Narrow your search

Library

Vlaams Parlement (11)


Resource type

book (11)


Language

English (11)


Year
From To Submit

2023 (2)

2022 (4)

2020 (5)

Listing 1 - 10 of 11 << page
of 2
>>
Sort by

Book
An Estimation of the Economic Costs of Social-Distancing Policies
Authors: ---
Year: 2020 Publisher: Santa Monica, Calif. RAND Corporation

Loading...
Export citation

Choose an application

Bookmark

Abstract

Many state and local officials are making social-distancing policy decisions based on the actions of other locations rather than through a decisionmaking framework that evaluates these measures and their reduction of the spread of coronavirus disease 2019 (COVID-19). This report provides an initial assessment of the possible short-term economy-wide effects of social distancing. These results should be taken as rough order-of-magnitude estimates meant to help inform decisionmakers during the COVID-19 crisis.

Keywords


Book
Identifying Critical IT Products and Services
Authors: --- --- --- --- --- et al.
Year: 2022 Publisher: RAND Corporation

Loading...
Export citation

Choose an application

Bookmark

Abstract

In the past 20 years, the U.S. government, championed by the U.S. Department of Homeland Security (DHS) and in collaboration with other public and private entities, has made considerable progress enumerating the country's critical infrastructure components and National Critical Functions (NCFs). However, these efforts have not enabled specific identification of the most-critical computing systems within networks. To help fill that gap, researchers from the Homeland Security Operational Analysis Center sought to examine and enumerate the businesses that provide the most-critical information technology (IT) products and services and lay the groundwork for DHS and other federal and private-sector elements to better apply a risk-based approach to protecting the country's most-important assets and systems. They sought to (1) create a prioritized list of software and businesses that provide IT products and services and (2) develop a framework that could continue and extend this analysis into the future to accommodate emerging technologies and the evolution of the technology market. The work featured four workstreams: (1) identifying and integrating disparate data sources to identify the most-critical vulnerabilities and software applications in the U.S. internet protocol space; (2) collecting original data to map the software dependency and ownership structure of the most-referenced libraries; (3) leveraging existing work to identify specific IT and communication companies that were most interconnected and could suffer the greatest economic loss; and (4) developing a way to link NCFs to actual software companies supporting those functions.

Keywords


Book
Rivalry in the Information Sphere: Russian Conceptions of Information Confrontation
Authors: --- --- --- --- --- et al.
Year: 2022 Publisher: RAND Corporation

Loading...
Export citation

Choose an application

Bookmark

Abstract

Information and information technologies infuse all parts of modern society - in peacetime, during periods of strategic competition, and during wartime. Since the early 2000s, advanced information technologies for rapidly sharing, processing, and analyzing data have had a significant effect on the character of Russian military operations. An examination of the Russian military-scientific literature reveals the centrality of the concept of information confrontation in Russian military strategy. Information confrontation, or informatsionnoe protivoborstvo (IPb), is a distinct element of Russian strategic thinking in the post-Cold War era. Russia sees itself as being in a constant state of information confrontation with the West as it tries to expand its own dominance and prevent its adversaries from gaining influence. In this report, the authors examine prevailing definitions and types of information confrontation, and they discuss the historical evolution of Russian (and Soviet) influence operations and psychological warfare, from 18th-century Imperial Russia up to the Vladimir Putin era. As a fundamental element of Russian strategy, information confrontation is evolving from something primarily carried out to supplement traditional means of waging war into something that is carried out continuously and in peacetime to shape the operational environment so that it will be malleable in future conflicts. The authors also analyze the experience of Ukraine, which has been the subject of one of Russia's most comprehensive IPb and hybrid warfare campaigns in recent years. Ukraine offers a window into the present-day role of IPb and Russian activities and intentions in the information domain.

Keywords


Book
Overcoming Compound Racial Inequity: Policies and Costs for Closing the Black-White Wealth Gap
Authors: --- --- --- ---
Year: 2022 Publisher: RAND Corporation

Loading...
Export citation

Choose an application

Bookmark

Abstract

Wealth is the accumulation of past and present income, assets, debts, and disparities. Differences in Black and white Americans' economic status show how the harms of the past - slavery, segregation, redlining, discrimination - live on in the present. The result is that white Americans make 73 percent more in annual income, are nearly two times more likely to own their homes, hold ten times more wealth, and are 28 times more likely to become millionaires than Black Americans. Under current conditions and without intervention, it is unclear if and how the racial wealth gap could ever close over a meaningful time horizon. Recognizing the strength and persistence of the United States' racial wealth gap, Americans have called for historic policy interventions to address long-standing inequities and current wealth disparities. Proposed actions often include large wealth allocations, in the form of one-time government payments, to Black households. This potential policy device raises several questions about the efficacy of disparity-reducing wealth allocations. This report, part of a discussion paper series investigating the U.S. racial wealth gap, provides insight into these questions based on the authors' quantitative analysis of current wealth distributions, a measure of racial wealth disparity, and a model of disparity-reducing wealth allocations. The authors use data from the Survey of Consumer Finances, a survey conducted by the Federal Reserve Board, to investigate the sources of wealth disparity, estimate the potential first-order impacts of government allocations, and shed light on the possible trade-offs of one-time allocations.

Keywords


Book
Deterring Attacks Against the Power Grid: Two Approaches for the U.S. Department of Defense
Authors: --- --- --- ---
Year: 2020 Publisher: Santa Monica, Calif. RAND Corporation

Loading...
Export citation

Choose an application

Bookmark

Abstract

Increased reliance on intelligence processing, exploitation, and dissemination; networked real-time communications for command and control; and a proliferation of electronic controls and sensors in military vehicles (such as remotely piloted aircraft), equipment, and facilities have greatly increased the U.S. Department of Defense (DoD)'s dependence on energy, particularly electric power, at installations. Thus, ensuring that forces and facilities have access to a reliable supply of electricity is critical for mission assurance. However, most of the electricity consumed by military installations in the continental United States comes from the commercial grid—a system that is largely outside of DoD control and increasingly vulnerable to both natural hazards and deliberate attacks, including cyberattacks. In this report, researchers explore two approaches that DoD might consider as options for deterring attacks against the power grid: enhancing resilience and reliability to deter by denial and using the threat of retaliation to deter by cost imposition. The report represents a first step in developing frameworks and context to support DoD decisionmaking in this area.

Keywords


Book
Cybersecurity and Supply Chain Risk Management Are Not Simply Additive: Implications for Directions in Risk Assessment, Risk Mitigation, and Research to Secure the Supply of Defense Industrial Products
Authors: --- --- --- --- --- et al.
Year: 2023 Publisher: RAND Corporation

Loading...
Export citation

Choose an application

Bookmark

Abstract

The Air Force Research Laboratory (AFRL) asked RAND Project AIR FORCE (PAF) for assistance understanding how cyber-related risks compare with other risks to its defense-industrial supply chains—a scope that included supply chains for hardware, not supply chains for software—and exploring implications for directions in risk assessment and mitigation and for research. AFRL was interested in how attackers might use supply chains to wage attacks, such as through malicious code, and how supply chains might, themselves, be targets of attack, such as through disruption. To conduct the analysis, PAF drew insights from the literatures on cybersecurity, supply chain risk management (SCRM), game theory, and network analysis and worked with sets of stylized supply chains and fundamental principles of risk management. The report uses the phrase cyber SCRM broadly to refer to the cybersecurity of supply chains, including attacks through supply chains to reach a target and attacks on supply chains in which the target of the attack is the supply chain itself.

Keywords


Book
Systemic Risk in the Broad Economy: Interfirm Networks and Shocks in the U.S. Economy
Authors: --- --- --- --- --- et al.
Year: 2020 Publisher: Santa Monica, Calif. RAND Corporation

Loading...
Export citation

Choose an application

Bookmark

Abstract

In the years following the 2008 financial crisis, significant attention was paid to systemic risk within heavily interconnected financial networks. The academic discussions on interbank network structure, market stability, and contagion gave rise to a policy debate about whether major banks had become both too big and too interconnected to fail. However, despite the focus on systemic risk—the risk of market collapse resulting from firm-level risks—within the financial sector, little attention was paid to systemic risks in the economy at large. The authors of this report address that gap in research. To begin to measure the potential magnitude of systemic risk in the broad economy, the authors estimated firm-to-firm connections across sectors of the U.S. economy. Using network analysis on observed firm-level networks to elucidate heavily interconnected firms and areas of centrality (i.e., firms of significant network importance), statistical inference, and network calibration, the authors provide a new approach to modeling the economy at the firm level that expands on the traditional sector-level input-output modeling by estimating firm-level input-output flows. The result allows one to use traditional input-output modeling to estimate the size of potential idiosyncratic shocks and to use economically weighted measures of centrality to reveal systemically important firms. The approach is a contribution to the growing literature on the microfoundations of economic risk, with the potential for use across a wide range of applications from financial stability to natural disasters.

Keywords


Book
Measuring Cybersecurity and Cyber Resiliency
Authors: --- --- --- --- --- et al.
Year: 2020 Publisher: Santa Monica, Calif. RAND Corporation

Loading...
Export citation

Choose an application

Bookmark

Abstract

This report presents a framework for the development of metrics—and a method for scoring them—that indicates how well a U.S. Air Force mission or system is expected to perform in a cyber-contested environment. These metrics are developed so as to be suitable for informing acquisition decisions during all stages of weapon systems' life cycles. There are two types of cyber metrics: working-level metrics to counter an adversary's cyber operations and institutional-level metrics to capture any cyber-related organizational deficiencies. The cyber environment is dynamic and complex, the threat is ubiquitous (in peacetime and wartime, deployed and at home), and no set of underlying "laws of nature" govern the cyber realm. A fruitful approach is to define cyber metrics in the context of a two-player cyber game between Red (the attacking side) and Blue (the side trying to ensure a mission). The framework helps, in part, to reveal where strengths in one area might partially offset weaknesses in another. Additional discussions focus on how those metrics can be scored in ways that are useful for supporting decisions. The metrics are aimed at supporting program offices and authorizing officials in risk management and in defining requirements, both operational requirements as well as the more detailed requirements for system design used in contracts, the latter often referred to as derived requirements.

Keywords


Book
Building Agile Combat Support Competencies to Enable Evolving Adaptive Basing Concepts
Authors: --- --- --- --- --- et al.
Year: 2020 Publisher: Santa Monica, Calif. RAND Corporation

Loading...
Export citation

Choose an application

Bookmark

Abstract

In many potential operating environments, the U.S. Air Force faces adversaries that are increasingly capable of limiting where and how it projects combat power. Whether the environments are called anti-access/area denial environments or contested, degraded, and operationally limited (CDO) environments, they feature adversaries with larger numbers of more-precise missiles that have further reach than before and that threaten traditional U.S. air bases like never before. To persevere in CDO environments, the Air Force and regional warfighting commanders are exploring a variety of alternative force deployment and employment concepts under an umbrella initiative called adaptive basing (AB). Upon surveying the variety of concepts categorized as part of AB, the authors found that all of them—adaptive or not—can be characterized as survival strategies. Thus, AB is less about increasing the adaptiveness of aircraft and air forces than it is about extending their survivability through strategies that are both traditional and adaptive. In this report, RAND researchers review the motivations for AB, describe a footprint model used for estimating the AB implications for Agile Combat Support (ACS), estimate the ACS requirements to perform three fundamental competencies that can enable AB concepts, consider the obstacles to supporting those requirements, and discuss the implications and recommendations for the ACS community and the Air Force at large. Ultimately, it will take a more-concerted, deliberate, and organized effort to flesh out and refine AB concepts into useable warfighting tools. Some concepts might be discarded for reasons of feasibility, cost, or effectiveness, but if the threats perceived today are credible, AB ought to be tested and found wanting rather than declared to be too difficult without sufficient investigation.

Keywords


Book
A Risk Assessment of National Critical Functions During COVID-19: Challenges and Opportunities

Loading...
Export citation

Choose an application

Bookmark

Abstract

The Homeland Security Operational Analysis Center (HSOAC) was tasked with using the National Risk Management Center's (NRMC's) National Critical Function (NCF) risk assessment framework to assess risk to each NCF and complete individual risk analyses for the 55 NCFs. The NRMC also requested that HSOAC perform additional tasks, including providing a report on emerging lessons learned from risk management efforts to limit the impact and disruption that coronavirus disease 2019 (COVID-19) had on the 55 NCFs. This report presents insights into best practices in risk assessment; challenges in the implementation of the NCF risk assessment framework to characterize risk to critical infrastructure associated with the COVID-19 pandemic; recommendations for improving the framework; and suggestions for further characterization of NCFs' interdependence, vulnerability, and geographic variation that could improve risk assessment processes.

Keywords

Listing 1 - 10 of 11 << page
of 2
>>
Sort by