The Rudman Report


Book Description




Public Administration Review


Book Description

Includes section "Reviews of books and documents."







Road Map for National Security


Book Description

"After our examination of the new strategic environment of the next quarter century (Phase I) and of a strategy to address it (Phase II), this Commission concludes that significant changes must be made in the structures and processes of the U.S. national security apparatus. Our institutional base is in decline and must be rebuilt. Otherwise, the United States risks losing its global influence and critical leadership role. We offer recommendations for organizational change in five key areas: ensuring the security of the American homeland; recapitalizing America's strengths in science and education; redesigning key institutions of the Executive Branch; overhauling the U.S. government's military and civilian personnel systems; and reorganizing Congress's role in national security affairs"--Page xiii.




U.S. Strategy for Pakistan and Afghanistan


Book Description

The Council on Foreign Relations sponsors Independent Task Forces to assess issues of current and critical importance to U.S. foreign policy and provide policymakers with concrete judgments and recommendations. Diverse in backgrounds and perspectives, Task Force members aim to reach a meaningful consensus on policy through private and non-partisan deliberations. Once launched, Task Forces are independent of CFR and solely responsible for the content of their reports. Task Force members are asked to join a consensus signifying that they endorse "the general policy thrust and judgments reached by the group, though not necessarily every finding and recommendation." Each Task Force member also has the option of putting forward an additional or a dissenting view. Members' affiliations are listed for identification purposes only and do not imply institutional endorsement. Task Force observers participate in discussions, but are not asked to join the consensus. --Book Jacket.




The Information Revolution and National Security


Book Description

The effects of the information revolution are particularly profound in the realm of national security strategy. They are creating new opportunities for those who master them. The U.S. military, for instance, is exploring ways to seize information superiority during conflicts and thus gain decisive advantages over its opponents. But the information revolution also creates new security threats and vulnerabilities. No nation has made more effective use of the information revolution than the United States, but none is more dependent on information technology. To protect American security, then, military leaders and defense policymakers must understand the information revolution. The essays in this volume are intended to contribute to such an understanding. They grew from a December 1999 conference co-sponsored by the U.S. Army War College Strategic Studies Institute and the University of Pittsburgh Matthew B. Ridgway Center for International Security Studies. The conference brought together some of the foremost members of the academic strategic studies community with representatives of the U.S. Government and U.S. military. As could be expected when examining a topic as complex as the relationship between the information revolution and national security, the presentations and discussions were far-ranging, covering such issues as the global implications of the information revolution, the need for a national information security strategy, and the role of information in U.S. military operations. While many more questions emerged than answers, the conference did suggest some vital tasks that military leaders and defense policymakers must undertake.




Sexual Harassment of Women


Book Description

Over the last few decades, research, activity, and funding has been devoted to improving the recruitment, retention, and advancement of women in the fields of science, engineering, and medicine. In recent years the diversity of those participating in these fields, particularly the participation of women, has improved and there are significantly more women entering careers and studying science, engineering, and medicine than ever before. However, as women increasingly enter these fields they face biases and barriers and it is not surprising that sexual harassment is one of these barriers. Over thirty years the incidence of sexual harassment in different industries has held steady, yet now more women are in the workforce and in academia, and in the fields of science, engineering, and medicine (as students and faculty) and so more women are experiencing sexual harassment as they work and learn. Over the last several years, revelations of the sexual harassment experienced by women in the workplace and in academic settings have raised urgent questions about the specific impact of this discriminatory behavior on women and the extent to which it is limiting their careers. Sexual Harassment of Women explores the influence of sexual harassment in academia on the career advancement of women in the scientific, technical, and medical workforce. This report reviews the research on the extent to which women in the fields of science, engineering, and medicine are victimized by sexual harassment and examines the existing information on the extent to which sexual harassment in academia negatively impacts the recruitment, retention, and advancement of women pursuing scientific, engineering, technical, and medical careers. It also identifies and analyzes the policies, strategies and practices that have been the most successful in preventing and addressing sexual harassment in these settings.




Engaged Fatherhood for Men, Families and Gender Equality


Book Description

This aim of this open access book is to launch an international, cross-disciplinary conversation on fatherhood engagement. By integrating perspective from three sectors -- Health, Social Policy, and Work in Organizations -- the book offers a novel perspective on the benefits of engaged fatherhood for men, for families, and for gender equality. The chapters are crafted to engaged broad audiences, including policy makers and organizational leaders, healthcare practitioners and fellow scholars, as well as families and their loved ones.




Winning the Oil Endgame


Book Description

Enough about the oil problem. Here?s the solution.Over a few decades, starting now, a vibrant US economy (then others) can completely phase out oil. This will save a net $70 billion a year, revitalize key industries and rural America, create a million jobs, and enhance security.Here?s the roadmap ? independent, peer-reviewed, co-sponsored by the Pentagon ? for the transition beyond oil, led by business and profit.




Cyber Security Policy Guidebook


Book Description

Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security policy issues on a global scale—taking great care to educate readers on the history and current approaches to the security of cyberspace. It includes thorough descriptions—as well as the pros and cons—of a plethora of issues, and documents policy alternatives for the sake of clarity with respect to policy alone. The Guidebook also delves into organizational implementation issues, and equips readers with descriptions of the positive and negative impact of specific policy choices. Inside are detailed chapters that: Explain what is meant by cyber security and cyber security policy Discuss the process by which cyber security policy goals are set Educate the reader on decision-making processes related to cyber security Describe a new framework and taxonomy for explaining cyber security policy issues Show how the U.S. government is dealing with cyber security policy issues With a glossary that puts cyber security language in layman's terms—and diagrams that help explain complex topics—Cyber Security Policy Guidebook gives students, scholars, and technical decision-makers the necessary knowledge to make informed decisions on cyber security policy.