WorldCat Identities

National Defense University Center for Technology and National Security Policy

Overview
Works: 241 works in 541 publications in 1 language and 49,533 library holdings
Genres: Conference papers and proceedings  Periodicals 
Roles: Publisher, Publishing director, Other
Classifications: UA23, 355.033573
Publication Timeline
.
Most widely held works by National Defense University
Bio-inspired innovation and national security by Robert E Armstrong( Book )

8 editions published in 2010 in English and held by 376 WorldCat member libraries worldwide

From the Introduction: This volume is designed as an overview of the many applications of biology to the military and national security writ large (with the exception of bioweapons and biomedicine). Policy issues are covered, and original research is presented. The diversity of the authors' backgrounds reflects the breadth of applications and opportunities of biology to modern problems. The read should walk away enlightened as to the many possible ways in which biology is influencing and will continue to influence national security. Authors were asked to provede foresight on trends and indicators in their areas of interest (but not forecasts, which would describe a single future state) in order to better understand their implications for the next 20 years or so
The 71F advantage : applying Army research psychology for health and performance gains( Book )

3 editions published in 2010 in English and held by 351 WorldCat member libraries worldwide

From the back cover: This book, which grew out of an Army research psychology conference, is the first of its kind, intended to provide a comprehensive overview of what Army research psychologists do. Chapters cover the diverse activity areas of 71Fs, from the neurophysiology of sleep, to traumatic brain injury, to leadership and organizational process, as well as several personal and historical accounts. Army research psychologists are making a difference. Through their research, 71Fs provide leaders with new insights and tools for increasing the health and performance of military personnel. This is the "71F Advantage."
Defense horizons : a publication of the Center for Technology and National Security Policy, National Defense University( )

in English and No Linguistic content and held by 347 WorldCat member libraries worldwide

Civilian surge : key to complex operations( Book )

3 editions published in 2009 in English and held by 331 WorldCat member libraries worldwide

Examines the national need for assistance and quick response to military personnel from civilian resources for stabilization and reconstruction operations. Concludes with the efforts to build a civilian response capacity for complex operations are incomplete and require further attention
Catastrophic bioterrorism : what is to be done? by Richard Danzig( Book )

2 editions published in 2003 in English and held by 315 WorldCat member libraries worldwide

New directions in U.S. national security strategy, defense plans, and diplomacy : an official studies blueprint by Richard L Kugler( Book )

3 editions published in 2011 in English and held by 297 WorldCat member libraries worldwide

"Where are U.S. national security strategy, defense plans, and diplomacy headed in the coming years? An answer to this important question comes from seven official studies that have been issued during 2010 ... This work addresses each of these seven studies individually in sequential order. In each case, it endeavors to summarize the main features of the study and to evaluate its contents. At the end, this book examines how these studies interlock to form an overall blueprint, identifies lingering issues that call for further analysis, and offers constructive ideas for further research and analyses"--Page xi-xii
Policing and COIN operations : lessons learned, strategies, and future directions by Samuel Musa( Book )

5 editions published between 2011 and 2012 in English and held by 281 WorldCat member libraries worldwide

Summaries of sessions from a workshop held on September 29, 2010, co-sponsored by the Center for Technology and National Security Policy (CTNSP) of the National Defense University (NDU) and the Combating Terrorism Technical Support Office (CTTSO) of the Threat Support Working Group (TSWG) of the Department of Defense. The workshop was focused on lessons learned from past campaigns, development of new strategies, and outlining future directions for implementation
Strategic shift : appraising recent changes in U.S. defense plans and priorities by Richard L Kugler( Book )

2 editions published in 2013 in English and held by 281 WorldCat member libraries worldwide

This study examines important changes in U.S. defense planning unveiled by the Department of Defense (DOD) during 2012 and early 2013. Through a series of strategic and operational documents DOD has put forth an interlocking set of changes that placed greater emphasis on the Asia-Pacific and Middle East regions, created a new force-sizing construct, adopted new operational concepts, trimmed the U.S. force structure and defense budget, and called for enhanced cooperation with global partners. These strategies and concepts were developed under to the levels of the FY13 Defense budget submission and are carried forth in the FY14 Defense budget submission. This study describes these changes, evaluates them, and addresses the challenges of implementation. In particular, it recommends that DOD 'double down' in its pursuit of globally integrated operations through joint force integration in the context of the Capstone Concept for Joint Operations and the cross-domain synergy needed to operate effectively in the face of sophisticated adversaries. These are likely to be important in any strategic context. This study's conclusions and recommendations are not altered by DOD's budget request in FY14, though effective implementation will be more challenging
Capability development in support of comprehensive approaches : transforming international civil-military interactions by International Transformation Conference( Book )

5 editions published in 2011 in English and held by 278 WorldCat member libraries worldwide

"This book includes papers presented at the Second International Transformation (ITX2) Conference, held in Rome, Italy, at the NATO Defense College (NDC) June 21-23, 2011, as well as a summary of the conference discussions. Co-hosted by NDC, Allied Command Transformation (ACT), and the International Transformation (ITX) Chairs Network, the conference brought together academics, policymakers, and practitioners from 13 nations to discuss the topic of 'Capability Development in Support of Comprehensive Approaches: Transforming International Civil-Military Interactions'"--Page vii
Changing mindsets to transform security : leader development for an unpredictable and complex world by International Transformation Conference( Book )

2 editions published in 2013 in English and held by 262 WorldCat member libraries worldwide

"This book is a compilation of papers and discussions from the Third International Transformation Conference and Workshop on Leader Development in Washington, DC, on June 19-20, 2013. The event was sponsored by the NATO Headquarters Supreme Allied Commander Transformation, hosted at the National Defense University, and supported by the International Transformation Chairs Network."--Page [4] of cover
Transforming for stabilization and reconstruction operations( Book )

7 editions published between 2003 and 2006 in English and held by 122 WorldCat member libraries worldwide

På baggrund af erfaringerne fra de amerikansk ledede operationer i Afghanistan og Irak analyseres, hvorledes de militære styrker fremtidigt kan forberedes bedst muligt til også at genopbygge og restabilisere de tidligere krigsskuepladser, således at de berørte samfund kan komme til at fungere optimalt
Battle-wise : seeking time-information superiority in networked warfare by David C Gompert( Book )

8 editions published in 2006 in English and held by 117 WorldCat member libraries worldwide

The capacity and means by which the American Armed Forces defend their nation are entering a paradigm-breaking transition period. Previous transitions have been driven by the technologies of weapons and their platforms. This is not so in the 21st century. Taking the information revolution as a starting point, Battle-Wise argues that only by strengthening the relationship between information technology and brain matter will the U.S. military enhance its ability to outsmart and outfight future adversaries. Our aim is to understand whether and how advantages in thinking and decisionmaking under operational conditions can affect outcomes victories or defeats especially in networked warfare. It is important to identify as precisely as possible the mental abilities, such as anticipation and rapid adaptation, that are of greatest utility in networked operations and thus in strategic competition so that these abilities can be emphasized in the ways that military personnel are recruited, taught, developed, and organized. The role of the mind in networked warfare is still unknown. This book is meant to raise ideas, issues, and possibilities, as well as at the risk of seeming presumptuous a potential framework
Information assurance : trends in vulnerabilities, threats, and technologies( Book )

4 editions published between 2004 and 2005 in English and held by 86 WorldCat member libraries worldwide

One of the missions of the Center for Technology and National Security Policy at National Defense University is to study the transformation of America's military and to explore the consequences of the information revolution. To further this mission, National Defense University, in collaboration with The Center for Public Policy and Private Enterprise of the University of Maryland's School of Public Affairs, brought together leaders in the fields of military and commercial technology. The purpose of the meeting was to gain insight into the risks and vulnerabilities inherent in the use of information technology on the battlefield and in military systems. This volume presents the results of that workshop. This volume examines threats and vulnerabilities in the following four areas: (1) physical attacks on critical information nodes; (2) electromagnetic attacks against ground, airborne, or space-based information assets; (3) cyber attacks against information systems; and (4) attacks and system failures made possible by the increased level of complexity inherent in the multiplicity of advanced systems. Chapters are as follows: "Trends in Vulnerabilities, Threats, and Technologies," by Jacques S. Gansler and William Lucyshyn; "Physical Vulnerabilities of Critical Information Systems," by Robert H. Anderson; "Physical Vulnerabilities Exposed at the National Training Center," by Colonel John D. Rosenberger; "Dealing with Physical Vulnerabilities," by Bruce W. MacDonald; "Vulnerabilities to Electromagnetic Attack of Defense Information Systems," by John M. Borky; "Vulnerabilities to Electromagnetic Attack of the Civil Infrastructure," by Donald C. Latham; "Trends in Cyber Vulnerabilities, Threats, and Countermeasures," by Michael A. Vatis; "Enhancing Cyber Security for the Warfighter," by Sean R. Finnegan; "Complexity of Network Centric Warfare," by Stanley B. Alterman; and "Difficulties with Network Centric Warfare," by Charles Perrow
Moore's law : a Department of Defense perspective by Gerald M Borsuk( Book )

2 editions published in 2003 in English and held by 17 WorldCat member libraries worldwide

Lessons of Abu Ghraib : understanding and preventing prisoner abuse in military operations by Paul T Bartone( Book )

2 editions published in 2008 in English and held by 11 WorldCat member libraries worldwide

The abuse of prisoners by U.S. soldiers at Abu Ghraib had broad struggle consequences, leading many people around the world to question the legitimacy of U.S. goals and activities in Iraq. This paper draws on extensive unclassified reports from multiple investigations that followed Abu Ghraib and applies key psychological as well as social-situational perspectives to develop a better grasp of the causative factors. From a psychological standpoint, most young adults are powerful inclined to behave in accord with the social conventions and pressures around them. Especially in ambiguous circumstances, then, it is important that standards of behavior be clear and explicit throughout all phases of an operation and that leaders at all levels represent and reinforce those standards
Organizing for national security : unification or coordination? by James M Keagle( Book )

2 editions published in 2007 in English and held by 10 WorldCat member libraries worldwide

Experience gained from the 9/11 attacks, combat in Iraq and Afghanistan, disaster assistance during and after Hurricane Katrina, and the ongoing war on terror provides the basis for amending our anachronistic national security structures and practices. Many analysts and officials have called for a second-generation version of the Goldwater-Nichols Department of Defense Reorganization Act of 1986 to address the array of organizational and management challenges that we face. Some argue that the new security environment requires even more fundamental change, similar to what was enacted after World War II. The principal legislation that emerged from that era was the National Security Act of 1947. Goldwater-Nichols aimed to fix inter-Service problems by streamlining the chain of command and promoting 'jointness' but did not fundamentally alter the structure of the U.S. military. These earlier efforts attempted to strike a balance between those who wanted to unite bureaucracies to improve efficiency (primarily resource considerations) and produce more effective outcomes and those who opposed potentially dangerous concentrations of power and desired to preserve their heart-and-soul missions (as well as congressional support for their strategic view and related combat systems and force structures). Today, the debate rages anew with the security of this nation dependent on the outcome. This paper explores two options for reorganization: unification and coordination. We investigate each against the backdrop of the two previous attempts at reorganization in the context of the Madisonian political culture that constitutes part of who we are as a nation. Finally, each option is judged against its ability to contribute to the development and implementation of the kinds of strategies and operations needed to wage the new kind of war and peace in the emerging global security environment
Army science and technology analysis for stabilization and reconstruction operations by Richard Chait( Book )

3 editions published in 2006 in English and held by 5 WorldCat member libraries worldwide

Examines capability gaps and science and technology needs of the Army to facilitate post-conflict reconstruction and stabilization operations
The bug stops here : force protection and emerging infectious diseases by Donald F Thompson( Book )

3 editions published in 2005 in English and held by 5 WorldCat member libraries worldwide

Addresses the issue of force protection as it relates to epidemics, using lessons learned from past disease outbreaks as guidance for mitigating future epidemics
Policy analysis in national security affairs : new methods for a new era by Richard L Kugler( Book )

2 editions published in 2006 in English and held by 3 WorldCat member libraries worldwide

This book addresses how to conduct policy analysis in the field of national security, including foreign policy and defense strategy. It is a philosophical and conceptual book for helphing people think deeply, clearly, and insightfully about complex policy issues. This books reflects the viewpoint that the best policies normally come from efforts to synthesize competing camps by drawing upon the best of each of them and by combining them to forge a sensible whole. While this book is written to be reader-friendly, it aspires to in-depth scholarship
 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.43 (from 0.31 for Bio-inspir ... to 0.60 for Defense ho ...)

Bio-inspired innovation and national security
Alternative Names
Center for Technology and National Security Policy

Center for Technology and National Security Policy (National Defense University)

CTNSP

CTNSP (Center for Technology and National Security Policy)

CTNSP (National Defense University. Center for Technology and National Security Policy)

National defense university

National Defense University Center for Technology and National Security Policy

National defense university Washington, D.C. Center for technology and national security policy

National Defense University Washington, DC Center for Technology and National Security Policy

Languages
English (73)

Covers
Civilian surge : key to complex operationsPolicy analysis in national security affairs : new methods for a new era