WorldCat Identities

National Defense Research Institute (U.S.)

Overview
Works: 1,261 works in 2,858 publications in 1 language and 267,872 library holdings
Genres: Case studies  History 
Roles: Researcher, isb, her, Publisher, tra, Sponsor, Other, ver, Editor
Publication Timeline
.
Most widely held works about National Defense Research Institute (U.S.)
 
moreShow More Titles
fewerShow Fewer Titles
Most widely held works by National Defense Research Institute (U.S.)
A review of the scientific literature as it pertains to Gulf War illnesses by Beatrice Alexandra Golomb( )

14 editions published between 1999 and 2000 in English and held by 3,710 WorldCat member libraries worldwide

The confrontation that began when Iraq invaded Kuwait in August 1990 brought with it the threat that chemical and biological weapons might be used against the more than half a million military personnel the United States deployed to the region. To protect these troops from such threats, the Department of Defense wished to use drugs and vaccines that, not having been tested for use in these specific situations, were considered "investigational" by the federal Food and Drug Administration. This report examines the history of the Interim Rule, adopted in December 21, 1990, that authorized the Commissioner of Food and Drugs to waive informed consent for the use of investigational drugs and vaccines for certain military uses; how this authority was used for pyridostigmine bromide and botulinum toxoid during the Gulf War; and the subsequent controversy surrounding the rule, its application, and its implications
Victory has a thousand fathers : detailed counterinsurgency case studies by Christopher Paul( )

6 editions published in 2010 in English and held by 2,133 WorldCat member libraries worldwide

"This monograph presents detailed case histories for each of the COIN [counterinsurgency] campaigns examined in the analysis. A companion volume, Victory Has a Thousand Fathers: Sources of Success in Counterinsurgency, describes the qualitative comparative approach, presents findings from the overall analyses, and explains the study's case selection and methodology in more detail. It also presents an overview and in-depth assessments of the key approaches, practices, and factors that feature prominently in successful COIN operations. The full case data can be downloaded at http://www.rand.org/pubs/monographs/MG964/."--Page iii
The European Security and Defense Policy : NATO's companion - or competitor? by Robert Edwards Hunter( )

9 editions published in 2002 in English and held by 2,101 WorldCat member libraries worldwide

The emergence of the European Security and Defense Policy (ESDP) in the last two-thirds of the 1990s and continuing into the new century, has been a complex process intertwining politics, economics, national cultures, and numerous institutions. This book provides an essential background for understanding how security issues as between NATO and the European Union are being posed for the early part of the 21st century, including the new circumstances following the terrorist attacks in New York and Washington on September 11, 2001. This study should be of interest to those interested in the evolution of U.S.-European relations, especially in, but not limited to, the security field; the development of institutional relationships; and key choices that lie ahead in regard to these critical arrangements
On "other war" : lessons from five decades of RAND counterinsurgency research by Austin Long( )

8 editions published in 2006 in English and held by 2,074 WorldCat member libraries worldwide

The challenges posed by insurgency and instability have proved difficult to surmount. This difficulty may embolden future opponents to embrace insurgency in combating the United States. Both the current and future conduct of the war on terror demand that the United States improve its ability to conduct counterinsurgency (COIN) operations. This study makes recommendations for improving COIN based on RAND's decades-long study of it
Married to the military : the employment and earnings of military wives compared with those of civilian wives( )

5 editions published in 2002 in English and held by 2,067 WorldCat member libraries worldwide

Today's military is a military of families; many service members are married, and many of their spouses work and contribute to family income. But military wives earn less than civilian wives, and this study seeks to understand why. The authors find that military wives, knowing they are likely to move frequently, are willing to accept jobs that offer a lower wage rather than to use more of their remaining time at a location to find a higher-wage job. Compared with civilian wives, military wives tend to work somewhat less if they have young children but somewhat more if their children are older. The probability that military wives work declines with age, although it changes little with age in the civilian world. This probability declines more rapidly for wives with a college education, most of whom are officers' wives. Although it is often assumed that military families live in rural areas where the job opportunities for wives are poor, the authors found fairly small differences in the location of civilian versus military families. Finally, whereas in the civilian world an increase in the unemployment rate leads to a slight increase in the probability that wives worked during the year and the probability that they worked full-time (responding as "added workers" to the loss or threat of loss of their husbands' work), military wives appear to respond as workers with a more permanent attachment to the labor force
The rise of political Islam in Turkey by Angel Rabasa( )

6 editions published in 2008 in English and held by 2,047 WorldCat member libraries worldwide

Preface -- Figures and Tables -- Summary -- Acknowledgments -- Acronyms and Abbreviations -- Introduction -- Politics and Religion in Turkey -- Structure of the report -- The Islamic landscape in Turkey -- Religion, ethnicity and politics -- The management of Islam -- Sufi brotherhoods -- Religious movements -- Islamic foundations -- Islamic schools -- Shi'ites and Alevis -- Turkish attitudes toward religion -- The violent fringe -- Turks in Europe -- The rise of political Islam in Turkey -- The impact of the Kemalist revolution -- The advent of multi-party democracy -- The "Turkish-Islamic synthesis"--The impact of the Özal reforms -- The rise of the religious right -- Political Islam in power : the welfare interlude -- The impact of the February 28 process -- The ascendency of the AKP -- The July 22, 2007, election -- The AKP in power -- The reconfiguration of Turkish politics -- The AKP : a new synthesis or Islamism in disguise? -- "Green money" -- The headscarf controversy -- The Imam-Hatip schools controversy -- Non-Muslims minorities under AKP rule -- The AKP and the Kurds -- The AKP and the military -- The AKP's uncertain future -- The AKP's foreign policy -- Relations with Europe -- Relations with Greece -- Relations with the United States -- Relations with Russia -- Relations with the Middle East -- Future prospects and implications -- Whither Turkey : alternative political futures -- Scenario 1 : The AKP pursues a moderate, EU-oriented path -- Scenario 2 : Creeping Islamization -- Scenario 3 : Judicial closing of the AKP -- Scenario 4: Military intervention -- Implications for U.S. policy -- Foreign policy and bilateral issues -- The PKK and the Kurdish issue
The emergence of noopolitik : toward an American information strategy by John Arquilla( )

4 editions published in 1999 in English and held by 2,046 WorldCat member libraries worldwide

Weapons, concepts of proportional response, and the need to maintain the immunity of noncombatants. Ultimately, the authors call for an innovative turn of mind as policymakers and strategists rethink how best to adapt to the epochal transformations being wrought by the information revolution
Afghanistan's local war : building local defense forces by Seth G Jones( )

4 editions published in 2010 in English and held by 2,001 WorldCat member libraries worldwide

Security in Afghanistan has historically required a combination of top-down efforts from the central government and bottom-up efforts from local communities. Since 2001, U.S. and broader international efforts have focused on establishing security solely from the top down through Afghan national security forces and other central government institutions. But local security forces are a critical complement to these efforts, especially in rural areas of the country. The Afghan government and NATO forces need to move quickly to establish a more-effective bottom-up strategy to complement top-down efforts by better leveraging local communities. The Afghan government can work with existing community structures that oppose insurgents to establish village-level policing entities, such as arbakai and chalweshtai, with support from NATO. Effectively leveraging local communities should significantly improve counterinsurgency prospects and can facilitate mobilization of the population against insurgents. This analysis documents lessons about the viability of establishing local security in Afghanistan and addresses concerns about the wisdom of such policies
Byting back : regaining information superiority against 21st-century insurgents( )

7 editions published in 2007 in English and held by 2,000 WorldCat member libraries worldwide

Libicki et al. argue that information collection requirements and systems for counterinsurgency are important because the community that conducts counterinsurgency crosses national and institutional boundaries and because the indigenous population plays a large role in determining the outcome of an insurgency. They then demonstrate what this focus implies for counterinsurgency requirements, collection, networking, and systems design
Arms trafficking and Colombia by Kim Cragin( )

5 editions published in 2003 in English and held by 1,998 WorldCat member libraries worldwide

Colombia has experienced significant political instability and violence over the past century due to a number of factors--the drug trade, a protracted insurgent conflict, internal corruption, and small-arms proliferation, the last being among the most serious of the country's problems. The authors identify the sources and routes used by arms traffickers to acquire, buy, sell, receive, transfer, and ship weapons. They also examine the various guerrilla groups, paramilitary organizations, criminal factions, and ordinary citizens who purchase and use these munitions. The authors then examine Colombia₂s political conflict through the lens of small-arms trafficking and conclude with policy implications for the U.S. government. The authors find that small-arms trafficking patterns--the manner by which arms and munitions are acquired and distributed--provide useful insights into the strategies used by insurgent groups engaged in conflict and a conflict's future evolution
Is military advertising effective? : an estimation methodology and applications to recruiting in the 1980s and 1990s by James N Dertouzos( )

6 editions published in 2003 in English and held by 1,994 WorldCat member libraries worldwide

The Department of Defense has been spending over $100 million annually on advertising to support recruiting. Previous econometric studies of military advertising's effectiveness have relied on data from time periods unlike today's and have used models possibly inappropriate for supporting decisionmakers addressing today's policy issues. This report details improved methods developed to assess military advertising's effectiveness and illustrates them using early 1980s and mid-1990s data. Several policy issues are addressed: How effective has advertising been in increasing enlistments? What media appear to be the most cost-effective? Will budget reallocation improve outcomes? Will an increased budget improve outcomes? An overview of trends in military advertising from 1986 to 1997 is included, as are the results of a search of literature on military advertising as well as in the areas of psychology, marketing, and economics pertaining to persuasion and consumer-product advertising. Application of the newly developed methods shows that the four services appear to have gained considerably from advertising and that in comparison to other alternatives, advertising appears to be an effective recruiting tool
Military use of drugs not yet approved by the FDA for CW/BW defense : lessons from the Gulf War by Richard A Rettig( )

3 editions published in 1999 in English and held by 1,962 WorldCat member libraries worldwide

The confrontation that began when Iraq invaded Kuwait in August 1990 brought with it the threat that chemical and biological weapons might be used against the more than half a million military personnel the United States deployed to the region. To protect these troops from such threats, the Department of Defense wished to use drugs and vaccines that, not having been tested for use in these specific situations, were considered "investigational" by the federal Food and Drug Administration. This report examines the history of the Interim Rule, adopted in December 21, 1990, that authorized the Commissioner of Food and Drugs to waive informed consent for the use of investigational drugs and vaccines for certain military uses; how this authority was used for pyridostigmine bromide and botulinum toxoid during the Gulf War; and the subsequent controversy surrounding the rule, its application, and its implications. The report then analyzes the issues the Interim Rule raised when investigational drugs are used for such purposes and makes recommendations for dealing with similar situations in the future
The battle behind the wire : U.S. prisoner and detainee operations from World War II to Iraq( )

8 editions published between 2010 and 2011 in English and held by 1,961 WorldCat member libraries worldwide

Although prisoner of war and detainee operations ultimately tend to become quite extensive, military planners and policymakers have repeatedly treated such operations as an afterthought. In reality, such operations can be a central part of the successful prosecution of a conflict. Determining how to gain knowledge from, hold, question, influence, and release captured adversaries can be an important component of military strategy and doctrine, both during the conflict and in reconstruction afterward. This monograph finds parallels in U.S. prisoner and detainee operations in World War II, Korea, Vietnam, and Iraq: underestimation of the number to be held, hasty scrambling for resources to meet operational needs, and inadequate doctrine and policy. During the later phases of military operations, an attempt is often made to educate prisoners and detainees and influence their social and political values. The results of a survey by RAND researchers of Iraq detainees contravene many assumptions that had been guiding decisions related to detainee operations. The survey found that local and personal motives, along with nationalism, were more prevalent than religious ones and that detainees were often economic opportunists rather than illiterates seeking economic subsistence through the insurgency. Recommendations include that detailed doctrine should be in place prior to detention and that detainees should be surveyed when first detained
Countering piracy in the modern era : notes from a RAND workshop to discuss the best approaches for dealing with piracy in the 21st century by Peter Chalk( )

4 editions published in 2009 in English and held by 1,956 WorldCat member libraries worldwide

In March 2009, the RAND Corporation convened a small group of experts from the U.S. government, allied partner nations, the maritime industry, and academic organizations to reconsider the underlying factors that drive maritime piracy in the 21st century. This conference proceedings highlights the six major themes that animated much of the discussion: (1) the relevance of the current legal framework for countering piracy, (2) the economic burden imposed by piracy, (3) the opportunities for international collaboration that have been afforded by the joint maritime patrols off the Horn of Africa, (4) the question of using private security contractors to protect shipping transiting dangerous waters, (5) the extent to which industry talks with a "single voice" in terms of addressing maritime security, and (6) means of confronting the unique nature of piracy off the Horn of Africa. Perhaps the most important conclusion that can be drawn from the workshop is that mitigating the complex nature of maritime crime requires the input of all relevant stakeholders - state, national, private, and nongovernmental - and must necessarily embrace measures that go well beyond the simple and expedient reactive deployment of naval assets
Preparing and training for the full spectrum of military challenges : insights from the experiences of China, France, the United Kingdom, India, and Israel( )

9 editions published in 2009 in English and held by 1,945 WorldCat member libraries worldwide

"The difficult and continually evolving operations in Iraq and Afghanistan show the complexities of what is now termed irregular warfare and highlight the need for new approaches to the security challenges with which the United States is now contending and will likely confront in the future. The research reported in this monograph focused on answering a rather straightforward, but thus far largely unanswered, question: What can the U.S. military learn from other militaries about how better to prepare for full-spectrum operations and deployments? To this end, RAND was asked by the OSD for Personnel and Readiness to examine the militaries of China, France, the UK, India, and Israel."--Page xiii
Security in Iraq : a framework for analyzing emerging threats as U.S. forces leave by David C Gompert( )

8 editions published in 2010 in English and held by 1,930 WorldCat member libraries worldwide

A critical question surrounding the withdrawal of U.S. forces from Iraq is Iraq's internal security and stability. Although the U.S. withdrawal plan is designed with care to avoid weakening Iraq's security, the end of U.S. occupation may alter the strategies of the main Iraqi political actors, each of which has enough armed power to be able to shatter Iraq's domestic peace. In view of the potential for insecurity in Iraq, the United States cannot afford to take a passive or reactive stance. To anticipate dangers and act purposefully, U.S. policy-makers need a dynamic analytic framework with which to examine the shifting motivations and capabilities of the actors that affect Iraq's security. This monograph offers such a framework
EU civilian crisis management : the record so far by Christopher S Chivvis( )

5 editions published in 2010 in English and held by 1,918 WorldCat member libraries worldwide

"The European Union has been deploying civilians in conflict and postconflict stabilization missions since 2003, and the scope of civilian missions is likely to increase in the future. This volume offers a general overview and assessment of the EU's civilian operations to date, as well as a more in-depth look at the two missions in which the EU has worked alongside NATO: the EU police-training mission in Afghanistan and the integrated rule of law mission in Kosovo. The author concludes with a discussion of the main policy implications for the United States and Europe."--Rand web site
Past revolutions, future transformations : what can the history of revolutions in military affairs tell us about transforming the U.S. military? by Richard O Hundley( )

4 editions published in 1999 in English and held by 1,889 WorldCat member libraries worldwide

Advances in technology can bring about dramatic changes in military operations, often termed "revolutions in military affairs" or RMAs. Such technology-driven changes in military operations are not merely a recent phenomenon: they have been occurring since the dawn of history, they will continue to occur in the future, and they will continue to bestow a military advantage on the first nation to develop and use them. Accordingly, it is important to the continued vitality and robustness of the U.S. defense posture for the DoD R & D community to be aware of technology developments that could revolutionize military operations in the future, and for the U.S. military services to be on the lookout for revolutionary ways in which to employ those technologies in warfare. This report examines the history of past RMAs, to see what can be learned from them regarding the challenge confronting the DoD today, when it has set out on a concerted effort to bring about a technology-driven transformation of the U.S. military to achieve the operational goals outlined in Joint Vision 2010. Among its many findings are three of particular note: RMAs are rarely brought about by dominant players (such as the U.S. military is today). For a dominant player to bring about an RMA requires a receptive organizational climate, fostering a continually refined vision of how war may change in the future and encouraging vigorous debate regarding the future of the organization; senior officers with traditional credentials willing to sponsor new ways of doing things and able to establish new promotion pathways for junior officers practicing a new way of war; mechanisms for experimentation, to discover, learn, test and demonstrate new ideas; and ways of responding positively to the results of successful experiments, in terms of doctrinal changes, acquisition programs, and force structure modifications. The DoD has some of these elements today, but is missing others. The report makes specific suggestions regarding ways of filling in the missing elements. Doing these things will facilitate DoD's force transformation activities and help ensure that the next RMA is brought about by the United States. and not some other nation
Reconstruction under fire : case studies and further analysis of civil requirements by Brooke Stearns Lawson( )

4 editions published in 2010 in English and held by 1,883 WorldCat member libraries worldwide

"Successful counterinsurgency (COIN) requires the integration of security and civil COIN to create conditions that allow the population to choose between the government and insurgents, eliminate the grievances that gave rise to the insurgency, and present the population with choices that are more attractive than what the insurgents can offer. Building on a framework for integrating civil and military counterinsurgency first described in Reconstruction Under Fire: Unifying Civil and Military Counterinsurgency, this volume presents an approach to the civil component of counterinsurgency that builds on detailed background, context analysis, and threat analysis to identify and develop critical civil COIN activities. It illustrates this approach using three case studies: Nangarhar province in Afghanistan, Nord-Kivu province in the Democratic Republic of the Congo, and Al Anbar province in Iraq. The approach builds on the best aspects of existing conflict assessment methodologies and adds new elements developed specifically for this project. The resulting framework goes beyond the strategic and operational decisions related to designing a program that is appropriate for a given conflict context."--Page 4 of cover
Sexual orientation and U.S. military personnel policy : an update of RAND's 1993 study by National Defense Research Institute (U.S.)( )

8 editions published in 2010 in English and held by 1,878 WorldCat member libraries worldwide

At the request of the Senate Armed Services Committee and the Secretary of Defense, the RAND Corporation conducted a study on sexual orientation and U.S. military policy in order to provide information and analysis that might be considered in discussing the possible repeal of the law known as "Don't Ask, Don't Tell" (DADT). The study examined DADT implementation; U.S. public and military opinion about allowing gay men and lesbians to serve in the military without restriction; and the scientific literature on group cohesion, sexual orientation, and related health issues. RAND conducted focus groups with military personnel and a survey of gay, lesbian, and bisexual military personnel. RAND researchers also examined the comparable experiences of other institutions, domestic agencies, and foreign militaries, as well as how repeal of DADT might affect unit cohesion and military readiness and effectiveness
 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.05 (from 0.02 for A review o ... to 1.00 for National D ...)

Covers
Victory has a thousand fathers : detailed counterinsurgency case studiesThe European Security and Defense Policy : NATO's companion - or competitor?On "other war" : lessons from five decades of RAND counterinsurgency researchMarried to the military : the employment and earnings of military wives compared with those of civilian wivesThe rise of political Islam in TurkeyThe emergence of noopolitik : toward an American information strategyAfghanistan's local war : building local defense forcesByting back : regaining information superiority against 21st-century insurgents
Alternative Names
Defense Research Institute

États-Unis National defense research institute

N.D.R.I.

NDRI

Rand Corporation Defense Research Institute

Rand Corporation National Defence Research Institute

Rand Corporation National Defense Research Institute

Rand Corporation National Research Defense Institute

Rand Corporation. National Security Research Division. National Defense Research Institute

Rand's National Defense Research Institute

Languages
English (136)