Modeling Terrorist Beliefs and Motivations
|
|
- Cori Parrish
- 5 years ago
- Views:
Transcription
1 CREATE Research Archive Research Project Summaries 2012 Modeling Terrorist Beliefs and Motivations Heather Rosoff University of Southern California, Richard John University of Southern California, Follow this and additional works at: Part of the Risk Analysis Commons Recommended Citation Rosoff, Heather and John, Richard, "Modeling Terrorist Beliefs and Motivations" (2012). Research Project Summaries. Paper This Article is brought to you for free and open access by CREATE Research Archive. It has been accepted for inclusion in Research Project Summaries by an authorized administrator of CREATE Research Archive. For more information, please contact
2 National Center for Risk and Economic Analysis of Terrorism Events University of Southern California Los Angeles, California Modeling Terrorist Beliefs and Motivations October 2011 to August 2012 Heather Rosoff and Richard John University of Southern California "This research was supported by the United States Department of Homeland Security through the National Center for Risk and Economic Analysis of Terrorism Events (CREATE) under Cooperative Agreement No ST-061-RE0001. However, any opinions, findings, and conclusions or recommendations in this document are those of the authors and do not necessarily reflect views of the United States Department of Homeland Security or the University of Southern California." Cooperative Agreement No ST-061-RE0001 Department of Homeland Security
3 ABOUT CREATE The National Center for Risk and Economic Analysis of Terrorism Events (CREATE) was the first university-based Center of Excellence (COE) funded by University Programs of the Science and Technology (S&T) Directorate of the Department of Homeland Security (DHS). CREATE started operations in March of This annual report covers the seventh year of CREATE funding from October 2011 to August 2012, under Cooperative Agreement 2010-ST-061- RE0001 from DHS. While the text of this report focuses on the seventh year, all data tables, publications, lists of participants, students, and presentations and events are cumulative from the inception of CREATE. CREATE s research mission is to develop advanced models and tools for risk assessment, economic assessment, and risk management to counter terrorism. CREATE accomplishes this mission through an integrated program of research, education, and outreach, spanning the disciplines of economics, psychology, political science, industrial and systems engineering and information science. CREATE develops models, analytical tools, methodologies and software, and tests these tools in case analyses, representing critical homeland security investment and policy decisions. Due to the cross-cutting nature of research in risk, economics, and risk management, CREATE serves the need of many client agencies at the DHS, including the Transportation Security Agency, Customs and Border Protection, Immigration and Customs Enforcement, FEMA and the US Coast Guard. In addition, CREATE has developed relationships with clients in the Offices of National Protection and Programs, Intelligence and Analysis, General Council, Health Affairs, and Domestic Nuclear Detection. Using a mix of fundamental and applied research, CREATE faculty and students take both the long-term view of how to reduce terrorism risk through fundamental research and the medium-term view of how to improve the cost-effectiveness of counter-terrorism policies and investments through applied research. Please visit for more information. Page 2 of 9
4 1. Modeling Terrorist Beliefs and Motivations Overview Research Accomplishments Research Products Presentations Conferences Education and Outreach Products 7 1. Modeling Terrorist Beliefs and Motivations Overview The objective of this research is to further develop our pioneering approach to adversary threat assessment through the construction of random utility models of terrorist preferences. This work builds on previous research efforts (Rosoff, 2009; Rosoff & John, 2009) that have used decision analysis models and elicitation methods to: (1) construct of a value tree for a terrorist leader or organization using value focused thinking (VFT), (2) construct a random multi-attribute utility model (RMAUM) capturing trade-offs among conflicting objectives and single-attribute utility functions representing risk attitudes of terrorist leaders, (3) construct probability distributions capturing key uncertainties for terrorist leaders (e.g., attack success) and uncertainties in the utility function parameters provided by adversary experts. Understanding the objectives and motivations that drive terrorist group behavior is critical. Current methods for terrorism risk assessment focus on target vulnerability, terrorist capability and resources, and attack consequence. What many researchers have yet to consider is the influence of terrorist group values and beliefs in deciphering the root cause of their militant behavior. This understanding has the potential to contribute to probabilistic estimates of terrorist threats. During Year 8 we further developed the adversary preference modeling (APM) methodology by (1) continuing to validate the APM through a case study with political/social/advocacy groups the Sea Shepherd Conservation Society (Sea Shepherd) with an action oriented agenda that is driven by specific motives, values, and objectives, and (2) beginning the development and use of a System Dynamics Simulation Model to further examine the structure of the terrorist groups organizational system, the interactions among its components, and how change in one area, for instance in the form of a defender countermeasure, affects the whole system and its parts over time. Research progress and accomplishments made throughout Year 8 are described in the subsequent section. 2. Research Accomplishments APM Model Validation During Year 8 we built an MAU model based on what could be identified about the Sea Shepherd online and from second-hand sources. We also interviewed Sea Shepherd stakeholders to evaluate the accuracy and validity of the originally constructed second-hand model, and hence determining whether the APM modeling approach could be validated. With respect to the construction of the proxy model, basic research (online resources and literature) led to the development of a first set of objectives. Sea Shepherd s goal is to to end Page 3 of 9
5 the destruction of habitat and slaughter of wildlife in the world's oceans in order to conserve and protect ecosystems and species. 1 Given this fundamental objective, five strategic objectives were identified: (1) Shape New Policy, (2) Enforce Environmental Law, (3) Increase Organizational Capacity, (4) Minimize Operation Costs and (5) Shape Public Opinion. In addition, Sea Shepherd campaign alternatives, scales and metrics for the attributes, estimates of attitudes toward risk, and trade-offs among various objectives were identified (more details available upon request). Figure 1 is a graphic depiction of a preliminary objectives hierarchy for the Sea Shepherd. Figure 1. Sea Shepherd Objectives Hierarchy Ultimately, from this working model proxy utility distributions have been derived and are presented in Figure 2. The range for attack options is from 0, being the worst possible attack, to 1.0, being the best possible attack. Saving the Whales in the Antarctic Ocean clearly has the highest expected utility The remainder of the attack alternatives are still attractive, yet less 1 Page 4 of 9
6 Expected Utility so, and cluster in the range of having utilities from.16 to.20. This is true for all the alternatives except for Defending Sharks/Turtles in Galapagos (utility =.11) Figure 2. Proxy Expected Utility for Sea Shepherd The aforementioned findings were generated from a model developed and populated by Proxy 1, the developer of the APM model. Upon completion, the research team sought to validate the model and methodology using expert elicitation to 1) validate the framework, and 2) populate the model with values based on personal experiences with Sea Shepherd. The two models could then be compared to assess to what extent a model constructed by researchers using open-source materials would be compatible with one developed by a subject matter expert (Proxy2). Proxy2 s subject matter expertise was based on time spent with Sea Shepherd s founder and Executive Director, Paul Watson on one of Sea Shepherd s campaigns to defend whales from Japanese whalers. The elicitation sessions conducted with Proxy 2 took place over the phone during two sessions, each approximating 1 hour and 15 minutes. During these sessions, Proxy 2 was guided through the process of evaluating and revising, as desired, the model (objectives and attributes) constructed by Proxy 1. He then was taken through the process of populating the model with attribute values, risk attitudes and swing weights. When comparing model outputs for Proxy1 and Proxy2 (Figure 3), Whale Wars was found to provide the greatest estimated utility, 0.39 & 0.70 respectively. Proxy1 estimated that the Galapagos Islands alternative provided the least utility for Sea Shepherd (utility = 0.11), while Proxy2 found that the Galapagos alternative provided the third highest utility (utility = 0.49) among the alternatives. Proxy2 had more variability among the remaining five options than did Proxy1 who perceived the remaining five alternatives to be very similar in their expected utilities. Page 5 of 9
7 Figure 3. Campaign Alternatives: Expected Utilities by Proxy Probability distributions for each alternative were calculated using the SoftMax method with the temperature set to Campaigns defending cape fur seals, pilot whales, and harp seals received a zero probability when the SoftMax formula was applied to Proxy2 s value model. The results of both models are displayed in Figure 4 (with the Whale Wars alternative removed). Figure 4. Proxy Probability Distributions The information included herein is a preliminary report of progress to date. All material is still under development. Page 6 of 9
8 A System Dynamics Modeling Approach to the Operations of Terrorist Organization For this project, we developed a system dynamics model designed to capture the operations of a terrorist organization. More specifically, through this research we plan to (1) assess what outcome trajectories terrorist organizations desire, (2) how terrorist organizations objectives and values change over time and (3) how counter-terrorism efforts affect outcome trajectories and the evolution of terrorist organizations. From this research, a better understanding of terrorist organizations and their evolving motivations and values over time will be formulated. This knowledge is a critical component to decisions about allocating resources to minimize the impact of these organizations. We had 3 primary research questions: How can we effectively portray the impact of counter-terrorism measures to the resource network of a terrorist group over time? How will different counter-terrorism measures impact different aspects of a terrorist organization over time? How can we better allocate defense resources to more effectively dismantle or disengage a terrorist group from multiple perspectives? Model development included the creation of a causal loop diagram designed to capture the dynamic nature (through stocks and flows0 of a terrorist organization. Figure 5 is a snapshot of the working model. The complete model consists of several sub-systems, including members and sympathizers, funding, weapons of mass destruction capabilities, and attacks and casualties. Figure 5. Snapshot of Working SD Model of Terrorist Organization The example system shown in Figure 6 is the Members and Sympathizers Sub-System. There are two stocks, active members and sympathizers, as well as the corresponding inflows and outflows Page 7 of 9
9 for these stocks. Variables that are not caused by anything in the system, and thus can be treated as inputs, are exogenous and are labeled in brown. Variables labeled in red represent counterterrorism measures that impact the cause and effect scheme. The recruitment loop feeds on the logic that the more members there are, the more likely they can recruit more members. The blowback loop captures how as the number of people radicalizing an ideology to fit the goals of the group and the potential members, the more people will look into the group to satisfy a need or desire. These people are labeled potential members. The people who decide to join the cause become indicated members. As the number of indicated members increase, the popular support of the terrorist group will increase. Popular support is also impact by the fraction of the population of interest, the number of sympathizers, and the negative effect of counter-terrorism military units. Once people are inspired to follow the group, it increases the membership (density loop). The Density loop takes into account that as the number of active members operating in the open increases, the likelihood of them getting caught increases as well. The current number of active members impacts the current number in the open. Impact of a Traumatizing Event Multiplier Counter Terrorism Education to locals Effect of Member Density Number of people radicalizing an ideology Recruitment Loop <Opposition Fraction> Active members in the Open Density Loop Detention and Elimination of Terrorist Group Members Potential Members Fraction who become members Indicated Members per Month Blowback Loop Members Opposing the Group Increase in Members People inspired to follow the terrorist group Active members of a Terrorist Group Fraction Inspired to Follow Detention and Elimination Rate Combat Efficacy Fraction Potentially Sympathetic to Terrorist Group Rate of Sympathizers Becoming Members Fraction of Popular Support Population of Interest Popular Support of the Terrorist Group Negative Effect of CT Military Units Increase in Sympathizers Sympathizers of the Terrorist Group Rate of Sympathizers Opposing Group Opposition Fraction Figure 6. Members and Sympathizers Sub-System The goal for the end of year 9 is to complete model development, and have a report submitted for publication in a scholarly journal. 3. Research Products 3.1. Presentations Conferences John, R. S., Rosoff, H., Barrett, A., & Bier, V. Modeling effects of counterterrorism initiatives on reducing adversary threats. Decision Analysis Society sponsored presentation at the annual meeting for the Institute for Operations Research and Management Science (INFORMS), Charlotte, N.C., November 13-16, Page 8 of 9
10 John, R. S. & Rosoff, H. Exploiting biases and heuristics in adversary judgment and decision making. Decision Analysis Society sponsored presentation at the annual meeting for the Institute for Operations Research and Management Science (INFORMS), Charlotte, N.C., November 13-16, John, R. S., Rosoff, H., Barrett, A., & Bier, V. Value focused modeling of adaptive adversaries for informing countermeasure decisions. Research paper presented at the Society for Risk Analysis (SRA) annual meeting, Charleston, S.C., December 4-7, Education and Outreach Products Education and Outreach Initiatives (Please detail below) # # of Associate Professor of Psychology 1 # of Research Professors 1 # of students supported (funded by CREATE) 1 # of summer students 1 Funded by CREATE Richard John, Associate Professor of Psychology, USC School of Psychology Heather Rosoff, Research Professor, CREATE and Sol Price School of Public Policy Jason Jacobsen, Master of Public Administration Program, Sol Price School of Public Policy Summer Student Jason Chin, Columbia University Page 9 of 9
Modeling Adversary Beliefs and Motivations
CREATE Research Archive Current Research Project Narratives 2013 Modeling Adversary Beliefs and Motivations Heather Rosoff University of Southern California, rosoff@usc.edu Richard John University of Southern
More informationDecision Analysis by Proxy for the Rational Terrorist
Decision Analysis by Proxy for the Rational Terrorist Heather Rosoff 1 and Richard John 1,2 1 Center for Risk and Economic Analysis of Terrorism Events 2 Department of Psychology University of Southern
More informationDecision Analysis by Proxy for the Rational Terrorist
Decision Analysis by Proxy for the Rational Terrorist Heather Rosoff 1 and Richard John 1,2 1 Center for Risk and Economic Analysis of Terrorism Events 2 Department of Psychology University of Southern
More informationA Visualization and Decision-Support Tool for Homeland Security Risk Prioritization
Research Synopsis A Visualization and Decision-Support Tool for Homeland Security Risk Prioritization Modeling Area: Risk Assessment Case Studies Supported: Risk-Based Resource Allocation Principal Investigator:
More informationForging the Center of Gravity. Major Troy E. Mitchell
Forging the Center of Gravity Major Troy E. Mitchell 413 White Columns Way Wilmington, North Carolina 28411 mitchelltroye@gmail.com A. A. Milne 1 Within military planning courses, doctrine teaches Dr.
More informationUsing Decision Analysis to Select Strategic Partners. Hal Wilson Department of Defense
Using Decision Analysis to Select Strategic Partners Hal Wilson Department of Defense Problem Background An element of the Department Of Defense (DoD) desires to team with other organizations to help fulfill
More informationPL : Securing our Agriculture and Food Act
PL 115-43: Securing our Agriculture and Food Act John P. Sanders, Jr., DVM DACVPM Office of Health Affairs Department of Homeland Security October 15, 2017 Securing our Agriculture and Food Act The law
More informationPSAA - PUBLIC SERVICE & ADMIN
PSAA - Public Service & Admin 1 PSAA - PUBLIC SERVICE & ADMIN PSAA 601 Foundations of Public Service Different perspectives on management and leadership in public service; provides overview of how public
More informationAn Empirical Assessment of Domestic Radicalization *
An Empirical Assessment of Domestic Radicalization * Michael Jensen, Ph.D. Health Approaches in Community-Level Strategies to Countering Violent Extremism and Radicalization Workshop, National Academies
More informationPortSec: Port Security Risk and Resource Management System
CREATE Research Archive Research Project Summaries 2010 PortSec: Port Security Risk and Resource Management System Michael D. Orosz University of Southern California, mdorosz@isi.edu Petros Ioannou University
More informationCOST PROGRAM COMMENCEMENT
TEXAS SOUTHERN UNIVERSITY BARBARA JORDAN MICKEY LELAND SCHOOL OF PUBLIC AFFAIRS empa CERTIFICATE PROGRAMS The Texas Southern University empa Certificate Programs covers three areas each consisting of four
More information2009 Annual Operating Plan National Preparedness Directorate
2009 Annual Operating Plan April 2009 Table of Contents Overview... 3 NPD Vision... 3 NPD Mission... 3 Foundations for Success... 3 Strategic Goals and Objectives... 5 FEMA Goals... 5 NPD Goals... 6 The
More informationNational Defense University. Strategic Plan 2012/2013 to 2017/18 One University Evolution
National Defense University The Chairman s University: Inspiring Creative, Critical and Collaborative Thinkers For Leadership Through Academic Excellence Strategic Plan 2012/2013 to 2017/18 One University
More informationDifferentiating Conflicts in Beliefs Versus Value Tradeoffs in the Domestic Intelligence Policy Debate
CREATE Research Archive Published Articles & Papers 2011 Differentiating Conflicts in Beliefs Versus Value Tradeoffs in the Domestic Intelligence Policy Debate Robin Dillon-Merrill Georgetown University,
More information8. Target & Vital Areas
8. Target & Vital Areas 7. Threat Definition RTC on Physical Protection and Security Management for RRs Serpong, Indonesia 29 th September to 3 rd October 2014 Information presented, developed and compiled
More informationEvaluating the effectiveness of the Global Nuclear Detection Architecture using multiple-objective decision analysis
University of Arkansas, Fayetteville ScholarWorks@UARK Industrial Engineering Undergraduate Honors Theses Industrial Engineering 8-2014 Evaluating the effectiveness of the Global Nuclear Detection Architecture
More informationAdvertisement. UN JPO Programme 1 JPO in Counter-Terrorism. United Nations Secretariat, Counter-Terrorism Committee Executive Directorate (CTED)
Advertisement UN JPO Programme 1 JPO in Counter-Terrorism United Nations Secretariat, Counter-Terrorism Committee Executive Directorate (CTED) Vacancy Announcement INT-011-15-P064 I General information
More informationSociety of Animal Welfare Administrators (SAWA) STRATEGIC FRAMEWORK and STRATEGIC PLAN
Society of Animal Welfare Administrators (SAWA) STRATEGIC FRAMEWORK and 2010-2013 STRATEGIC PLAN Board of Directors Adopted June 2, 2010 SAWA STRATEGIC FRAMEWORK SAWA Mission Statement The Society of Animal
More informationPET Benchmarking. Unclassified Summary
PET Benchmarking Unclassified Summary List of Recommendations 24 April 2006 1. Background and introduction PET BENCHMARKING Summary 1.1 The Cross-Ministerial Committee on Fighting Terrorism recommended
More informationEnhancing Cooperation to Prevent WMD Terrorism:
Center on Global Counterterrorism Cooperation Project on U.S. Global Engagement Enhancing Cooperation to Prevent WMD Terrorism: Lessons for the New U.S. President 18 February 2009 SUMMARY In the fourth
More information[check one or both] Concentration in Social Work Leadership and Management (SWLM)
School of Social Work Revised January 2012 Concentration Learning Agreement - MSW Field Practicum II and III 6800 6850 [check one or both] Concentration in Social Work Leadership and Management (SWLM)
More informationA TAWAZUN SUBSIDIARY
A TAWAZUN SUBSIDIARY P.O.BOX 908, Abu Dhabi, UAE. t +971 2 506 9950 f +971 2 566 9951 info@jaheziya.ae www.jaheziya.ae About Jaheziya 05 Vision and Mission 06 Multi-agency Operations, Cooperation and Coordination
More informationGUIDE. Public Education Seminar Planning
GUIDE for Public Education Seminar Planning Navy League of the United States April 2008 2300 Wilson Boulevard Arlington, Virginia 22201-3308 800-356-5760 www.navyleague.org Table of Contents Overview.
More informationSTRATEGIC IMPLEMENTATION PLAN FOR EMPOWERING LOCAL PARTNERS TO PREVENT VIOLENT EXTREMISM IN THE UNITED STATES
STRATEGIC IMPLEMENTATION PLAN FOR EMPOWERING LOCAL PARTNERS TO PREVENT VIOLENT EXTREMISM IN THE UNITED STATES OCTOBER 2016 Table of Contents Introduction................................... 1 Research
More informationNOVEMBER 2016 PROFESSIONAL EXAMINATIONS BUSINESS MANAGEMENT & INFORMATION SYSTEMS (PAPER 1.2) EXAMINER S REPORT, QUESTIONS AND MARKING SCHEME
NOVEMBER 2016 PROFESSIONAL EXAMINATIONS BUSINESS MANAGEMENT & INFORMATION SYSTEMS (PAPER 1.2) EXAMINER S REPORT, QUESTIONS AND MARKING SCHEME EXAMINER S GENERAL COMMENTS The Business Management and Information
More informationAdvancement Framework Planning
Advancement Framework Planning Monthly Progress Review Meeting March 6, 2012 Agenda Quantitative Brand Perception Analysis Progress update Qualitative Brand Dynamics & Perception Analysis Review brand
More informationSECTION C - DESCRIPTION / SPECIFICATIONS / STATEMENT OF WORK
SECTION C - DESCRIPTION / SPECIFICATIONS / STATEMENT OF WORK C.1. OBJECTIVE The objective of OASIS is to provide Government agencies with total integrated solutions for a multitude of professional service
More informationDoD Command and Control Research Strategic Plan Agile C2 for Complex Endeavors
DRAFT DoD Command and Control Research Strategic Plan Agile C2 for Complex Endeavors Version 1 April 21, 2010 Dr. David S. Alberts Director, Research OASD/NII DoD CIO This is a draft of a document that
More informationSawdey Solution Services
Sawdey Solution Services I n c o r p o r a t e d COMMERCIAL PRICE LIST 2016 1430 Oak Court, Suite 304 Beavercreek, OH 45430 Office Phone: (937) 490-4060 Fax: (937) 490-4086 www.sawdeysolut ionservices.com
More informationResilience: What it is and how to achieve it 1
Resilience: What it is and how to achieve it 1 Yossi Sheffi, Professor, MIT School of Engineering Head, MIT Engineering Systems Division Director, MIT Center for Transportation and Logistics May 6 th,
More informationConcept for Cognitive Joint Force Entry
CRITICAL Concept for Cognitive Joint Force Entry V1.4 - SER Briefer: Stephen E. Ryan Type of Brief: Information Date: 04 Nov 2014 Version: V1.4 - SER The overall classification of this briefing is: Purpose
More informationFood Defense Authorities & Response
Food Defense Authorities & Response LeeAnne Jackson, Ph.D. Food and Drug Administration Food Defense and Emergency Coordination Staff 240-402-1593 leeanne.jackson@fda.hhs.gov Background Presentation Outline
More informationThe Mission would be grateful if the action plan could be circulated to the members of the Committee and published on the Committee's website.
Translated from Spanish Permanent Mission of Spain to the United Nations No. 106/JGBN-mma The Permanent Mission of Spain to the United Nations presents its compliments to the Chair of the Security Council
More informationLeveraging Risk Assessments to Raise Funding for Your Security Program
Leveraging Risk Assessments to Raise Funding for Your Security Program Shawn Reilly, CPP, PSP, CHPA, CPD 1 Sources of Information ASIS Facilities Physical Security Measures Guideline Design and Evaluation
More informationConservation NGOs project evaluations and monitoring workshop. September 8-9, 2010 Ulaanbaatar, Mongolia
O2 Organizational Options, LLC Strategies for a sustainable future Conservation NGOs project evaluations and monitoring workshop September 8-9, 2010 Ulaanbaatar, Mongolia 1 PARTNER ORGANIZATIONS: Nomadic
More informationEnvironment and Natural Resources Trust Fund Request for Proposals (RFP)
Environment and Natural Resources Trust Fund 2012-2013 Request for Proposals (RFP) Project Title: Analytical Method for Water Quality Assessment ENRTF ID: 104-E2 Topic Area: E2. NR Info Collection/Analysis
More informationA manifesto for Qualitative research
A manifesto for Qualitative research The unique power of qualitative research to shape and inspire business strategy is under threat. Commercial pressure has driven the research profession to compromise
More informationImproving Acquisition in Government Requirements Management Leading Practices: CMMI-ACQ Visualization
the way we see it Improving Acquisition in Government Requirements Management Leading Practices: CMMI-ACQ Visualization July 2008 Capgemini Government Solutions Table of Contents 1 The Challenge: Increase
More informationBasic Steps for Developing a VAW Social Marketing Campaign Learning Network Brief 16
Learning Network Facilitate. Educate. Collaborate. Basic Steps for Developing a VAW Social Marketing Campaign Learning Network Brief 16 The opinions expressed here are those of the authors and do not necessarily
More informationPersistent Surveillance & Border Security (An Automated Means of Aircraft Deconfliction)
ECONOMICALLY DISADVANTAGED, WOMAN-OWNED SMALL BUSINESS (ED-WOSB) SBA CERTIFIED 8(M), HUB-ZONE & VIRGINIA CERTIFIED SWAM Decision Support for Persistent Surveillance & Border Security (An Automated Means
More informationKhan, Aurangzeb Skibniewski, Miroslaw Cable, John H Project Management Symposium
Slide 1 Khan, Aurangzeb Skibniewski, Miroslaw Cable, John H. 2017 Project Management Symposium Slide 2 Exploratory Study 50+ Construction & Civil Infrastructure Development (CCID) Projects Reviewed Across
More informationIntroduction to Homeland Security
Introduction to Homeland Security Chapter 8 Communications EM Communications Communicating messages to the general public is a critical and underdeveloped aspect of effective emergency management These
More informationQUARTERLY PROGRESS REPORT August 1 st -October 31 st, 2011
QUARTERLY PROGRESS REPORT August 1 st -October 31 st, 2011 Simulation-Based Optimization for Planning of Effective Waste Reduction, Diversion, and Recycling Programs PRINCIPAL INVESTIGATOR: Nurcin Celik,
More informationEconomic Consequences of and Resilience to Terrorism
CREATE Research Archive Research Project Summaries 2012 Economic Consequences of and Resilience to Terrorism Adam Z. Rose University of Southern California, adam.rose@usc.edu Follow this and additional
More informationKEY TERMS & DEFINITIONS IN STRATEGIC PLANNING
KEY TERMS & DEFINITIONS IN STRATEGIC PLANNING Term Definition Related Terms Academic An organized sequence or grouping of courses leading to a defined objective - such as a major, degree, certificate,
More informationPerception Versus Reality: UCS Views on Nuclear and Radiological Terrorism Risk
Perception Versus Reality: UCS Views on Nuclear and Radiological Terrorism Risk Edwin Lyman Senior Scientist Union of Concerned Scientists INMM Reducing the Risk Workshop Washington, DC March 17-18, 2015
More informationREPORT TO THE MEMBERSHIP CLEAR
REPORT TO THE MEMBERSHIP CLEAR Marc Seale As my term as CLEAR s president draws to a close, I look back with pride on our organization s accomplishments over the past year. At a time when the role and
More informationStrategic Intent ONE AGENCY ONE COMMUNITY
Strategic Intent 2007-2011 ONE AGENCY ONE COMMUNITY CENTRAL INTELLIGENCE AGENCY UNITED STATES OF AMERICA Director s Message This Strategic Intent, which benefited greatly from [employee] comments and suggestions,
More informationRailway Assessment Solution. Efficacy of Assessment-Based Hiring for Improving Railway Performance. Talegent Whitepaper January 2017
Technology meets Psychology Talegent Whitepaper January 217 Railway Assessment Solution Efficacy of Assessment-Based Hiring for Improving Railway Performance EXECUTIVE SUMMARY Talegent s Assessment Solution
More informationA Strategic Plan for the Lyon County Library System, FY through FY Community Workshop No. 2
A Strategic Plan for the Lyon County Library System, FY 2018-19 through FY 2022-23 Community Workshop No. 2 Saturday, March 3, 2018 Lahontan Room, Silver Springs Senior Center 2945 Fort Churchill Street
More information5/24/2018. Anitha Mullangi, MD, MHCM, CPE Chief Medical Officer St. Johns WellChild and Family Center Los Angeles, CA. Functional Structure- 2001
Anitha Mullangi, MD, MHCM, CPE Chief Medical Officer St. Johns WellChild and Family Center Los Angeles, CA Functional Structure- 2001 Technology Organization2008 1 Understanding FQHCs Evolution Structure
More informationScience in Support of West Coast Ecosystem Management
Science in Support of West Coast Ecosystem Management Frank Schwing, PhD Deputy Science and Research Director (Acting) Southwest Fisheries Science Center swfsc.noaa.gov NOAA Fisheries Service Southwest
More information9 QA/QC DURING DESIGN 9.3 DESIGN REVIEWS
Chapter: Procedure: 9 QA/QC DURING DESIGN 9.3 DESIGN REVIEWS Revised: May 15, 2018 PURPOSE The purpose of this procedure is to provide a guideline for design reviews. Design reviews are usually conducted
More informationProject Risk Management (PRM)
Project Risk Management (PRM) Course Agenda Project Management Overview The Role of Project Risk Management Monitoring Projects Project Risk Assessments 2 Famous Last Words I cannot imagine any condition
More informationManufacturing Technology Committee Risk Management Working Group Risk Management Training Guides
Manufacturing Technology Committee Management Working Group Management Training Guides Ranking and Filtering 1 Overview Ranking and Filtering is one of the most common facilitation methods used for Management.
More informationApplication of AHP for Lean Implementation Analysis in 6 MSMEs
Application of AHP for Lean Implementation Analysis in 6 MSMEs 1 Ravikumar M.M*,1, Marimuthu K 2, H. Abdul Zubar 3 Research Scholar, Faculty of Mechanical Engineering, Anna University, India (Email ID:
More informationManagement and Supervision
Management and Supervision Food Production Management 1 Module 3 Section D Leadership All of the information has been adapted from Cronje, GJ. Et al. 2007. Introduction to Business Management. 6 th Edition.
More informationJOB DESCRIPTION. UNDP supports countries in three different ways, through the MAPS approach: mainstreaming, acceleration and policy support:
JOB DESCRIPTION Title: SDG Policy Adviser Grade: SB4 Agency: UNDP Duration: 1 year service contract with possibility for extension Duty Station: Baku, Azerbaijan. Domestic and international travel will
More informationIdentifying Governance Best Practices in Systems-of-Systems Acquisition
Calhoun: The NPS Institutional Archive DSpace Repository Reports and Technical Reports All Technical Reports Collection 2014-05-15 Identifying Governance Best Practices in Systems-of-Systems Acquisition
More informationFalse Precision and the Illusion of Accuracy.
2014 Annual Perspective False Precision and the Illusion of Accuracy. Why do project disasters continue when so much effort has been put into avoiding them? Abstract Project executives face an overwhelming
More informationHIGHLIGHTS FROM THE 2016 Annual Report
HIGHLIGHTS FROM THE 2016 Annual Report DISCOVERY & INNOVATION Welcome to our Annual Report We continue to be inspired by our mission to solve the major problems facing the ocean and prepare leaders to
More informationENSURING CONSTITUTIONAL AUTHORITY: CONTINUITY OF GOVERNMENT 1
Chapter Five ENSURING CONSTITUTIONAL AUTHORITY: CONTINUITY OF GOVERNMENT 1 The continuity of government (COG) task area of homeland security includes providing for the continuity and restoration of all
More informationThe Role of Standards in Disaster Recovery and Business Continuity
ANSI Student Paper Competition 2013 First Place Winner The Role of Standards in Disaster Recovery and Business Continuity Chris Golden Graduate Student The Earth Institute and School of Continuing Education,
More informationPOSITION DETAILS. Status of Post (tick) New Post Re-evaluation Job Grade (current grade) PC 11 Faculty (if applicable) ORGANOGRAM
HR191 JOB DESCRIPTION NOTES Forms must be downloaded from the UCT website: http://www.uct.ac.za/depts/sapweb/forms/forms.htm This form serves as a template for the writing of job descriptions. A copy of
More informationDictionary of Functional Competencies for Career Banding
Dictionary of Functional Competencies for Career Banding NC Office of State Personnel April 6, 2006 Advocacy: Demonstrates skills and abilities needed to effectively develop and present the client s, patient
More informationCACI International Inc. Jefferies Technology Conference May 2017
CACI International Inc Jefferies Technology Conference May 2017 Forward-looking Statements There are statements made herein which do not address historical facts and, therefore, could be interpreted to
More informationUNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Human Social Culture Behavior (HSCB) Modeling Applied Research
Exhibit R-2, RDT&E Budget Item Justification: PB 2012 Office of Secretary Of Defense DATE: February 2011 COST ($ in Millions) FY 2010 FY 2011 Base Behavior (HSCB) OCO Total FY 2013 FY 2014 FY 2015 FY 2016
More informationFour faces of the CFO
Four faces of the CFO CFOs play four critical roles Catalyst Catalyze behaviors across the organization to execute strategic and financial objectives while at the same time creating a risk intelligent
More informationFuture of finance: Finance disrupted. How should the CFO respond to a business environment in turmoil? kpmg.com/us/futurefinance
Future of finance: Finance disrupted How should the CFO respond to a business environment in turmoil? kpmg.com/us/futurefinance Finance disrupted How should the CFO respond to a business environment in
More informationHow it works: Questions from the OCAT 2.0
Social Sector Practice How it works: Questions from the OCAT 2.0 OCAT 2.0 is an updated and improved version of our original OCAT survey. It asks nonprofit staff to rate their organization s operational
More informationSession 4 Strategic analysis products
The Egmont Group of Financial Intelligence Units Egmont Strategic Analysis Course Session 4 Version 30 October 2012 Egmont Strategic Analysis Course Page 2 of 34 Session 4 1. Introduction This session
More informationTexas Tech University System
Texas Tech University System October 31, 2017 ERM Overview Evolution of Risk Management Risk Traditional Definition The possibility that something bad or unpleasant will happen. Merriam-Webster Minimizing
More informationSCS Noonan Scholars. Chief Operating Officer/West Coast Executive Director. Position Profile
SCS Noonan Scholars Chief Operating Officer/West Coast Executive Director SCS NOONAN SCHOLARS OVERVIEW Position Profile South Central Scholars (SCS) was established in 2001 by philanthropists James and
More informationGulf of Maine Council on the Marine Environment SWOT Analysis Summary from June 2014 Working Group Session v.2
SWOT Analysis - Background At the June 2014 Council meeting, Council members took part in a strategic planning session and approved plans for an organizational assessment of Gulf of Maine Council to be
More informationWhite Paper. Change the Way You Lead Change. Robert E. Quinn Stephen M. Ross School of Business University of Michigan
White Paper Change the Way You Lead Change Robert E. Quinn Stephen M. Ross School of Business University of Michigan Ned Wellman Stephen M. Ross School of Business University of Michigan Key Points: Simply
More informationOperational Activity Decomposition (OV-5, Node Tree)
Operational Activity Decomposition (OV-5, Node Tree) The Biological Sensor Fusion (BSF) node tree diagram organizes the Operational Activities in a hierarchical structure from highest to lowest in a single
More informationThe 11 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21 st CENTURY Braşov, November 10 th -11 th 2016
The 11 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21 st CENTURY Braşov, November 10 th -11 th 2016 THE NATIONAL INTELLIGENCE SYSTEM- AN ALTERNATIVE ORGANIZATIONAL APPROACH
More informationENTERPRISE RISK MANAGEMENT USING DATA ANALYTICS. Dan Julevich and Chris Dawes April 17, 2015
ENTERPRISE RISK MANAGEMENT USING DATA ANALYTICS Dan Julevich and Chris Dawes April 17, 2015 Agenda ERM What, Why, How? ERM Keys to Success Fail, Survive, or Thrive? ERM Current State Overview ERM Leading
More informationIntegration and Prioritization of Concepts
Integration and Prioritization of Concepts February 1, 2007 Richard E. Hayes, Ph.D. President, Evidence Based Research, Inc. Chief Scientist, Command and Control Research Program (CCRP) 1595 Spring Hill
More informationMinimum Elements and Practice Standards for Health Impact Assessment. North American HIA Practice Standards Working Group
Minimum Elements and Practice Standards for Health Impact Assessment Version 2 November 2010 Authorship and Acknowledgements This document represents a revision of version one of Practice Standards for
More informationChapter 8: THE MARKETING PLAN. Chapter 11: Strategic Leadership
Chapter 8: THE MARKETING PLAN Learning outcomes After reading this chapter, you will be able to: Plan segmentation, targeting, and positioning Plan direction, objectives and marketing support Develop marketing
More informationWhat is ASPI? Risks and governance. Operating environment
What is ASPI? ASPI is an independent think tank concerned with national strategic, defence and security issues. It was established by an Australian Government cabinet decision in 2001 to provide an alternative
More informationMASTERING THE HUMAN ASPECTS IN OPERATION. Medical Contribution
MASTERING THE HUMAN ASPECTS IN OPERATION Medical Contribution NATO Operations Medical Conference (Bethesda MD 3-6 October 2011) follow on Food For Thought Paper INTRODUCTION The NATO Operations Medical
More informationPractical Strategic Planning
Board Leadership Lethbridge May 5, 2018 8:45 10:15am A Dose of Strategy: Practical Strategic Planning Presented by: Jennifer Beyer Community Development Unit Community Development Unit Planning: Strategic
More informationManaging Conflict, Politics, and Negotiation
Chapter 4 Managing Conflict, Politics, and Negotiation LECTURE OUTLINE I. ORGANIZATIONAL CONFLICT A. Organizational conflict is the discord that arises when the goals, interests, or values of different
More informationInternational Journal of Nuclear Security
Volume 3 Number 1 International Journal of Nuclear Security International Journal of Nuclear Security 12-15-2017 The Future of Nuclear Security in Moroccan Territory After the Creation of the New Moroccan
More informationNEC2 Effectiveness and Agility: Analysis Methodology, Metrics, and Experimental Results*
NEC2 Effectiveness and Agility: Analysis Methodology, Metrics, and Experimental Results* David S. Alberts dalberts@ida.org Mark E. Tillman mtillman@ida.org presented to MORS Workshop Joint Framework for
More informationMethodology for Selecting the Preferred Networked Computer System Solution for Dynamic Continuous Defense Missions
Methodology for Selecting the Preferred Networked Computer Solution for Dynamic Continuous Defense Missions San Diego Dr. Glenn S. Tolentino Command & Control and Enterprise Engineering Department SPAWAR
More informationTransforming Projectile System Combining Lethality and Intelligence
Proceedings of the 2010 IEEE Systems and Information Engineering Design Symposium, University of Virginia, Charlottesville, VA, USA, April 23, 2010 FPM2Dec.1 Transforming Projectile System Combining Lethality
More informationActionable enterprise architecture management
Enterprise architecture White paper June 2009 Actionable enterprise architecture management Jim Amsden, solution architect, Rational software, IBM Software Group Andrew Jensen, senior product marketing
More informationEcosystem Services Assessment and Valuation in Regional Spatial Planning in Namibia The Case of the Zambezi Integrated Regional Land-Use Plan
Ecosystem Services Assessment and Valuation in Regional Spatial Planning in Namibia The Case of the Zambezi Integrated Regional Land-Use Plan Ulrich Scheffler 1 Abstract submission ID 90. Session Ecosystem
More informationSTRATEGIC TRACKING BENEFITS OF STRATEGIC TRACKING
STRATEGIC TRACKING BENEFITS OF STRATEGIC TRACKING Strategic tracking of brand health and perceptions over time helps companies understand which marketing initiatives are successful and where future efforts
More informationThe entrepreneurial team
Cambridge Judge Business School The entrepreneurial team Simon Stockley Senior Teaching Faculty in Entrepreneurship In individuals madness is a rarity, but in groups, it is the rule Nietzsche In this session:
More informationEvaluation of UNRWA s Organizational Development (OD)
Terms of Reference Evaluation of UNRWA s Organizational Development (OD) 1. INTRODUCTION The United Nations Relief and Works Agency for Palestine Refugees in the Near East (UNRWA) offers assistance, protection
More informationDEPARTMENT OF DEFENSE STANDARD PRACTICE
NOT MEASUREMENT SENSITIVE 5 April 2012 SUPERSEDING 28 January 2008 DEPARTMENT OF DEFENSE STANDARD PRACTICE DOCUMENTATION OF VERIFICATION, VALIDATION, AND ACCREDITATION (VV&A) FOR MODELS AND SIMULATIONS
More informationTHE CANADIAN ALLIANCE OF STUDENT ASSOCIATIONS STRATEGIC PLAN
casa THE CANADIAN ALLIANCE OF STUDENT ASSOCIATIONS 2015-2018 STRATEGIC PLAN OUR MEMBERS @CASADAILY /CASA.ACAE INFO@CASA.CA INTRODUCTION In 2010, CASA members identified a need to engage in a member-driven
More informationContinuity of Operations (COOP) Multi-Year Strategy and Program Management Plan Template Guide
Continuity of Operations (COOP) Multi-Year Strategy and Program Management Plan Template Guide Federal Emergency Management Agency 500 C ST, SW Washington, D.C. 20472 FEMA GUIDE INSTRUCTIONS This guide
More informationDeveloping Sustainable Seafood Recommendations Updated April 23, 2008
Developing Sustainable Seafood Recommendations Updated April 23, 2008 Monterey Bay Aquarium is committed to inspiring conservation of the oceans. To this end, we make every attempt to purchase seafood
More informationToward Adaptive, Risk-Informed Allocation of Border Security Assets. Joel Predd and Henry Willis February 26, 2009
Toward Adaptive, Risk-Informed Allocation of Border Security Assets Joel Predd and Henry Willis February 26, 2009 RAND Research on Counter-IED Operations in Iraq Illustrates Benefits of Tools Problem:
More information