Modeling Terrorist Beliefs and Motivations

Size: px
Start display at page:

Download "Modeling Terrorist Beliefs and Motivations"

Transcription

1 CREATE Research Archive Research Project Summaries 2012 Modeling Terrorist Beliefs and Motivations Heather Rosoff University of Southern California, Richard John University of Southern California, Follow this and additional works at: Part of the Risk Analysis Commons Recommended Citation Rosoff, Heather and John, Richard, "Modeling Terrorist Beliefs and Motivations" (2012). Research Project Summaries. Paper This Article is brought to you for free and open access by CREATE Research Archive. It has been accepted for inclusion in Research Project Summaries by an authorized administrator of CREATE Research Archive. For more information, please contact

2 National Center for Risk and Economic Analysis of Terrorism Events University of Southern California Los Angeles, California Modeling Terrorist Beliefs and Motivations October 2011 to August 2012 Heather Rosoff and Richard John University of Southern California "This research was supported by the United States Department of Homeland Security through the National Center for Risk and Economic Analysis of Terrorism Events (CREATE) under Cooperative Agreement No ST-061-RE0001. However, any opinions, findings, and conclusions or recommendations in this document are those of the authors and do not necessarily reflect views of the United States Department of Homeland Security or the University of Southern California." Cooperative Agreement No ST-061-RE0001 Department of Homeland Security

3 ABOUT CREATE The National Center for Risk and Economic Analysis of Terrorism Events (CREATE) was the first university-based Center of Excellence (COE) funded by University Programs of the Science and Technology (S&T) Directorate of the Department of Homeland Security (DHS). CREATE started operations in March of This annual report covers the seventh year of CREATE funding from October 2011 to August 2012, under Cooperative Agreement 2010-ST-061- RE0001 from DHS. While the text of this report focuses on the seventh year, all data tables, publications, lists of participants, students, and presentations and events are cumulative from the inception of CREATE. CREATE s research mission is to develop advanced models and tools for risk assessment, economic assessment, and risk management to counter terrorism. CREATE accomplishes this mission through an integrated program of research, education, and outreach, spanning the disciplines of economics, psychology, political science, industrial and systems engineering and information science. CREATE develops models, analytical tools, methodologies and software, and tests these tools in case analyses, representing critical homeland security investment and policy decisions. Due to the cross-cutting nature of research in risk, economics, and risk management, CREATE serves the need of many client agencies at the DHS, including the Transportation Security Agency, Customs and Border Protection, Immigration and Customs Enforcement, FEMA and the US Coast Guard. In addition, CREATE has developed relationships with clients in the Offices of National Protection and Programs, Intelligence and Analysis, General Council, Health Affairs, and Domestic Nuclear Detection. Using a mix of fundamental and applied research, CREATE faculty and students take both the long-term view of how to reduce terrorism risk through fundamental research and the medium-term view of how to improve the cost-effectiveness of counter-terrorism policies and investments through applied research. Please visit for more information. Page 2 of 9

4 1. Modeling Terrorist Beliefs and Motivations Overview Research Accomplishments Research Products Presentations Conferences Education and Outreach Products 7 1. Modeling Terrorist Beliefs and Motivations Overview The objective of this research is to further develop our pioneering approach to adversary threat assessment through the construction of random utility models of terrorist preferences. This work builds on previous research efforts (Rosoff, 2009; Rosoff & John, 2009) that have used decision analysis models and elicitation methods to: (1) construct of a value tree for a terrorist leader or organization using value focused thinking (VFT), (2) construct a random multi-attribute utility model (RMAUM) capturing trade-offs among conflicting objectives and single-attribute utility functions representing risk attitudes of terrorist leaders, (3) construct probability distributions capturing key uncertainties for terrorist leaders (e.g., attack success) and uncertainties in the utility function parameters provided by adversary experts. Understanding the objectives and motivations that drive terrorist group behavior is critical. Current methods for terrorism risk assessment focus on target vulnerability, terrorist capability and resources, and attack consequence. What many researchers have yet to consider is the influence of terrorist group values and beliefs in deciphering the root cause of their militant behavior. This understanding has the potential to contribute to probabilistic estimates of terrorist threats. During Year 8 we further developed the adversary preference modeling (APM) methodology by (1) continuing to validate the APM through a case study with political/social/advocacy groups the Sea Shepherd Conservation Society (Sea Shepherd) with an action oriented agenda that is driven by specific motives, values, and objectives, and (2) beginning the development and use of a System Dynamics Simulation Model to further examine the structure of the terrorist groups organizational system, the interactions among its components, and how change in one area, for instance in the form of a defender countermeasure, affects the whole system and its parts over time. Research progress and accomplishments made throughout Year 8 are described in the subsequent section. 2. Research Accomplishments APM Model Validation During Year 8 we built an MAU model based on what could be identified about the Sea Shepherd online and from second-hand sources. We also interviewed Sea Shepherd stakeholders to evaluate the accuracy and validity of the originally constructed second-hand model, and hence determining whether the APM modeling approach could be validated. With respect to the construction of the proxy model, basic research (online resources and literature) led to the development of a first set of objectives. Sea Shepherd s goal is to to end Page 3 of 9

5 the destruction of habitat and slaughter of wildlife in the world's oceans in order to conserve and protect ecosystems and species. 1 Given this fundamental objective, five strategic objectives were identified: (1) Shape New Policy, (2) Enforce Environmental Law, (3) Increase Organizational Capacity, (4) Minimize Operation Costs and (5) Shape Public Opinion. In addition, Sea Shepherd campaign alternatives, scales and metrics for the attributes, estimates of attitudes toward risk, and trade-offs among various objectives were identified (more details available upon request). Figure 1 is a graphic depiction of a preliminary objectives hierarchy for the Sea Shepherd. Figure 1. Sea Shepherd Objectives Hierarchy Ultimately, from this working model proxy utility distributions have been derived and are presented in Figure 2. The range for attack options is from 0, being the worst possible attack, to 1.0, being the best possible attack. Saving the Whales in the Antarctic Ocean clearly has the highest expected utility The remainder of the attack alternatives are still attractive, yet less 1 Page 4 of 9

6 Expected Utility so, and cluster in the range of having utilities from.16 to.20. This is true for all the alternatives except for Defending Sharks/Turtles in Galapagos (utility =.11) Figure 2. Proxy Expected Utility for Sea Shepherd The aforementioned findings were generated from a model developed and populated by Proxy 1, the developer of the APM model. Upon completion, the research team sought to validate the model and methodology using expert elicitation to 1) validate the framework, and 2) populate the model with values based on personal experiences with Sea Shepherd. The two models could then be compared to assess to what extent a model constructed by researchers using open-source materials would be compatible with one developed by a subject matter expert (Proxy2). Proxy2 s subject matter expertise was based on time spent with Sea Shepherd s founder and Executive Director, Paul Watson on one of Sea Shepherd s campaigns to defend whales from Japanese whalers. The elicitation sessions conducted with Proxy 2 took place over the phone during two sessions, each approximating 1 hour and 15 minutes. During these sessions, Proxy 2 was guided through the process of evaluating and revising, as desired, the model (objectives and attributes) constructed by Proxy 1. He then was taken through the process of populating the model with attribute values, risk attitudes and swing weights. When comparing model outputs for Proxy1 and Proxy2 (Figure 3), Whale Wars was found to provide the greatest estimated utility, 0.39 & 0.70 respectively. Proxy1 estimated that the Galapagos Islands alternative provided the least utility for Sea Shepherd (utility = 0.11), while Proxy2 found that the Galapagos alternative provided the third highest utility (utility = 0.49) among the alternatives. Proxy2 had more variability among the remaining five options than did Proxy1 who perceived the remaining five alternatives to be very similar in their expected utilities. Page 5 of 9

7 Figure 3. Campaign Alternatives: Expected Utilities by Proxy Probability distributions for each alternative were calculated using the SoftMax method with the temperature set to Campaigns defending cape fur seals, pilot whales, and harp seals received a zero probability when the SoftMax formula was applied to Proxy2 s value model. The results of both models are displayed in Figure 4 (with the Whale Wars alternative removed). Figure 4. Proxy Probability Distributions The information included herein is a preliminary report of progress to date. All material is still under development. Page 6 of 9

8 A System Dynamics Modeling Approach to the Operations of Terrorist Organization For this project, we developed a system dynamics model designed to capture the operations of a terrorist organization. More specifically, through this research we plan to (1) assess what outcome trajectories terrorist organizations desire, (2) how terrorist organizations objectives and values change over time and (3) how counter-terrorism efforts affect outcome trajectories and the evolution of terrorist organizations. From this research, a better understanding of terrorist organizations and their evolving motivations and values over time will be formulated. This knowledge is a critical component to decisions about allocating resources to minimize the impact of these organizations. We had 3 primary research questions: How can we effectively portray the impact of counter-terrorism measures to the resource network of a terrorist group over time? How will different counter-terrorism measures impact different aspects of a terrorist organization over time? How can we better allocate defense resources to more effectively dismantle or disengage a terrorist group from multiple perspectives? Model development included the creation of a causal loop diagram designed to capture the dynamic nature (through stocks and flows0 of a terrorist organization. Figure 5 is a snapshot of the working model. The complete model consists of several sub-systems, including members and sympathizers, funding, weapons of mass destruction capabilities, and attacks and casualties. Figure 5. Snapshot of Working SD Model of Terrorist Organization The example system shown in Figure 6 is the Members and Sympathizers Sub-System. There are two stocks, active members and sympathizers, as well as the corresponding inflows and outflows Page 7 of 9

9 for these stocks. Variables that are not caused by anything in the system, and thus can be treated as inputs, are exogenous and are labeled in brown. Variables labeled in red represent counterterrorism measures that impact the cause and effect scheme. The recruitment loop feeds on the logic that the more members there are, the more likely they can recruit more members. The blowback loop captures how as the number of people radicalizing an ideology to fit the goals of the group and the potential members, the more people will look into the group to satisfy a need or desire. These people are labeled potential members. The people who decide to join the cause become indicated members. As the number of indicated members increase, the popular support of the terrorist group will increase. Popular support is also impact by the fraction of the population of interest, the number of sympathizers, and the negative effect of counter-terrorism military units. Once people are inspired to follow the group, it increases the membership (density loop). The Density loop takes into account that as the number of active members operating in the open increases, the likelihood of them getting caught increases as well. The current number of active members impacts the current number in the open. Impact of a Traumatizing Event Multiplier Counter Terrorism Education to locals Effect of Member Density Number of people radicalizing an ideology Recruitment Loop <Opposition Fraction> Active members in the Open Density Loop Detention and Elimination of Terrorist Group Members Potential Members Fraction who become members Indicated Members per Month Blowback Loop Members Opposing the Group Increase in Members People inspired to follow the terrorist group Active members of a Terrorist Group Fraction Inspired to Follow Detention and Elimination Rate Combat Efficacy Fraction Potentially Sympathetic to Terrorist Group Rate of Sympathizers Becoming Members Fraction of Popular Support Population of Interest Popular Support of the Terrorist Group Negative Effect of CT Military Units Increase in Sympathizers Sympathizers of the Terrorist Group Rate of Sympathizers Opposing Group Opposition Fraction Figure 6. Members and Sympathizers Sub-System The goal for the end of year 9 is to complete model development, and have a report submitted for publication in a scholarly journal. 3. Research Products 3.1. Presentations Conferences John, R. S., Rosoff, H., Barrett, A., & Bier, V. Modeling effects of counterterrorism initiatives on reducing adversary threats. Decision Analysis Society sponsored presentation at the annual meeting for the Institute for Operations Research and Management Science (INFORMS), Charlotte, N.C., November 13-16, Page 8 of 9

10 John, R. S. & Rosoff, H. Exploiting biases and heuristics in adversary judgment and decision making. Decision Analysis Society sponsored presentation at the annual meeting for the Institute for Operations Research and Management Science (INFORMS), Charlotte, N.C., November 13-16, John, R. S., Rosoff, H., Barrett, A., & Bier, V. Value focused modeling of adaptive adversaries for informing countermeasure decisions. Research paper presented at the Society for Risk Analysis (SRA) annual meeting, Charleston, S.C., December 4-7, Education and Outreach Products Education and Outreach Initiatives (Please detail below) # # of Associate Professor of Psychology 1 # of Research Professors 1 # of students supported (funded by CREATE) 1 # of summer students 1 Funded by CREATE Richard John, Associate Professor of Psychology, USC School of Psychology Heather Rosoff, Research Professor, CREATE and Sol Price School of Public Policy Jason Jacobsen, Master of Public Administration Program, Sol Price School of Public Policy Summer Student Jason Chin, Columbia University Page 9 of 9

Modeling Adversary Beliefs and Motivations

Modeling Adversary Beliefs and Motivations CREATE Research Archive Current Research Project Narratives 2013 Modeling Adversary Beliefs and Motivations Heather Rosoff University of Southern California, rosoff@usc.edu Richard John University of Southern

More information

Decision Analysis by Proxy for the Rational Terrorist

Decision Analysis by Proxy for the Rational Terrorist Decision Analysis by Proxy for the Rational Terrorist Heather Rosoff 1 and Richard John 1,2 1 Center for Risk and Economic Analysis of Terrorism Events 2 Department of Psychology University of Southern

More information

Decision Analysis by Proxy for the Rational Terrorist

Decision Analysis by Proxy for the Rational Terrorist Decision Analysis by Proxy for the Rational Terrorist Heather Rosoff 1 and Richard John 1,2 1 Center for Risk and Economic Analysis of Terrorism Events 2 Department of Psychology University of Southern

More information

A Visualization and Decision-Support Tool for Homeland Security Risk Prioritization

A Visualization and Decision-Support Tool for Homeland Security Risk Prioritization Research Synopsis A Visualization and Decision-Support Tool for Homeland Security Risk Prioritization Modeling Area: Risk Assessment Case Studies Supported: Risk-Based Resource Allocation Principal Investigator:

More information

Forging the Center of Gravity. Major Troy E. Mitchell

Forging the Center of Gravity. Major Troy E. Mitchell Forging the Center of Gravity Major Troy E. Mitchell 413 White Columns Way Wilmington, North Carolina 28411 mitchelltroye@gmail.com A. A. Milne 1 Within military planning courses, doctrine teaches Dr.

More information

Using Decision Analysis to Select Strategic Partners. Hal Wilson Department of Defense

Using Decision Analysis to Select Strategic Partners. Hal Wilson Department of Defense Using Decision Analysis to Select Strategic Partners Hal Wilson Department of Defense Problem Background An element of the Department Of Defense (DoD) desires to team with other organizations to help fulfill

More information

PL : Securing our Agriculture and Food Act

PL : Securing our Agriculture and Food Act PL 115-43: Securing our Agriculture and Food Act John P. Sanders, Jr., DVM DACVPM Office of Health Affairs Department of Homeland Security October 15, 2017 Securing our Agriculture and Food Act The law

More information

PSAA - PUBLIC SERVICE & ADMIN

PSAA - PUBLIC SERVICE & ADMIN PSAA - Public Service & Admin 1 PSAA - PUBLIC SERVICE & ADMIN PSAA 601 Foundations of Public Service Different perspectives on management and leadership in public service; provides overview of how public

More information

An Empirical Assessment of Domestic Radicalization *

An Empirical Assessment of Domestic Radicalization * An Empirical Assessment of Domestic Radicalization * Michael Jensen, Ph.D. Health Approaches in Community-Level Strategies to Countering Violent Extremism and Radicalization Workshop, National Academies

More information

PortSec: Port Security Risk and Resource Management System

PortSec: Port Security Risk and Resource Management System CREATE Research Archive Research Project Summaries 2010 PortSec: Port Security Risk and Resource Management System Michael D. Orosz University of Southern California, mdorosz@isi.edu Petros Ioannou University

More information

COST PROGRAM COMMENCEMENT

COST PROGRAM COMMENCEMENT TEXAS SOUTHERN UNIVERSITY BARBARA JORDAN MICKEY LELAND SCHOOL OF PUBLIC AFFAIRS empa CERTIFICATE PROGRAMS The Texas Southern University empa Certificate Programs covers three areas each consisting of four

More information

2009 Annual Operating Plan National Preparedness Directorate

2009 Annual Operating Plan National Preparedness Directorate 2009 Annual Operating Plan April 2009 Table of Contents Overview... 3 NPD Vision... 3 NPD Mission... 3 Foundations for Success... 3 Strategic Goals and Objectives... 5 FEMA Goals... 5 NPD Goals... 6 The

More information

National Defense University. Strategic Plan 2012/2013 to 2017/18 One University Evolution

National Defense University. Strategic Plan 2012/2013 to 2017/18 One University Evolution National Defense University The Chairman s University: Inspiring Creative, Critical and Collaborative Thinkers For Leadership Through Academic Excellence Strategic Plan 2012/2013 to 2017/18 One University

More information

Differentiating Conflicts in Beliefs Versus Value Tradeoffs in the Domestic Intelligence Policy Debate

Differentiating Conflicts in Beliefs Versus Value Tradeoffs in the Domestic Intelligence Policy Debate CREATE Research Archive Published Articles & Papers 2011 Differentiating Conflicts in Beliefs Versus Value Tradeoffs in the Domestic Intelligence Policy Debate Robin Dillon-Merrill Georgetown University,

More information

8. Target & Vital Areas

8. Target & Vital Areas 8. Target & Vital Areas 7. Threat Definition RTC on Physical Protection and Security Management for RRs Serpong, Indonesia 29 th September to 3 rd October 2014 Information presented, developed and compiled

More information

Evaluating the effectiveness of the Global Nuclear Detection Architecture using multiple-objective decision analysis

Evaluating the effectiveness of the Global Nuclear Detection Architecture using multiple-objective decision analysis University of Arkansas, Fayetteville ScholarWorks@UARK Industrial Engineering Undergraduate Honors Theses Industrial Engineering 8-2014 Evaluating the effectiveness of the Global Nuclear Detection Architecture

More information

Advertisement. UN JPO Programme 1 JPO in Counter-Terrorism. United Nations Secretariat, Counter-Terrorism Committee Executive Directorate (CTED)

Advertisement. UN JPO Programme 1 JPO in Counter-Terrorism. United Nations Secretariat, Counter-Terrorism Committee Executive Directorate (CTED) Advertisement UN JPO Programme 1 JPO in Counter-Terrorism United Nations Secretariat, Counter-Terrorism Committee Executive Directorate (CTED) Vacancy Announcement INT-011-15-P064 I General information

More information

Society of Animal Welfare Administrators (SAWA) STRATEGIC FRAMEWORK and STRATEGIC PLAN

Society of Animal Welfare Administrators (SAWA) STRATEGIC FRAMEWORK and STRATEGIC PLAN Society of Animal Welfare Administrators (SAWA) STRATEGIC FRAMEWORK and 2010-2013 STRATEGIC PLAN Board of Directors Adopted June 2, 2010 SAWA STRATEGIC FRAMEWORK SAWA Mission Statement The Society of Animal

More information

PET Benchmarking. Unclassified Summary

PET Benchmarking. Unclassified Summary PET Benchmarking Unclassified Summary List of Recommendations 24 April 2006 1. Background and introduction PET BENCHMARKING Summary 1.1 The Cross-Ministerial Committee on Fighting Terrorism recommended

More information

Enhancing Cooperation to Prevent WMD Terrorism:

Enhancing Cooperation to Prevent WMD Terrorism: Center on Global Counterterrorism Cooperation Project on U.S. Global Engagement Enhancing Cooperation to Prevent WMD Terrorism: Lessons for the New U.S. President 18 February 2009 SUMMARY In the fourth

More information

[check one or both] Concentration in Social Work Leadership and Management (SWLM)

[check one or both] Concentration in Social Work Leadership and Management (SWLM) School of Social Work Revised January 2012 Concentration Learning Agreement - MSW Field Practicum II and III 6800 6850 [check one or both] Concentration in Social Work Leadership and Management (SWLM)

More information

A TAWAZUN SUBSIDIARY

A TAWAZUN SUBSIDIARY A TAWAZUN SUBSIDIARY P.O.BOX 908, Abu Dhabi, UAE. t +971 2 506 9950 f +971 2 566 9951 info@jaheziya.ae www.jaheziya.ae About Jaheziya 05 Vision and Mission 06 Multi-agency Operations, Cooperation and Coordination

More information

GUIDE. Public Education Seminar Planning

GUIDE. Public Education Seminar Planning GUIDE for Public Education Seminar Planning Navy League of the United States April 2008 2300 Wilson Boulevard Arlington, Virginia 22201-3308 800-356-5760 www.navyleague.org Table of Contents Overview.

More information

STRATEGIC IMPLEMENTATION PLAN FOR EMPOWERING LOCAL PARTNERS TO PREVENT VIOLENT EXTREMISM IN THE UNITED STATES

STRATEGIC IMPLEMENTATION PLAN FOR EMPOWERING LOCAL PARTNERS TO PREVENT VIOLENT EXTREMISM IN THE UNITED STATES STRATEGIC IMPLEMENTATION PLAN FOR EMPOWERING LOCAL PARTNERS TO PREVENT VIOLENT EXTREMISM IN THE UNITED STATES OCTOBER 2016 Table of Contents Introduction................................... 1 Research

More information

NOVEMBER 2016 PROFESSIONAL EXAMINATIONS BUSINESS MANAGEMENT & INFORMATION SYSTEMS (PAPER 1.2) EXAMINER S REPORT, QUESTIONS AND MARKING SCHEME

NOVEMBER 2016 PROFESSIONAL EXAMINATIONS BUSINESS MANAGEMENT & INFORMATION SYSTEMS (PAPER 1.2) EXAMINER S REPORT, QUESTIONS AND MARKING SCHEME NOVEMBER 2016 PROFESSIONAL EXAMINATIONS BUSINESS MANAGEMENT & INFORMATION SYSTEMS (PAPER 1.2) EXAMINER S REPORT, QUESTIONS AND MARKING SCHEME EXAMINER S GENERAL COMMENTS The Business Management and Information

More information

Advancement Framework Planning

Advancement Framework Planning Advancement Framework Planning Monthly Progress Review Meeting March 6, 2012 Agenda Quantitative Brand Perception Analysis Progress update Qualitative Brand Dynamics & Perception Analysis Review brand

More information

SECTION C - DESCRIPTION / SPECIFICATIONS / STATEMENT OF WORK

SECTION C - DESCRIPTION / SPECIFICATIONS / STATEMENT OF WORK SECTION C - DESCRIPTION / SPECIFICATIONS / STATEMENT OF WORK C.1. OBJECTIVE The objective of OASIS is to provide Government agencies with total integrated solutions for a multitude of professional service

More information

DoD Command and Control Research Strategic Plan Agile C2 for Complex Endeavors

DoD Command and Control Research Strategic Plan Agile C2 for Complex Endeavors DRAFT DoD Command and Control Research Strategic Plan Agile C2 for Complex Endeavors Version 1 April 21, 2010 Dr. David S. Alberts Director, Research OASD/NII DoD CIO This is a draft of a document that

More information

Sawdey Solution Services

Sawdey Solution Services Sawdey Solution Services I n c o r p o r a t e d COMMERCIAL PRICE LIST 2016 1430 Oak Court, Suite 304 Beavercreek, OH 45430 Office Phone: (937) 490-4060 Fax: (937) 490-4086 www.sawdeysolut ionservices.com

More information

Resilience: What it is and how to achieve it 1

Resilience: What it is and how to achieve it 1 Resilience: What it is and how to achieve it 1 Yossi Sheffi, Professor, MIT School of Engineering Head, MIT Engineering Systems Division Director, MIT Center for Transportation and Logistics May 6 th,

More information

Concept for Cognitive Joint Force Entry

Concept for Cognitive Joint Force Entry CRITICAL Concept for Cognitive Joint Force Entry V1.4 - SER Briefer: Stephen E. Ryan Type of Brief: Information Date: 04 Nov 2014 Version: V1.4 - SER The overall classification of this briefing is: Purpose

More information

Food Defense Authorities & Response

Food Defense Authorities & Response Food Defense Authorities & Response LeeAnne Jackson, Ph.D. Food and Drug Administration Food Defense and Emergency Coordination Staff 240-402-1593 leeanne.jackson@fda.hhs.gov Background Presentation Outline

More information

The Mission would be grateful if the action plan could be circulated to the members of the Committee and published on the Committee's website.

The Mission would be grateful if the action plan could be circulated to the members of the Committee and published on the Committee's website. Translated from Spanish Permanent Mission of Spain to the United Nations No. 106/JGBN-mma The Permanent Mission of Spain to the United Nations presents its compliments to the Chair of the Security Council

More information

Leveraging Risk Assessments to Raise Funding for Your Security Program

Leveraging Risk Assessments to Raise Funding for Your Security Program Leveraging Risk Assessments to Raise Funding for Your Security Program Shawn Reilly, CPP, PSP, CHPA, CPD 1 Sources of Information ASIS Facilities Physical Security Measures Guideline Design and Evaluation

More information

Conservation NGOs project evaluations and monitoring workshop. September 8-9, 2010 Ulaanbaatar, Mongolia

Conservation NGOs project evaluations and monitoring workshop. September 8-9, 2010 Ulaanbaatar, Mongolia O2 Organizational Options, LLC Strategies for a sustainable future Conservation NGOs project evaluations and monitoring workshop September 8-9, 2010 Ulaanbaatar, Mongolia 1 PARTNER ORGANIZATIONS: Nomadic

More information

Environment and Natural Resources Trust Fund Request for Proposals (RFP)

Environment and Natural Resources Trust Fund Request for Proposals (RFP) Environment and Natural Resources Trust Fund 2012-2013 Request for Proposals (RFP) Project Title: Analytical Method for Water Quality Assessment ENRTF ID: 104-E2 Topic Area: E2. NR Info Collection/Analysis

More information

A manifesto for Qualitative research

A manifesto for Qualitative research A manifesto for Qualitative research The unique power of qualitative research to shape and inspire business strategy is under threat. Commercial pressure has driven the research profession to compromise

More information

Improving Acquisition in Government Requirements Management Leading Practices: CMMI-ACQ Visualization

Improving Acquisition in Government Requirements Management Leading Practices: CMMI-ACQ Visualization the way we see it Improving Acquisition in Government Requirements Management Leading Practices: CMMI-ACQ Visualization July 2008 Capgemini Government Solutions Table of Contents 1 The Challenge: Increase

More information

Basic Steps for Developing a VAW Social Marketing Campaign Learning Network Brief 16

Basic Steps for Developing a VAW Social Marketing Campaign Learning Network Brief 16 Learning Network Facilitate. Educate. Collaborate. Basic Steps for Developing a VAW Social Marketing Campaign Learning Network Brief 16 The opinions expressed here are those of the authors and do not necessarily

More information

Persistent Surveillance & Border Security (An Automated Means of Aircraft Deconfliction)

Persistent Surveillance & Border Security (An Automated Means of Aircraft Deconfliction) ECONOMICALLY DISADVANTAGED, WOMAN-OWNED SMALL BUSINESS (ED-WOSB) SBA CERTIFIED 8(M), HUB-ZONE & VIRGINIA CERTIFIED SWAM Decision Support for Persistent Surveillance & Border Security (An Automated Means

More information

Khan, Aurangzeb Skibniewski, Miroslaw Cable, John H Project Management Symposium

Khan, Aurangzeb Skibniewski, Miroslaw Cable, John H Project Management Symposium Slide 1 Khan, Aurangzeb Skibniewski, Miroslaw Cable, John H. 2017 Project Management Symposium Slide 2 Exploratory Study 50+ Construction & Civil Infrastructure Development (CCID) Projects Reviewed Across

More information

Introduction to Homeland Security

Introduction to Homeland Security Introduction to Homeland Security Chapter 8 Communications EM Communications Communicating messages to the general public is a critical and underdeveloped aspect of effective emergency management These

More information

QUARTERLY PROGRESS REPORT August 1 st -October 31 st, 2011

QUARTERLY PROGRESS REPORT August 1 st -October 31 st, 2011 QUARTERLY PROGRESS REPORT August 1 st -October 31 st, 2011 Simulation-Based Optimization for Planning of Effective Waste Reduction, Diversion, and Recycling Programs PRINCIPAL INVESTIGATOR: Nurcin Celik,

More information

Economic Consequences of and Resilience to Terrorism

Economic Consequences of and Resilience to Terrorism CREATE Research Archive Research Project Summaries 2012 Economic Consequences of and Resilience to Terrorism Adam Z. Rose University of Southern California, adam.rose@usc.edu Follow this and additional

More information

KEY TERMS & DEFINITIONS IN STRATEGIC PLANNING

KEY TERMS & DEFINITIONS IN STRATEGIC PLANNING KEY TERMS & DEFINITIONS IN STRATEGIC PLANNING Term Definition Related Terms Academic An organized sequence or grouping of courses leading to a defined objective - such as a major, degree, certificate,

More information

Perception Versus Reality: UCS Views on Nuclear and Radiological Terrorism Risk

Perception Versus Reality: UCS Views on Nuclear and Radiological Terrorism Risk Perception Versus Reality: UCS Views on Nuclear and Radiological Terrorism Risk Edwin Lyman Senior Scientist Union of Concerned Scientists INMM Reducing the Risk Workshop Washington, DC March 17-18, 2015

More information

REPORT TO THE MEMBERSHIP CLEAR

REPORT TO THE MEMBERSHIP CLEAR REPORT TO THE MEMBERSHIP CLEAR Marc Seale As my term as CLEAR s president draws to a close, I look back with pride on our organization s accomplishments over the past year. At a time when the role and

More information

Strategic Intent ONE AGENCY ONE COMMUNITY

Strategic Intent ONE AGENCY ONE COMMUNITY Strategic Intent 2007-2011 ONE AGENCY ONE COMMUNITY CENTRAL INTELLIGENCE AGENCY UNITED STATES OF AMERICA Director s Message This Strategic Intent, which benefited greatly from [employee] comments and suggestions,

More information

Railway Assessment Solution. Efficacy of Assessment-Based Hiring for Improving Railway Performance. Talegent Whitepaper January 2017

Railway Assessment Solution. Efficacy of Assessment-Based Hiring for Improving Railway Performance. Talegent Whitepaper January 2017 Technology meets Psychology Talegent Whitepaper January 217 Railway Assessment Solution Efficacy of Assessment-Based Hiring for Improving Railway Performance EXECUTIVE SUMMARY Talegent s Assessment Solution

More information

A Strategic Plan for the Lyon County Library System, FY through FY Community Workshop No. 2

A Strategic Plan for the Lyon County Library System, FY through FY Community Workshop No. 2 A Strategic Plan for the Lyon County Library System, FY 2018-19 through FY 2022-23 Community Workshop No. 2 Saturday, March 3, 2018 Lahontan Room, Silver Springs Senior Center 2945 Fort Churchill Street

More information

5/24/2018. Anitha Mullangi, MD, MHCM, CPE Chief Medical Officer St. Johns WellChild and Family Center Los Angeles, CA. Functional Structure- 2001

5/24/2018. Anitha Mullangi, MD, MHCM, CPE Chief Medical Officer St. Johns WellChild and Family Center Los Angeles, CA. Functional Structure- 2001 Anitha Mullangi, MD, MHCM, CPE Chief Medical Officer St. Johns WellChild and Family Center Los Angeles, CA Functional Structure- 2001 Technology Organization2008 1 Understanding FQHCs Evolution Structure

More information

Science in Support of West Coast Ecosystem Management

Science in Support of West Coast Ecosystem Management Science in Support of West Coast Ecosystem Management Frank Schwing, PhD Deputy Science and Research Director (Acting) Southwest Fisheries Science Center swfsc.noaa.gov NOAA Fisheries Service Southwest

More information

9 QA/QC DURING DESIGN 9.3 DESIGN REVIEWS

9 QA/QC DURING DESIGN 9.3 DESIGN REVIEWS Chapter: Procedure: 9 QA/QC DURING DESIGN 9.3 DESIGN REVIEWS Revised: May 15, 2018 PURPOSE The purpose of this procedure is to provide a guideline for design reviews. Design reviews are usually conducted

More information

Project Risk Management (PRM)

Project Risk Management (PRM) Project Risk Management (PRM) Course Agenda Project Management Overview The Role of Project Risk Management Monitoring Projects Project Risk Assessments 2 Famous Last Words I cannot imagine any condition

More information

Manufacturing Technology Committee Risk Management Working Group Risk Management Training Guides

Manufacturing Technology Committee Risk Management Working Group Risk Management Training Guides Manufacturing Technology Committee Management Working Group Management Training Guides Ranking and Filtering 1 Overview Ranking and Filtering is one of the most common facilitation methods used for Management.

More information

Application of AHP for Lean Implementation Analysis in 6 MSMEs

Application of AHP for Lean Implementation Analysis in 6 MSMEs Application of AHP for Lean Implementation Analysis in 6 MSMEs 1 Ravikumar M.M*,1, Marimuthu K 2, H. Abdul Zubar 3 Research Scholar, Faculty of Mechanical Engineering, Anna University, India (Email ID:

More information

Management and Supervision

Management and Supervision Management and Supervision Food Production Management 1 Module 3 Section D Leadership All of the information has been adapted from Cronje, GJ. Et al. 2007. Introduction to Business Management. 6 th Edition.

More information

JOB DESCRIPTION. UNDP supports countries in three different ways, through the MAPS approach: mainstreaming, acceleration and policy support:

JOB DESCRIPTION. UNDP supports countries in three different ways, through the MAPS approach: mainstreaming, acceleration and policy support: JOB DESCRIPTION Title: SDG Policy Adviser Grade: SB4 Agency: UNDP Duration: 1 year service contract with possibility for extension Duty Station: Baku, Azerbaijan. Domestic and international travel will

More information

Identifying Governance Best Practices in Systems-of-Systems Acquisition

Identifying Governance Best Practices in Systems-of-Systems Acquisition Calhoun: The NPS Institutional Archive DSpace Repository Reports and Technical Reports All Technical Reports Collection 2014-05-15 Identifying Governance Best Practices in Systems-of-Systems Acquisition

More information

False Precision and the Illusion of Accuracy.

False Precision and the Illusion of Accuracy. 2014 Annual Perspective False Precision and the Illusion of Accuracy. Why do project disasters continue when so much effort has been put into avoiding them? Abstract Project executives face an overwhelming

More information

HIGHLIGHTS FROM THE 2016 Annual Report

HIGHLIGHTS FROM THE 2016 Annual Report HIGHLIGHTS FROM THE 2016 Annual Report DISCOVERY & INNOVATION Welcome to our Annual Report We continue to be inspired by our mission to solve the major problems facing the ocean and prepare leaders to

More information

ENSURING CONSTITUTIONAL AUTHORITY: CONTINUITY OF GOVERNMENT 1

ENSURING CONSTITUTIONAL AUTHORITY: CONTINUITY OF GOVERNMENT 1 Chapter Five ENSURING CONSTITUTIONAL AUTHORITY: CONTINUITY OF GOVERNMENT 1 The continuity of government (COG) task area of homeland security includes providing for the continuity and restoration of all

More information

The Role of Standards in Disaster Recovery and Business Continuity

The Role of Standards in Disaster Recovery and Business Continuity ANSI Student Paper Competition 2013 First Place Winner The Role of Standards in Disaster Recovery and Business Continuity Chris Golden Graduate Student The Earth Institute and School of Continuing Education,

More information

POSITION DETAILS. Status of Post (tick) New Post Re-evaluation Job Grade (current grade) PC 11 Faculty (if applicable) ORGANOGRAM

POSITION DETAILS. Status of Post (tick) New Post Re-evaluation Job Grade (current grade) PC 11 Faculty (if applicable) ORGANOGRAM HR191 JOB DESCRIPTION NOTES Forms must be downloaded from the UCT website: http://www.uct.ac.za/depts/sapweb/forms/forms.htm This form serves as a template for the writing of job descriptions. A copy of

More information

Dictionary of Functional Competencies for Career Banding

Dictionary of Functional Competencies for Career Banding Dictionary of Functional Competencies for Career Banding NC Office of State Personnel April 6, 2006 Advocacy: Demonstrates skills and abilities needed to effectively develop and present the client s, patient

More information

CACI International Inc. Jefferies Technology Conference May 2017

CACI International Inc. Jefferies Technology Conference May 2017 CACI International Inc Jefferies Technology Conference May 2017 Forward-looking Statements There are statements made herein which do not address historical facts and, therefore, could be interpreted to

More information

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Human Social Culture Behavior (HSCB) Modeling Applied Research

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Human Social Culture Behavior (HSCB) Modeling Applied Research Exhibit R-2, RDT&E Budget Item Justification: PB 2012 Office of Secretary Of Defense DATE: February 2011 COST ($ in Millions) FY 2010 FY 2011 Base Behavior (HSCB) OCO Total FY 2013 FY 2014 FY 2015 FY 2016

More information

Four faces of the CFO

Four faces of the CFO Four faces of the CFO CFOs play four critical roles Catalyst Catalyze behaviors across the organization to execute strategic and financial objectives while at the same time creating a risk intelligent

More information

Future of finance: Finance disrupted. How should the CFO respond to a business environment in turmoil? kpmg.com/us/futurefinance

Future of finance: Finance disrupted. How should the CFO respond to a business environment in turmoil? kpmg.com/us/futurefinance Future of finance: Finance disrupted How should the CFO respond to a business environment in turmoil? kpmg.com/us/futurefinance Finance disrupted How should the CFO respond to a business environment in

More information

How it works: Questions from the OCAT 2.0

How it works: Questions from the OCAT 2.0 Social Sector Practice How it works: Questions from the OCAT 2.0 OCAT 2.0 is an updated and improved version of our original OCAT survey. It asks nonprofit staff to rate their organization s operational

More information

Session 4 Strategic analysis products

Session 4 Strategic analysis products The Egmont Group of Financial Intelligence Units Egmont Strategic Analysis Course Session 4 Version 30 October 2012 Egmont Strategic Analysis Course Page 2 of 34 Session 4 1. Introduction This session

More information

Texas Tech University System

Texas Tech University System Texas Tech University System October 31, 2017 ERM Overview Evolution of Risk Management Risk Traditional Definition The possibility that something bad or unpleasant will happen. Merriam-Webster Minimizing

More information

SCS Noonan Scholars. Chief Operating Officer/West Coast Executive Director. Position Profile

SCS Noonan Scholars. Chief Operating Officer/West Coast Executive Director. Position Profile SCS Noonan Scholars Chief Operating Officer/West Coast Executive Director SCS NOONAN SCHOLARS OVERVIEW Position Profile South Central Scholars (SCS) was established in 2001 by philanthropists James and

More information

Gulf of Maine Council on the Marine Environment SWOT Analysis Summary from June 2014 Working Group Session v.2

Gulf of Maine Council on the Marine Environment SWOT Analysis Summary from June 2014 Working Group Session v.2 SWOT Analysis - Background At the June 2014 Council meeting, Council members took part in a strategic planning session and approved plans for an organizational assessment of Gulf of Maine Council to be

More information

White Paper. Change the Way You Lead Change. Robert E. Quinn Stephen M. Ross School of Business University of Michigan

White Paper. Change the Way You Lead Change. Robert E. Quinn Stephen M. Ross School of Business University of Michigan White Paper Change the Way You Lead Change Robert E. Quinn Stephen M. Ross School of Business University of Michigan Ned Wellman Stephen M. Ross School of Business University of Michigan Key Points: Simply

More information

Operational Activity Decomposition (OV-5, Node Tree)

Operational Activity Decomposition (OV-5, Node Tree) Operational Activity Decomposition (OV-5, Node Tree) The Biological Sensor Fusion (BSF) node tree diagram organizes the Operational Activities in a hierarchical structure from highest to lowest in a single

More information

The 11 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21 st CENTURY Braşov, November 10 th -11 th 2016

The 11 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21 st CENTURY Braşov, November 10 th -11 th 2016 The 11 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21 st CENTURY Braşov, November 10 th -11 th 2016 THE NATIONAL INTELLIGENCE SYSTEM- AN ALTERNATIVE ORGANIZATIONAL APPROACH

More information

ENTERPRISE RISK MANAGEMENT USING DATA ANALYTICS. Dan Julevich and Chris Dawes April 17, 2015

ENTERPRISE RISK MANAGEMENT USING DATA ANALYTICS. Dan Julevich and Chris Dawes April 17, 2015 ENTERPRISE RISK MANAGEMENT USING DATA ANALYTICS Dan Julevich and Chris Dawes April 17, 2015 Agenda ERM What, Why, How? ERM Keys to Success Fail, Survive, or Thrive? ERM Current State Overview ERM Leading

More information

Integration and Prioritization of Concepts

Integration and Prioritization of Concepts Integration and Prioritization of Concepts February 1, 2007 Richard E. Hayes, Ph.D. President, Evidence Based Research, Inc. Chief Scientist, Command and Control Research Program (CCRP) 1595 Spring Hill

More information

Minimum Elements and Practice Standards for Health Impact Assessment. North American HIA Practice Standards Working Group

Minimum Elements and Practice Standards for Health Impact Assessment. North American HIA Practice Standards Working Group Minimum Elements and Practice Standards for Health Impact Assessment Version 2 November 2010 Authorship and Acknowledgements This document represents a revision of version one of Practice Standards for

More information

Chapter 8: THE MARKETING PLAN. Chapter 11: Strategic Leadership

Chapter 8: THE MARKETING PLAN. Chapter 11: Strategic Leadership Chapter 8: THE MARKETING PLAN Learning outcomes After reading this chapter, you will be able to: Plan segmentation, targeting, and positioning Plan direction, objectives and marketing support Develop marketing

More information

What is ASPI? Risks and governance. Operating environment

What is ASPI? Risks and governance. Operating environment What is ASPI? ASPI is an independent think tank concerned with national strategic, defence and security issues. It was established by an Australian Government cabinet decision in 2001 to provide an alternative

More information

MASTERING THE HUMAN ASPECTS IN OPERATION. Medical Contribution

MASTERING THE HUMAN ASPECTS IN OPERATION. Medical Contribution MASTERING THE HUMAN ASPECTS IN OPERATION Medical Contribution NATO Operations Medical Conference (Bethesda MD 3-6 October 2011) follow on Food For Thought Paper INTRODUCTION The NATO Operations Medical

More information

Practical Strategic Planning

Practical Strategic Planning Board Leadership Lethbridge May 5, 2018 8:45 10:15am A Dose of Strategy: Practical Strategic Planning Presented by: Jennifer Beyer Community Development Unit Community Development Unit Planning: Strategic

More information

Managing Conflict, Politics, and Negotiation

Managing Conflict, Politics, and Negotiation Chapter 4 Managing Conflict, Politics, and Negotiation LECTURE OUTLINE I. ORGANIZATIONAL CONFLICT A. Organizational conflict is the discord that arises when the goals, interests, or values of different

More information

International Journal of Nuclear Security

International Journal of Nuclear Security Volume 3 Number 1 International Journal of Nuclear Security International Journal of Nuclear Security 12-15-2017 The Future of Nuclear Security in Moroccan Territory After the Creation of the New Moroccan

More information

NEC2 Effectiveness and Agility: Analysis Methodology, Metrics, and Experimental Results*

NEC2 Effectiveness and Agility: Analysis Methodology, Metrics, and Experimental Results* NEC2 Effectiveness and Agility: Analysis Methodology, Metrics, and Experimental Results* David S. Alberts dalberts@ida.org Mark E. Tillman mtillman@ida.org presented to MORS Workshop Joint Framework for

More information

Methodology for Selecting the Preferred Networked Computer System Solution for Dynamic Continuous Defense Missions

Methodology for Selecting the Preferred Networked Computer System Solution for Dynamic Continuous Defense Missions Methodology for Selecting the Preferred Networked Computer Solution for Dynamic Continuous Defense Missions San Diego Dr. Glenn S. Tolentino Command & Control and Enterprise Engineering Department SPAWAR

More information

Transforming Projectile System Combining Lethality and Intelligence

Transforming Projectile System Combining Lethality and Intelligence Proceedings of the 2010 IEEE Systems and Information Engineering Design Symposium, University of Virginia, Charlottesville, VA, USA, April 23, 2010 FPM2Dec.1 Transforming Projectile System Combining Lethality

More information

Actionable enterprise architecture management

Actionable enterprise architecture management Enterprise architecture White paper June 2009 Actionable enterprise architecture management Jim Amsden, solution architect, Rational software, IBM Software Group Andrew Jensen, senior product marketing

More information

Ecosystem Services Assessment and Valuation in Regional Spatial Planning in Namibia The Case of the Zambezi Integrated Regional Land-Use Plan

Ecosystem Services Assessment and Valuation in Regional Spatial Planning in Namibia The Case of the Zambezi Integrated Regional Land-Use Plan Ecosystem Services Assessment and Valuation in Regional Spatial Planning in Namibia The Case of the Zambezi Integrated Regional Land-Use Plan Ulrich Scheffler 1 Abstract submission ID 90. Session Ecosystem

More information

STRATEGIC TRACKING BENEFITS OF STRATEGIC TRACKING

STRATEGIC TRACKING BENEFITS OF STRATEGIC TRACKING STRATEGIC TRACKING BENEFITS OF STRATEGIC TRACKING Strategic tracking of brand health and perceptions over time helps companies understand which marketing initiatives are successful and where future efforts

More information

The entrepreneurial team

The entrepreneurial team Cambridge Judge Business School The entrepreneurial team Simon Stockley Senior Teaching Faculty in Entrepreneurship In individuals madness is a rarity, but in groups, it is the rule Nietzsche In this session:

More information

Evaluation of UNRWA s Organizational Development (OD)

Evaluation of UNRWA s Organizational Development (OD) Terms of Reference Evaluation of UNRWA s Organizational Development (OD) 1. INTRODUCTION The United Nations Relief and Works Agency for Palestine Refugees in the Near East (UNRWA) offers assistance, protection

More information

DEPARTMENT OF DEFENSE STANDARD PRACTICE

DEPARTMENT OF DEFENSE STANDARD PRACTICE NOT MEASUREMENT SENSITIVE 5 April 2012 SUPERSEDING 28 January 2008 DEPARTMENT OF DEFENSE STANDARD PRACTICE DOCUMENTATION OF VERIFICATION, VALIDATION, AND ACCREDITATION (VV&A) FOR MODELS AND SIMULATIONS

More information

THE CANADIAN ALLIANCE OF STUDENT ASSOCIATIONS STRATEGIC PLAN

THE CANADIAN ALLIANCE OF STUDENT ASSOCIATIONS STRATEGIC PLAN casa THE CANADIAN ALLIANCE OF STUDENT ASSOCIATIONS 2015-2018 STRATEGIC PLAN OUR MEMBERS @CASADAILY /CASA.ACAE INFO@CASA.CA INTRODUCTION In 2010, CASA members identified a need to engage in a member-driven

More information

Continuity of Operations (COOP) Multi-Year Strategy and Program Management Plan Template Guide

Continuity of Operations (COOP) Multi-Year Strategy and Program Management Plan Template Guide Continuity of Operations (COOP) Multi-Year Strategy and Program Management Plan Template Guide Federal Emergency Management Agency 500 C ST, SW Washington, D.C. 20472 FEMA GUIDE INSTRUCTIONS This guide

More information

Developing Sustainable Seafood Recommendations Updated April 23, 2008

Developing Sustainable Seafood Recommendations Updated April 23, 2008 Developing Sustainable Seafood Recommendations Updated April 23, 2008 Monterey Bay Aquarium is committed to inspiring conservation of the oceans. To this end, we make every attempt to purchase seafood

More information

Toward Adaptive, Risk-Informed Allocation of Border Security Assets. Joel Predd and Henry Willis February 26, 2009

Toward Adaptive, Risk-Informed Allocation of Border Security Assets. Joel Predd and Henry Willis February 26, 2009 Toward Adaptive, Risk-Informed Allocation of Border Security Assets Joel Predd and Henry Willis February 26, 2009 RAND Research on Counter-IED Operations in Iraq Illustrates Benefits of Tools Problem:

More information