072 | 7 | |a JPWL, TTM |2 bicssc | |
082 | 7 | |a 355/.033573 |2 22 | |
049 | |a MAIN | ||
100 | 1 | |a Jackson, Brian A., |d 1972- |1 https://id.oclc.org/worldcat/entity/E39PCjM7h9PmCvkHF37bYxMfpX |0 http://id.loc.gov/authorities/names/n2008021357 | |
245 | 1 | 0 | |a Emerging threats and security planning : |b how should we decide what hypothetical threats to worry about? / |c Brian A. Jackson, David R. Frelinger. |
260 | |a Santa Monica, CA : |b RAND, |c 2009. | ||
300 | |a 1 online resource (x, 19 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a RAND Corporation occasional paper series ; |v OP-256-RC | |
504 | |a Includes bibliographical references (pages 17-19). | ||
520 | |a "Concerns about how terrorists might attack in the future are central to the design of security efforts to protect both individual targets and the nation overall. In thinking about emerging threats, security planners are confronted by a panoply of possible future scenarios coming from sources ranging from the terrorists themselves to red-team brainstorming efforts to explore ways adversaries might attack in the future. This paper explores an approach to assessing emerging and/or novel threats and deciding whether, or how much, they should concern security planners by asking two questions: (1) Are some of the novel threats 'niche threats' that should be addressed within existing security efforts? (2) Which of the remaining threats are attackers most likely to execute successfully and should therefore be of greater concern for security planners? If threats can reasonably be considered niche threats, they can be prudently addressed in the context of existing security activities. If threats are unusual enough, suggest significant new vulnerabilities, or their probability or consequences means they cannot be considered lesser included cases within other threats, prioritizing them based on their ease of execution provides a guide for which threats merit the greatest concern and most security attention. This preserves the opportunity to learn from new threats yet prevents security planners from being pulled in many directions simultaneously by attempting to respond to every threat at once."--Page 4 of cover. | ||
505 | 0 | |a Cover; Preface; Contents; Tables; Summary; Emerging Threats and Security Planning: How Should We Decide What Hypothetical Threats to Worry About?; The Variety of Emerging Threats Challenging Security Planning; Framing a Middle-Ground Approach to Addressing Emerging Threats; Identifying Niche Threats; Prioritizing Emerging Threat Scenarios; Conclusions: Security Planning for the Niche and the Novel; References. | |
588 | 0 | |a Print version record. | |
506 | |3 Use copy |f Restrictions unspecified |2 star |5 MiAaHDL | ||
533 | |a Electronic reproduction. |b [Place of publication not identified] : |c HathiTrust Digital Library, |d 2010. |5 MiAaHDL | ||
538 | |a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. |u http://purl.oclc.org/DLF/benchrepro0212 |5 MiAaHDL | ||
583 | 1 | |a digitized |c 2010 |h HathiTrust Digital Library |l committed to preserve |2 pda |5 MiAaHDL | |
546 | |a English. | ||
650 | 0 | |a National security |z United States |x Planning. | |
650 | 0 | |a Terrorism |z United States |x Prevention. | |
651 | 0 | |a United States |x Defenses |x Planning. | |
650 | 0 | |a Strategic planning |z United States. | |
650 | 0 | |a Civil defense |z United States. |0 http://id.loc.gov/authorities/subjects/sh85139930 | |
651 | 6 | |a États-Unis |x Défense nationale |x Planification. | |
650 | 6 | |a Planification stratégique |z États-Unis. | |
650 | 7 | |a POLITICAL SCIENCE |x Political Freedom & Security |x Terrorism. |2 bisacsh | |
650 | 7 | |a POLITICAL SCIENCE |x Terrorism. |2 bisacsh | |
650 | 7 | |a Civil defense |2 fast | |
650 | 7 | |a Military readiness |x Planning |2 fast | |
650 | 7 | |a National security |x Planning |2 fast | |
650 | 7 | |a Strategic planning |2 fast | |
650 | 7 | |a Terrorism |x Prevention |2 fast | |
651 | 7 | |a United States |2 fast |1 https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq | |
650 | 7 | |a Armies. |2 hilcc | |
650 | 7 | |a Military & Naval Science. |2 hilcc | |
650 | 7 | |a Law, Politics & Government. |2 hilcc | |
700 | 1 | |a Frelinger, Dave. |0 http://id.loc.gov/authorities/names/no98000040 | |
758 | |i has work: |a Emerging threats and security planning (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGfHVgm68dmDqRCVjfgxQm |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Jackson, Brian A., 1972- |t Emerging threats and security planning. |d Santa Monica, CA : RAND, 2009 |z 9780833047311 |w (DLC) 2009018478 |w (OCoLC)320131993 |
830 | 0 | |a Occasional paper (Rand Corporation) ; |v OP-256-RC. |0 http://id.loc.gov/authorities/names/no2004031492 | |
966 | 4 | 0 | |l DE-862 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=304905 |3 Volltext |
966 | 4 | 0 | |l DE-863 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=304905 |3 Volltext |
887 | |a ProductForm=BC |2 onix | ||
887 | |a Publisher/PublisherName=RAND Corporation |2 onix | ||
938 | |a Books 24x7 |b B247 |n bkg00033326 | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL475034 | ||
938 | |a ebrary |b EBRY |n ebr10355424 | ||
938 | |a EBSCOhost |b EBSC |n 304905 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n 245116 | ||
938 | |a YBP Library Services |b YANK |n 3151702 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-862 | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn559031517 |
---|---|
_version_ | 1829094653190733824 |
adam_text | |
any_adam_object | |
author | Jackson, Brian A., 1972- |
author2 | Frelinger, Dave |
author2_role | |
author2_variant | d f df |
author_GND | http://id.loc.gov/authorities/names/n2008021357 http://id.loc.gov/authorities/names/no98000040 |
author_facet | Jackson, Brian A., 1972- Frelinger, Dave |
author_role | |
author_sort | Jackson, Brian A., 1972- |
author_variant | b a j ba baj |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | U - Military Science |
callnumber-label | UA23 |
callnumber-raw | UA23 .J257 2009eb |
callnumber-search | UA23 .J257 2009eb |
callnumber-sort | UA 223 J257 42009EB |
callnumber-subject | UA - Armies |
collection | ZDB-4-EBA |
contents | Cover; Preface; Contents; Tables; Summary; Emerging Threats and Security Planning: How Should We Decide What Hypothetical Threats to Worry About?; The Variety of Emerging Threats Challenging Security Planning; Framing a Middle-Ground Approach to Addressing Emerging Threats; Identifying Niche Threats; Prioritizing Emerging Threat Scenarios; Conclusions: Security Planning for the Niche and the Novel; References. |
ctrlnum | (OCoLC)559031517 |
dewey-full | 355/.033573 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 355 - Military science |
dewey-raw | 355/.033573 |
dewey-search | 355/.033573 |
dewey-sort | 3355 533573 |
dewey-tens | 350 - Public administration and military science |
discipline | Militärwissenschaft |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>07328cam a2200949 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn559031517</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20250103110447.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">100318s2009 cau ob 000 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2009018478</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">OCLCE</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">E7B</subfield><subfield code="d">IDEBK</subfield><subfield code="d">DOS</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">EBLCP</subfield><subfield code="d">MHW</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">B24X7</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">JSTOR</subfield><subfield code="d">OCLCF</subfield><subfield code="d">UBY</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">EJB</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">CUS</subfield><subfield code="d">AGLDB</subfield><subfield code="d">PIFSG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCA</subfield><subfield code="d">WY@</subfield><subfield code="d">LOA</subfield><subfield code="d">LND</subfield><subfield code="d">LUE</subfield><subfield code="d">ICG</subfield><subfield code="d">U3W</subfield><subfield code="d">VTS</subfield><subfield code="d">CEF</subfield><subfield code="d">REC</subfield><subfield code="d">ICN</subfield><subfield code="d">EZ9</subfield><subfield code="d">AU@</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">ERL</subfield><subfield code="d">JBG</subfield><subfield code="d">WYU</subfield><subfield code="d">STF</subfield><subfield code="d">TXR</subfield><subfield code="d">NJT</subfield><subfield code="d">HS0</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UKBTH</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">K6U</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">354972910</subfield><subfield code="a">609104243</subfield><subfield code="a">616737866</subfield><subfield code="a">620436307</subfield><subfield code="a">656140727</subfield><subfield code="a">748210299</subfield><subfield code="a">816361316</subfield><subfield code="a">977475035</subfield><subfield code="a">992109298</subfield><subfield code="a">1006967173</subfield><subfield code="a">1008949916</subfield><subfield code="a">1039133796</subfield><subfield code="a">1047934833</subfield><subfield code="a">1054117703</subfield><subfield code="a">1066439573</subfield><subfield code="a">1069453723</subfield><subfield code="a">1109090108</subfield><subfield code="a">1113579473</subfield><subfield code="a">1115111273</subfield><subfield code="a">1119090886</subfield><subfield code="a">1125691569</subfield><subfield code="a">1154206915</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780833048646</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0833048643</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1282451162</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781282451162</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786612451164</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6612451165</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9780833047311</subfield><subfield code="q">(pbk. ;</subfield><subfield code="q">alk. paper)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">0833047310</subfield><subfield code="q">(pbk. ;</subfield><subfield code="q">alk. paper)</subfield></datafield><datafield tag="027" ind1=" " ind2=" "><subfield code="a">RAND/OP-256-RC</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)559031517</subfield><subfield code="z">(OCoLC)354972910</subfield><subfield code="z">(OCoLC)609104243</subfield><subfield code="z">(OCoLC)616737866</subfield><subfield code="z">(OCoLC)620436307</subfield><subfield code="z">(OCoLC)656140727</subfield><subfield code="z">(OCoLC)748210299</subfield><subfield code="z">(OCoLC)816361316</subfield><subfield code="z">(OCoLC)977475035</subfield><subfield code="z">(OCoLC)992109298</subfield><subfield code="z">(OCoLC)1006967173</subfield><subfield code="z">(OCoLC)1008949916</subfield><subfield code="z">(OCoLC)1039133796</subfield><subfield code="z">(OCoLC)1047934833</subfield><subfield code="z">(OCoLC)1054117703</subfield><subfield code="z">(OCoLC)1066439573</subfield><subfield code="z">(OCoLC)1069453723</subfield><subfield code="z">(OCoLC)1109090108</subfield><subfield code="z">(OCoLC)1113579473</subfield><subfield code="z">(OCoLC)1115111273</subfield><subfield code="z">(OCoLC)1119090886</subfield><subfield code="z">(OCoLC)1125691569</subfield><subfield code="z">(OCoLC)1154206915</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">22573/cttd8vf</subfield><subfield code="b">JSTOR</subfield></datafield><datafield tag="042" ind1=" " ind2=" "><subfield code="a">dlr</subfield></datafield><datafield tag="043" ind1=" " ind2=" "><subfield code="a">n-us---</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">UA23</subfield><subfield code="b">.J257 2009eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL</subfield><subfield code="x">037000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL037000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">JPWL, TTM</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">355/.033573</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Jackson, Brian A.,</subfield><subfield code="d">1972-</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjM7h9PmCvkHF37bYxMfpX</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2008021357</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Emerging threats and security planning :</subfield><subfield code="b">how should we decide what hypothetical threats to worry about? /</subfield><subfield code="c">Brian A. Jackson, David R. Frelinger.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Santa Monica, CA :</subfield><subfield code="b">RAND,</subfield><subfield code="c">2009.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (x, 19 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">RAND Corporation occasional paper series ;</subfield><subfield code="v">OP-256-RC</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 17-19).</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Concerns about how terrorists might attack in the future are central to the design of security efforts to protect both individual targets and the nation overall. In thinking about emerging threats, security planners are confronted by a panoply of possible future scenarios coming from sources ranging from the terrorists themselves to red-team brainstorming efforts to explore ways adversaries might attack in the future. This paper explores an approach to assessing emerging and/or novel threats and deciding whether, or how much, they should concern security planners by asking two questions: (1) Are some of the novel threats 'niche threats' that should be addressed within existing security efforts? (2) Which of the remaining threats are attackers most likely to execute successfully and should therefore be of greater concern for security planners? If threats can reasonably be considered niche threats, they can be prudently addressed in the context of existing security activities. If threats are unusual enough, suggest significant new vulnerabilities, or their probability or consequences means they cannot be considered lesser included cases within other threats, prioritizing them based on their ease of execution provides a guide for which threats merit the greatest concern and most security attention. This preserves the opportunity to learn from new threats yet prevents security planners from being pulled in many directions simultaneously by attempting to respond to every threat at once."--Page 4 of cover.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover; Preface; Contents; Tables; Summary; Emerging Threats and Security Planning: How Should We Decide What Hypothetical Threats to Worry About?; The Variety of Emerging Threats Challenging Security Planning; Framing a Middle-Ground Approach to Addressing Emerging Threats; Identifying Niche Threats; Prioritizing Emerging Threat Scenarios; Conclusions: Security Planning for the Niche and the Novel; References.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="3">Use copy</subfield><subfield code="f">Restrictions unspecified</subfield><subfield code="2">star</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Electronic reproduction.</subfield><subfield code="b">[Place of publication not identified] :</subfield><subfield code="c">HathiTrust Digital Library,</subfield><subfield code="d">2010.</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.</subfield><subfield code="u">http://purl.oclc.org/DLF/benchrepro0212</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="583" ind1="1" ind2=" "><subfield code="a">digitized</subfield><subfield code="c">2010</subfield><subfield code="h">HathiTrust Digital Library</subfield><subfield code="l">committed to preserve</subfield><subfield code="2">pda</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">National security</subfield><subfield code="z">United States</subfield><subfield code="x">Planning.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Terrorism</subfield><subfield code="z">United States</subfield><subfield code="x">Prevention.</subfield></datafield><datafield tag="651" ind1=" " ind2="0"><subfield code="a">United States</subfield><subfield code="x">Defenses</subfield><subfield code="x">Planning.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Strategic planning</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Civil defense</subfield><subfield code="z">United States.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85139930</subfield></datafield><datafield tag="651" ind1=" " ind2="6"><subfield code="a">États-Unis</subfield><subfield code="x">Défense nationale</subfield><subfield code="x">Planification.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Planification stratégique</subfield><subfield code="z">États-Unis.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE</subfield><subfield code="x">Political Freedom & Security</subfield><subfield code="x">Terrorism.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE</subfield><subfield code="x">Terrorism.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Civil defense</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Military readiness</subfield><subfield code="x">Planning</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">National security</subfield><subfield code="x">Planning</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Strategic planning</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Terrorism</subfield><subfield code="x">Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">United States</subfield><subfield code="2">fast</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Armies.</subfield><subfield code="2">hilcc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Military & Naval Science.</subfield><subfield code="2">hilcc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Law, Politics & Government.</subfield><subfield code="2">hilcc</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Frelinger, Dave.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no98000040</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Emerging threats and security planning (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGfHVgm68dmDqRCVjfgxQm</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Jackson, Brian A., 1972-</subfield><subfield code="t">Emerging threats and security planning.</subfield><subfield code="d">Santa Monica, CA : RAND, 2009</subfield><subfield code="z">9780833047311</subfield><subfield code="w">(DLC) 2009018478</subfield><subfield code="w">(OCoLC)320131993</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Occasional paper (Rand Corporation) ;</subfield><subfield code="v">OP-256-RC.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2004031492</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-862</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=304905</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-863</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=304905</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="887" ind1=" " ind2=" "><subfield code="a">ProductForm=BC</subfield><subfield code="2">onix</subfield></datafield><datafield tag="887" ind1=" " ind2=" "><subfield code="a">Publisher/PublisherName=RAND Corporation</subfield><subfield code="2">onix</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bkg00033326</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL475034</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10355424</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">304905</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">245116</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">3151702</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-862</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
geographic | United States Defenses Planning. États-Unis Défense nationale Planification. United States fast https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq |
geographic_facet | United States Defenses Planning. États-Unis Défense nationale Planification. United States |
id | ZDB-4-EBA-ocn559031517 |
illustrated | Not Illustrated |
indexdate | 2025-04-11T08:36:32Z |
institution | BVB |
isbn | 9780833048646 0833048643 1282451162 9781282451162 9786612451164 6612451165 |
language | English |
oclc_num | 559031517 |
open_access_boolean | |
owner | MAIN DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
owner_facet | MAIN DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
physical | 1 online resource (x, 19 pages) |
psigel | ZDB-4-EBA FWS_PDA_EBA ZDB-4-EBA |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | RAND, |
record_format | marc |
series | Occasional paper (Rand Corporation) ; |
series2 | RAND Corporation occasional paper series ; |
spelling | Jackson, Brian A., 1972- https://id.oclc.org/worldcat/entity/E39PCjM7h9PmCvkHF37bYxMfpX http://id.loc.gov/authorities/names/n2008021357 Emerging threats and security planning : how should we decide what hypothetical threats to worry about? / Brian A. Jackson, David R. Frelinger. Santa Monica, CA : RAND, 2009. 1 online resource (x, 19 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier RAND Corporation occasional paper series ; OP-256-RC Includes bibliographical references (pages 17-19). "Concerns about how terrorists might attack in the future are central to the design of security efforts to protect both individual targets and the nation overall. In thinking about emerging threats, security planners are confronted by a panoply of possible future scenarios coming from sources ranging from the terrorists themselves to red-team brainstorming efforts to explore ways adversaries might attack in the future. This paper explores an approach to assessing emerging and/or novel threats and deciding whether, or how much, they should concern security planners by asking two questions: (1) Are some of the novel threats 'niche threats' that should be addressed within existing security efforts? (2) Which of the remaining threats are attackers most likely to execute successfully and should therefore be of greater concern for security planners? If threats can reasonably be considered niche threats, they can be prudently addressed in the context of existing security activities. If threats are unusual enough, suggest significant new vulnerabilities, or their probability or consequences means they cannot be considered lesser included cases within other threats, prioritizing them based on their ease of execution provides a guide for which threats merit the greatest concern and most security attention. This preserves the opportunity to learn from new threats yet prevents security planners from being pulled in many directions simultaneously by attempting to respond to every threat at once."--Page 4 of cover. Cover; Preface; Contents; Tables; Summary; Emerging Threats and Security Planning: How Should We Decide What Hypothetical Threats to Worry About?; The Variety of Emerging Threats Challenging Security Planning; Framing a Middle-Ground Approach to Addressing Emerging Threats; Identifying Niche Threats; Prioritizing Emerging Threat Scenarios; Conclusions: Security Planning for the Niche and the Novel; References. Print version record. Use copy Restrictions unspecified star MiAaHDL Electronic reproduction. [Place of publication not identified] : HathiTrust Digital Library, 2010. MiAaHDL Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. http://purl.oclc.org/DLF/benchrepro0212 MiAaHDL digitized 2010 HathiTrust Digital Library committed to preserve pda MiAaHDL English. National security United States Planning. Terrorism United States Prevention. United States Defenses Planning. Strategic planning United States. Civil defense United States. http://id.loc.gov/authorities/subjects/sh85139930 États-Unis Défense nationale Planification. Planification stratégique États-Unis. POLITICAL SCIENCE Political Freedom & Security Terrorism. bisacsh POLITICAL SCIENCE Terrorism. bisacsh Civil defense fast Military readiness Planning fast National security Planning fast Strategic planning fast Terrorism Prevention fast United States fast https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq Armies. hilcc Military & Naval Science. hilcc Law, Politics & Government. hilcc Frelinger, Dave. http://id.loc.gov/authorities/names/no98000040 has work: Emerging threats and security planning (Text) https://id.oclc.org/worldcat/entity/E39PCGfHVgm68dmDqRCVjfgxQm https://id.oclc.org/worldcat/ontology/hasWork Print version: Jackson, Brian A., 1972- Emerging threats and security planning. Santa Monica, CA : RAND, 2009 9780833047311 (DLC) 2009018478 (OCoLC)320131993 Occasional paper (Rand Corporation) ; OP-256-RC. http://id.loc.gov/authorities/names/no2004031492 ProductForm=BC onix Publisher/PublisherName=RAND Corporation onix |
spellingShingle | Jackson, Brian A., 1972- Emerging threats and security planning : how should we decide what hypothetical threats to worry about? / Occasional paper (Rand Corporation) ; Cover; Preface; Contents; Tables; Summary; Emerging Threats and Security Planning: How Should We Decide What Hypothetical Threats to Worry About?; The Variety of Emerging Threats Challenging Security Planning; Framing a Middle-Ground Approach to Addressing Emerging Threats; Identifying Niche Threats; Prioritizing Emerging Threat Scenarios; Conclusions: Security Planning for the Niche and the Novel; References. National security United States Planning. Terrorism United States Prevention. Strategic planning United States. Civil defense United States. http://id.loc.gov/authorities/subjects/sh85139930 Planification stratégique États-Unis. POLITICAL SCIENCE Political Freedom & Security Terrorism. bisacsh POLITICAL SCIENCE Terrorism. bisacsh Civil defense fast Military readiness Planning fast National security Planning fast Strategic planning fast Terrorism Prevention fast Armies. hilcc Military & Naval Science. hilcc Law, Politics & Government. hilcc |
subject_GND | http://id.loc.gov/authorities/subjects/sh85139930 |
title | Emerging threats and security planning : how should we decide what hypothetical threats to worry about? / |
title_auth | Emerging threats and security planning : how should we decide what hypothetical threats to worry about? / |
title_exact_search | Emerging threats and security planning : how should we decide what hypothetical threats to worry about? / |
title_full | Emerging threats and security planning : how should we decide what hypothetical threats to worry about? / Brian A. Jackson, David R. Frelinger. |
title_fullStr | Emerging threats and security planning : how should we decide what hypothetical threats to worry about? / Brian A. Jackson, David R. Frelinger. |
title_full_unstemmed | Emerging threats and security planning : how should we decide what hypothetical threats to worry about? / Brian A. Jackson, David R. Frelinger. |
title_short | Emerging threats and security planning : |
title_sort | emerging threats and security planning how should we decide what hypothetical threats to worry about |
title_sub | how should we decide what hypothetical threats to worry about? / |
topic | National security United States Planning. Terrorism United States Prevention. Strategic planning United States. Civil defense United States. http://id.loc.gov/authorities/subjects/sh85139930 Planification stratégique États-Unis. POLITICAL SCIENCE Political Freedom & Security Terrorism. bisacsh POLITICAL SCIENCE Terrorism. bisacsh Civil defense fast Military readiness Planning fast National security Planning fast Strategic planning fast Terrorism Prevention fast Armies. hilcc Military & Naval Science. hilcc Law, Politics & Government. hilcc |
topic_facet | National security United States Planning. Terrorism United States Prevention. United States Defenses Planning. Strategic planning United States. Civil defense United States. États-Unis Défense nationale Planification. Planification stratégique États-Unis. POLITICAL SCIENCE Political Freedom & Security Terrorism. POLITICAL SCIENCE Terrorism. Civil defense Military readiness Planning National security Planning Strategic planning Terrorism Prevention United States Armies. Military & Naval Science. Law, Politics & Government. |
work_keys_str_mv | AT jacksonbriana emergingthreatsandsecurityplanninghowshouldwedecidewhathypotheticalthreatstoworryabout AT frelingerdave emergingthreatsandsecurityplanninghowshouldwedecidewhathypotheticalthreatstoworryabout |