1. bookVolume 5 (2014): Edizione 2 (December 2014)
Dettagli della rivista
License
Formato
Rivista
eISSN
1799-3350
Prima pubblicazione
15 Dec 2016
Frequenza di pubblicazione
1 volta all'anno
Lingue
Inglese
Open Access

An Examination of the Implementation of Risk Based Approaches in Military Operations

Pubblicato online: 23 Nov 2016
Volume & Edizione: Volume 5 (2014) - Edizione 2 (December 2014)
Pagine: 38 - 64
Dettagli della rivista
License
Formato
Rivista
eISSN
1799-3350
Prima pubblicazione
15 Dec 2016
Frequenza di pubblicazione
1 volta all'anno
Lingue
Inglese

Amnesty International. (2000). NATO/Federal Republic of Yugoslavia “Collateral damage” or unlawful killings? Violations of the Laws of War by NATO during Operation Allied Force: Amnesty International.Search in Google Scholar

Andrews, J. D., & Moss, T. R. (2002). Risk assessment Reliability and risk assessment (Second ed., pp. 411-448). London: Professional Engineering Publishing Limited.Search in Google Scholar

Aven, T. (2009). Identification of safety and security critical systems and activities. Reliability Engineering & System Safety, 94(2), 404-411.10.1016/j.ress.2008.04.001Search in Google Scholar

Bakx, G. C. H., & Richardson, R. A. L. (2013). Risk assessments at the Royal Netherlands Air Force: An explorative study. Journal of Risk Research, 16(5), 595-611.10.1080/13669877.2012.726249Search in Google Scholar

Bang, M. (2014). Pitfalls in Military Quantitative Intelligence Analysis: Incident Reporting in a Low Intensity Conflict. Intelligence and National Security.Search in Google Scholar

Burns, R. (2013, Feb 26 2013). APNEWSBREAK: Taliban attacks not down after all, The Associated Press.Search in Google Scholar

Clark, R. M. (2013). Intelligence analysis (4th ed.). London: Sage.Search in Google Scholar

Committee report to ICTY. (2000). Final Report to the Prosecutor by the Committee established to Review the NATO Bombing Campaign Against the Federal Republic of Yugoslavia. The Hague: International Criminal Tribunal for the former Yugoslavia.Search in Google Scholar

DCDC. (2010). Joint doctrine for joint force protection, Publication 3-64. Shrivenham: The Development, Concepts and Doctrine Centre, Ministry of Defence, United Kingdom. Search in Google Scholar

Department of the Army. (2006). Composite Risk Management, FM 5-19 (FM 100-14). Washington DC: Headquarters Department of the Army.Search in Google Scholar

Dinstein, Y. (2011). The Conduct of Hostilities under the law of International Armed Conflict (second ed.). United Kingdom: Cambridge University Press.Search in Google Scholar

Doshi, P. (2009). Calibrated response to emerging infections. BMJ, 339.10.1136/bmj.b3471Search in Google Scholar

Frosdick, S. (1997). The techniques of risk analysis are insufficient in themselves. Disaster Prevention and Management, 6(3), 165-177.10.1108/09653569710172937Search in Google Scholar

George, R. Z., & Bruce, J. B. (2008). The age of analysis. In R. Z. George & J. B. Bruce (Eds.), Analyzing intelligence (pp. 295-308). Washington D.C.: Georgetown University Press. Search in Google Scholar

Hansson, S. O. (1993). The false promise of risk analysis. Ratio-New Series, 6(1), 16-26.10.1111/j.1467-9329.1993.tb00049.xSearch in Google Scholar

Hansson, S. O. (2012). Riskfilosofi, En introduktion [In swedish]. Stockholm: Liber.Search in Google Scholar

Henckerts, J.-M., & Doswald-Beck, L. (2010). Customary International Humanitarian Law (Vol. Volume I: Rules). United Kingdom: Cambridge University Press.Search in Google Scholar

Hubbard, D. W. (2009). Worse than useless: The most popular risk assessment method and why it doesn't work The failure of risk management: Why it's broken and how to fix it. Hoboken: John Wiley & Sons Inc.Search in Google Scholar

ICTY Trial Chamber. (2004). Prosecutor vs. Blaskic, Blaskic case IT-95-14-T, 122 ILR 1. The Hague: the International Criminal Tribunal for the former Yugoslavia.Search in Google Scholar

Johnson, C. W. (2007). The Paradoxes of Military Risk Assessment. Paper presented at the the 25th International Systems Safety Conference, Baltimore, USA.Search in Google Scholar

Kunreuther, H. (2002). Risk analysis and risk management in an uncertain world. [Editorial Material]. Risk Analysis, 22(4), 655-664.10.1111/0272-4332.00057Search in Google Scholar

Kuo, C. (2007). Safety management and its maritime application. London: The Nautical Institute.Search in Google Scholar

Lehtomäki, K., Pääkkönen, R. J., & Rantanen, J. (2005). Risk Analysis of Finnish Peacekeeping in Kosovo. Risk Analysis, 25(2), 389-396.10.1111/j.1539-6924.2005.00597.xSearch in Google Scholar

Liwång, H. (2012). Risk-based ship security analysis - an approach based on civilian and military methods. (Licentiate in Engineering), Chalmers Univeristy of Technology, Gothenburg.Search in Google Scholar

Liwång, H., Ringsberg, J. W., & Norsell, M. (2013). Quantitative risk analysis - Ship security analysis for effective risk control options. Safety Science, 58(0), 98-112.10.1016/j.ssci.2013.04.003Search in Google Scholar

Marine Corps Institute. (2002). Operational Risk Management, ORM 1-0. Washington DC: Headquarters Marine Corps.Search in Google Scholar

NATO. (2007). Allied joint doctrine for force protection, AJP-3.14. Brussels: NATO Standardisation Agency.Search in Google Scholar

NATO. (2010). Comprehensive operations planning directive, V1.0. Brussels: NATO Supreme Headquarters Allied Power Europe.Search in Google Scholar

Osterholm, M. T. (2005). Preparing for the Next Pandemic. New England Journal of Medicine, 352(18), 1839-1842.10.1056/NEJMp058068Search in Google Scholar

Reason, J. (2000). Safety paradoxes and safety culture. International Journal of Injury Control and Safety Promotion, 7(1), 3-14.10.1076/1566-0974(200003)7:1;1-V;FT003Search in Google Scholar

Rebugio, A. B. (2013). Bias and Perception: How it Affects Our Judgment in Decision Making and Analysis. Small Wars Journal.Search in Google Scholar

RTO/NATO. (2008). Improving Common Security Risk Analysis, RTO-TR-IST-049. Brussels: The Research and Technology Organisation (RTO) of NATO.Search in Google Scholar

Shearer, R. (2011). Operational analysis in Iraq: Sifting through the fog of war. Military Operations Research, 16(2), 63-71.10.5711/1082598316263Search in Google Scholar

Silver, N. (2012). The signal and the noise, Why so many predictions fail - but some don't. New York: the Penguin Press.Search in Google Scholar

Swedish Armed Forces. (2009a). Försvarsmaktens gemensamma riskhanteringsmodell [In swedish]. Stockholm: Swedish Armed Forces.Search in Google Scholar

Swedish Armed Forces. (2009b). Handbok bedömning antagonistiska hot [In swedish]. Stockholm: Swedish Armed Forces.Search in Google Scholar

The White House. (2013). Presidential Policy Directive -- Critical Infrastructure Security and Resilience. Washington DC: The White House, Office of the Press Secretary.Search in Google Scholar

Tomes, S. (2012). Risk: misunderstanding or military misnomer. The British Army Review, 153, 32-40.Search in Google Scholar

University of Cincinnati. (2004). Introduction to the principles of war and operations. Cincinnati: University of Cincinnati.Search in Google Scholar

Yang, Z. L., Wang, J., & Li, K. X. (2013). Maritime safety analysis in retrospect. Maritime Policy & Management, 40(3), 261-277.10.1080/03088839.2013.782952Search in Google Scholar

Articoli consigliati da Trend MD

Pianifica la tua conferenza remota con Sciendo