WorldCat Identities

Hundley, Richard O.

Overview
Works: 19 works in 70 publications in 1 language and 4,107 library holdings
Genres: Conference proceedings  History 
Classifications: U104, 355.40973
Publication Timeline
Key
Publications about  Richard O Hundley Publications about Richard O Hundley
Publications by  Richard O Hundley Publications by Richard O Hundley
Most widely held works by Richard O Hundley
Past revolutions, future transformations what can the history of revolutions in military affairs tell us about transforming the U.S. military? by Richard O Hundley ( )
7 editions published between 1999 and 2000 in English and held by 1,617 WorldCat member libraries worldwide
Advances in technology can bring about dramatic changes in military operations, often termed "revolutions in military affairs" or RMAs. Such technology-driven changes in military operations are not merely a recent phenomenon: they have been occurring since the dawn of history, they will continue to occur in the future, and they will continue to bestow a military advantage on the first nation to develop and use them. Accordingly, it is important to the continued vitality and robustness of the U.S. defense posture for the DoD R & D community to be aware of technology developments that could revolutionize military operations in the future, and for the U.S. military services to be on the lookout for revolutionary ways in which to employ those technologies in warfare. This report examines the history of past RMAs, to see what can be learned from them regarding the challenge confronting the DoD today, when it has set out on a concerted effort to bring about a technology-driven transformation of the U.S. military to achieve the operational goals outlined in Joint Vision 2010. Among its many findings are three of particular note: RMAs are rarely brought about by dominant players (such as the U.S. military is today). For a dominant player to bring about an RMA requires a receptive organizational climate, fostering a continually refined vision of how war may change in the future and encouraging vigorous debate regarding the future of the organization; senior officers with traditional credentials willing to sponsor new ways of doing things and able to establish new promotion pathways for junior officers practicing a new way of war; mechanisms for experimentation, to discover, learn, test and demonstrate new ideas; and ways of responding positively to the results of successful experiments, in terms of doctrinal changes, acquisition programs, and force structure modifications. The DoD has some of these elements today, but is missing others. The report makes specific suggestions regarding ways of filling in the missing elements. Doing these things will facilitate DoD's force transformation activities and help ensure that the next RMA is brought about by the United States. and not some other nation
The global course of the information revolution recurring themes and regional variations by Richard O Hundley ( )
13 editions published between 2003 and 2004 in English and held by 1,450 WorldCat member libraries worldwide
Advances in information technology are heavily influencing ways in which business, society, and government work and function throughout the globe, bringing many changes to everyday life, in a process commonly termed the "information revolution." This book paints a picture of the state of the information revolution today--in its technological, business and financial, governmental, and social and cultural dimensions--and how it will likely progress in the near- to mid-term future (10 to 15 years). It focuses separately on different regions of the world--North America, Europe, the Asia-Pacific region, Latin America, the Middle East and North Africa, and sub-Saharan Africa. In addition to these regional variations and projections, the authors look in depth at recurring themes in information technology's impact around the world, including, for example, its influence on business models and its relationship with social and cultural value systems. The research presented by the authors is the result of a multiyear, multidisciplinary effort of RAND and the National Intelligence Council
The global course of the information revolution political, economic, and social consequences : proceedings of an international conference ( )
8 editions published in 2000 in English and held by 371 WorldCat member libraries worldwide
Rand Corporation has embarked on a three-year effort, sponsored by the National Intelligence Council's Strategic Estimates Program, to chart the course of changes brought about by the information revolution over the next 10 to 20 years. As a first step, RAND convened in November 1999 an international conference on political/governmental, business/financial, and social/cultural trends as related to the information revolution. These are the proceedings of that conference. Across the diverse conference discussions, a shared vision emerged of an information revolution future of more "information work" and new business models; an increase in electronic commerce; challenges to the nation state; creation of a number of sub-, trans-, and supra-national groupings; more porous borders; and new fault lines within and between nations. The world can expect increasing disparities (winners and losers) among nations, concerns about privacy, and effects on national cultures
Security in cyberspace : challenges for society : proceedings of an international conference by Richard O Hundley ( Book )
7 editions published in 1996 in English and held by 181 WorldCat member libraries worldwide
As more and more human activities--involving governments, businesses, individuals, and society as a whole--move into "cyberspace," they become exposed to a new set of vulnerabilities that can be exploited by a wide spectrum of "bad actors" for a variety of motives. This paper discusses questions such as: (1) How serious are the likely threats to different segments of society, both today and in the future, from cyberspace-based attacks by various "bad actors"--such as hackers, criminals, disgruntled employees, terrorists and nation-sponsored informational attacks? (2) What are the current best strategies for achieving security in cyberspace? (3) What roles and missions should various national entities (police, defense forces, local governments, etc.) be assigned to counter these threats, given that it is often unclear who the perpetrator is, and from where the threat emanates? (4) Are there specific services and institutions in each nation--which we term a "national interest element"--that play such vital roles in society that their protection from cyberspace-based attacks should be of national concern? This paper does not answer all these questions, but at least attempts to structure the discussion so that meaningful answers can be obtained
The future of the information revolution in Europe : proceedings of an international conference by Richard O Hundley ( Book )
7 editions published in 2001 in English and held by 165 WorldCat member libraries worldwide
"This report contains the proceedings of a conference focused on the information revolution in Europe, that was held in Limelette, Belgium, in April 2001. Participants in this conference argued that the information revolution is following a somewhat different course in Europe than in America: the process of "creative destruction" by which new technologies and business paradigms replace their predecessors is proceeding more slowly, Europe's emphasis on economic and social equity results in a less aggressive approach to new IT business opportunities than does the "winner-take-all" business mentality in the U.S., and Europe's "top down" planning mentality is fostering more deliberate decision making. As a result, the information revolution has been proceeding slower in Europe than in America, with the U.S. in the vanguard in most IT-related areas and Europe following along somewhat behind. This is likely to continue for at least the next few years, if not longer."--Rand abstracts
Security in cyberspace : an emerging challenge for society by Richard O Hundley ( Book )
4 editions published in 1994 in English and held by 95 WorldCat member libraries worldwide
As more and more human activities--involving governments, businesses, individuals, and society as a whole--move into "cyberspace," they become exposed to a new set of vulnerabilities that can be exploited by a wide spectrum of "bad actors" for a variety of motives. This paper discusses questions such as: (1) How serious are the likely threats to different segments of society, both today and in the future, from cyberspace-based attacks by various "bad actors"--such as hackers, criminals, disgruntled employees, terrorists and nation-sponsored informational attacks? (2) What are the current best strategies for achieving security in cyberspace? (3) What roles and missions should various national entities (police, defense forces, local governments, etc.) be assigned to counter these threats, given that it is often unclear who the perpetrator is, and from where the threat emanates? (4) Are there specific services and institutions in each nation--which we term a "national interest element"--that play such vital roles in society that their protection from cyberspace-based attacks should be of national concern? This paper does not answer all these questions, but at least attempts to structure the discussion so that meaningful answers can be obtained
The implications of COTS vulnerabilities for the DOD and critical U.S. infrastructures : what can/should the DOD do? by Robert H Anderson ( Book )
3 editions published in 1998 in English and held by 86 WorldCat member libraries worldwide
There is a growing reliance on commercial off-the-shelf (COTS) products within critical systems on which the security and safety of the United States depend. Next-generation command and control systems within DoD depend heavily on COTS hardware and software. Typical COTS software products are large and complex, often comprising millions of lines of source code. This complexity precludes complete, unambiguous analysis of the code for "trap doors," "logic bombs," and other malevolent code possibly buried within it. In addition, increasing amounts of such code are developed by non-U.S. citizens and offshore workers with uncertain loyalties to the United States. Market forces favor functionality over security and reliability, so the problem is unlikely to disappear. In addition, DoD and the U.S. government lack sufficient market strength to compel greater security in COTS products. There are two basic approaches to "managing" this problem: making COTS used by the DoD more secure; and learning to live with insecure COTS. There are initiatives that can be undertaken in both of these areas. The authors have identified a number of candidate elements supporting each of these approaches. Those specific elements can support a variety of overall solution strategies. An outline of a possible research agenda addressing this problem is presented
A qualitative methodology for the assessment of cyberspace-related risks by Richard O Hundley ( Book )
4 editions published in 1996 in English and held by 83 WorldCat member libraries worldwide
The problem addressed here is assessing the risks to which some organization or activity is exposed as a result of some combination of cyberspace-related vulnerabilities and threats. It is an attempt to assess risk without resorting to quantitative methods, which can appear to offer more accuracy and precision than is in fact warranted. The methodology proposed, although a work in progress, has three favorable points: (1) it is transparent, in that the nature and substance of the judgments and combinatorial steps are apparent; (2) it does not pretend to greater accuracy than can be justified; and (3) it is believed to capture the key elements and interactions involved in assessing cyberspace risk. The methodology does, however, require the user to make a large number of qualitative judgments and to combine them in a subjective fashion. The paper is presented as an annotated briefing
Future technology-driven revolutions in military operations : results of a workshop by Richard O Hundley ( Book )
4 editions published in 1994 in English and held by 18 WorldCat member libraries worldwide
Future breakthroughs in military technology will bestow an advantage on the first nation to apply them. Which technologies show enough promise to warrant greater U.S. defense R&D investment at this time? RAND hosted two workshops to address this question. Five promising program areas were identified: (1) development of insect-size flying and crawling systems capable of a wide variety of battlefield sensor missions; (2) use of techniques from molecular biology and biotechnology to develop new molecular electronic materials, components, and computational architectures; (3) use of modern microelectronic and information technologies as the basis for a new advanced-technology logistic system; (4) development of techniques and strategies to protect U.S. interests in "cyberspace"; and (5) use of a variety of technologies to enhance the survivability, mobility, and mission performance of individual soldiers
An Assessment of Defense Nuclear Agency functions : pathways toward a new nuclear infrastructure for the nation by Richard O Hundley ( )
3 editions published in 1994 in English and held by 9 WorldCat member libraries worldwide
This report evaluates options for carrying out functions of the Defense Nuclear Agency (DNA). Options proposed were transferring DNA's functions to individual services and the Advanced Research Project Agency; maintaining DNA as a separate agency tailored to today's security environment; transferring functions to the Department of Energy weapons laboratories; combining any of these options; or reorganizing DNA to reduce costs significantly. The report argues that DNA's functions must be assessed in the framework of the national nuclear infrastructure and identifies three continuing requirements with respect to nuclear weapons: caring for the nuclear stockpile, maintaining a capability to understand and deal with the use of nuclear weapons, and reducing the threat of nuclear weapons. DNA performs these functions and a fourth pertaining to conventional technologies. The report concludes that no single agency could accomplish all DNA's functions without incurring substantial risk. Functions could be spread across services and other agencies, but that approach exacerbates an unwise trend toward fragmentation. No option promises significant cost savings. The larger concern is the national infrastructure, which could be consolidated to counter the effects of fragmentation
Ultraviolet spectroscopy of the upper atmosphere : (Part 1 of an examination of the application to satellite meteorology of various segments of the electromagnetic spectrum) by Richard O Hundley ( Book )
1 edition published in 1963 in English and held by 8 WorldCat member libraries worldwide
Bremsstrahlung during the collision of low-energy electrons with neutral atoms and molecules by Richard O Hundley ( Book )
1 edition published in 1962 in English and held by 6 WorldCat member libraries worldwide
Satellite charge-up in the outer Van Allen belt by Richard O Hundley ( Book )
1 edition published in 1961 in English and held by 6 WorldCat member libraries worldwide
A study of the feasibility of detecting nuclear explosions by means of antineutrinos by Richard O Hundley ( Book )
1 edition published in 1960 in English and held by 4 WorldCat member libraries worldwide
Air radiation from nonequilibrium wakes of blunt hypersonic reentry vehicles by Richard O Hundley ( Book )
1 edition published in 1964 in English and held by 4 WorldCat member libraries worldwide
The wakes of reentry vehicles at altitudes of 100,000 ft or above will not be in chemical equilibrium. Under these conditions the wake radiation cannot be obtained from the ordinary equilibrium calculations, but a detailed study must be made of the chemical kinetics of the nonequilibrium wake. This memorandum presents the results of such a study for the case of a blunt, nonablating vehicle. Knowledge of the important chemical reactions for a pure air wake is fairly complete. However, large uncertainties exist with respect to hypersonic turbulence. For that reason, two recently proposed models of the turbulent mixing process are used in this memorandum: the inviscid random convection model, and the homogeneous mixing model. These two models give radiant intensities for the various chemiluminescent reactions that differ as much as several orders of magnitude. This large difference is another illustration of the importance of increasing our knowledge of hypersonic turbulence. The radiation estimates presented here show that the nonequilibrium wake radiation in the UV, visible, and near IR should dominate the gas cap and surface radiation at altitudes above about 100,000 ft. (Author)
The global course of the information revolution : technological trends : proceedings of an international conference by Technological Trends Global Course of the Information Revolution ( )
2 editions published in 2000 in English and held by 2 WorldCat member libraries worldwide
Reports on a conference sponsored by the National Intelligence Council in May 2000 that concentrated on technical trends in the information revolution, focusing in particular on the resulting new artifacts and services that might become widespread during the next 20 years. Participants saw a convergence of voice and data communications and a quantum jump in bandwidth during the next two decades, along with limited machine translation. A multitude of diverse, powerful, inexpensive sensors and devices capable of limited-distance wireless communications will come onto the market and computing and information systems will become much more ubiquitous, with convergence of wireless telephones, voice and e-mail messaging, and smart appliances. A likely shift in business emphasis from products to services will have an impact in such areas as health care, education, entertainment, and supply-chain management. Participants also discussed individual and societal tensions that could arise from these developments, such as battles between advocates of "open" and "closed" worlds of protocols and standards, and the threats to intellectual property rights and to individual privacy
Emerging Challenge: Security and Safety in Cyberspace by Richard O Hundley ( )
1 edition published in 1997 in English and held by 1 WorldCat member library worldwide
Metrics for the Quadrennial Defense Review's operational goals ( )
1 edition published in 2003 in English and held by 1 WorldCat member library worldwide
The Department of Defense has adopted a capabilities-based approach to defense planning for transforming the U.S. military to meet newly emerging national security challenges. Capabilities-based planning focuses on developing the general wherewithal to fight successfully in a wide range of circumstances rather than only in stereotyped scenarios. The 2001 Quadrennial Defense Review highlighted what it called six specific operational goals for the focus of the transformation. It then sought metrics for evaluating, advancing, and monitoring progress in attaining those goals. This documented briefing contains the slides and text of a briefing that describes a first cut at identifying such metrics. The research reported here was conducted within the Acquisition and Technology Policy Center (ATPC) as part of RAND's Metrics for the QDR Transformation Operational Goals project, a cross-cutting effort sponsored by the advisory board of RAND's National Defense Research Institute (NDRI), a federally funded research and development center supported by the Office of the Secretary of Defense, the Joint Staff, the unified commands, and the defense agencies. The research reported here was conducted in early 2002, and results were presented to NDRI's advisory board in April 2002. This documented briefing should be of interest to those involved in defense planning, particularly as it relates to transforming the U.S. armed forces
Cyberspace security and safety ( Book )
1 edition published in 1993 in English and held by 0 WorldCat member libraries worldwide
 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.53 (from 0.00 for Cyberspace ... to 1.00 for A study of ...)
Alternative Names
Hundley, Richard
Languages
English (70)
Covers