Have a personal or library account? Click to login
An Examination of the Implementation of Risk Based Approaches in Military Operations Cover

An Examination of the Implementation of Risk Based Approaches in Military Operations

Open Access
|Nov 2016

References

  1. Amnesty International. (2000). NATO/Federal Republic of Yugoslavia “Collateral damage” or unlawful killings? Violations of the Laws of War by NATO during Operation Allied Force: Amnesty International.
  2. Andrews, J. D., & Moss, T. R. (2002). Risk assessment Reliability and risk assessment (Second ed., pp. 411-448). London: Professional Engineering Publishing Limited.
  3. Aven, T. (2009). Identification of safety and security critical systems and activities. Reliability Engineering & System Safety, 94(2), 404-411.10.1016/j.ress.2008.04.001
  4. Bakx, G. C. H., & Richardson, R. A. L. (2013). Risk assessments at the Royal Netherlands Air Force: An explorative study. Journal of Risk Research, 16(5), 595-611.10.1080/13669877.2012.726249
  5. Bang, M. (2014). Pitfalls in Military Quantitative Intelligence Analysis: Incident Reporting in a Low Intensity Conflict. Intelligence and National Security.10.1080/02684527.2014.930584
  6. Burns, R. (2013, Feb 26 2013). APNEWSBREAK: Taliban attacks not down after all, The Associated Press.
  7. Clark, R. M. (2013). Intelligence analysis (4th ed.). London: Sage.
  8. Committee report to ICTY. (2000). Final Report to the Prosecutor by the Committee established to Review the NATO Bombing Campaign Against the Federal Republic of Yugoslavia. The Hague: International Criminal Tribunal for the former Yugoslavia.
  9. DCDC. (2010). Joint doctrine for joint force protection, Publication 3-64. Shrivenham: The Development, Concepts and Doctrine Centre, Ministry of Defence, United Kingdom.
  10. Department of the Army. (2006). Composite Risk Management, FM 5-19 (FM 100-14). Washington DC: Headquarters Department of the Army.
  11. Dinstein, Y. (2011). The Conduct of Hostilities under the law of International Armed Conflict (second ed.). United Kingdom: Cambridge University Press.10.1017/CBO9780511845246
  12. Doshi, P. (2009). Calibrated response to emerging infections. BMJ, 339.10.1136/bmj.b3471
  13. Frosdick, S. (1997). The techniques of risk analysis are insufficient in themselves. Disaster Prevention and Management, 6(3), 165-177.10.1108/09653569710172937
  14. George, R. Z., & Bruce, J. B. (2008). The age of analysis. In R. Z. George & J. B. Bruce (Eds.), Analyzing intelligence (pp. 295-308). Washington D.C.: Georgetown University Press.
  15. Hansson, S. O. (1993). The false promise of risk analysis. Ratio-New Series, 6(1), 16-26.10.1111/j.1467-9329.1993.tb00049.x
  16. Hansson, S. O. (2012). Riskfilosofi, En introduktion [In swedish]. Stockholm: Liber.
  17. Henckerts, J.-M., & Doswald-Beck, L. (2010). Customary International Humanitarian Law (Vol. Volume I: Rules). United Kingdom: Cambridge University Press.
  18. Hubbard, D. W. (2009). Worse than useless: The most popular risk assessment method and why it doesn't work The failure of risk management: Why it's broken and how to fix it. Hoboken: John Wiley & Sons Inc.
  19. ICTY Trial Chamber. (2004). Prosecutor vs. Blaskic, Blaskic case IT-95-14-T, 122 ILR 1. The Hague: the International Criminal Tribunal for the former Yugoslavia.
  20. Johnson, C. W. (2007). The Paradoxes of Military Risk Assessment. Paper presented at the the 25th International Systems Safety Conference, Baltimore, USA.
  21. Kunreuther, H. (2002). Risk analysis and risk management in an uncertain world. [Editorial Material]. Risk Analysis, 22(4), 655-664.10.1111/0272-4332.00057
  22. Kuo, C. (2007). Safety management and its maritime application. London: The Nautical Institute.
  23. Lehtomäki, K., Pääkkönen, R. J., & Rantanen, J. (2005). Risk Analysis of Finnish Peacekeeping in Kosovo. Risk Analysis, 25(2), 389-396.10.1111/j.1539-6924.2005.00597.x
  24. Liwång, H. (2012). Risk-based ship security analysis - an approach based on civilian and military methods. (Licentiate in Engineering), Chalmers Univeristy of Technology, Gothenburg.
  25. Liwång, H., Ringsberg, J. W., & Norsell, M. (2013). Quantitative risk analysis - Ship security analysis for effective risk control options. Safety Science, 58(0), 98-112.10.1016/j.ssci.2013.04.003
  26. Marine Corps Institute. (2002). Operational Risk Management, ORM 1-0. Washington DC: Headquarters Marine Corps.
  27. NATO. (2007). Allied joint doctrine for force protection, AJP-3.14. Brussels: NATO Standardisation Agency.
  28. NATO. (2010). Comprehensive operations planning directive, V1.0. Brussels: NATO Supreme Headquarters Allied Power Europe.
  29. Osterholm, M. T. (2005). Preparing for the Next Pandemic. New England Journal of Medicine, 352(18), 1839-1842.10.1056/NEJMp058068
  30. Reason, J. (2000). Safety paradoxes and safety culture. International Journal of Injury Control and Safety Promotion, 7(1), 3-14.10.1076/1566-0974(200003)7:1;1-V;FT003
  31. Rebugio, A. B. (2013). Bias and Perception: How it Affects Our Judgment in Decision Making and Analysis. Small Wars Journal.
  32. RTO/NATO. (2008). Improving Common Security Risk Analysis, RTO-TR-IST-049. Brussels: The Research and Technology Organisation (RTO) of NATO.
  33. Shearer, R. (2011). Operational analysis in Iraq: Sifting through the fog of war. Military Operations Research, 16(2), 63-71.10.5711/1082598316263
  34. Silver, N. (2012). The signal and the noise, Why so many predictions fail - but some don't. New York: the Penguin Press.
  35. Swedish Armed Forces. (2009a). Försvarsmaktens gemensamma riskhanteringsmodell [In swedish]. Stockholm: Swedish Armed Forces.
  36. Swedish Armed Forces. (2009b). Handbok bedömning antagonistiska hot [In swedish]. Stockholm: Swedish Armed Forces.
  37. The White House. (2013). Presidential Policy Directive -- Critical Infrastructure Security and Resilience. Washington DC: The White House, Office of the Press Secretary.
  38. Tomes, S. (2012). Risk: misunderstanding or military misnomer. The British Army Review, 153, 32-40.
  39. University of Cincinnati. (2004). Introduction to the principles of war and operations. Cincinnati: University of Cincinnati.
  40. Yang, Z. L., Wang, J., & Li, K. X. (2013). Maritime safety analysis in retrospect. Maritime Policy & Management, 40(3), 261-277.10.1080/03088839.2013.782952
DOI: https://doi.org/10.1515/jms-2016-0189 | Journal eISSN: 1799-3350 | Journal ISSN: 2242-3524
Language: English
Page range: 38 - 64
Published on: Nov 23, 2016
Published by: National Defense University
In partnership with: Paradigm Publishing Services
Publication frequency: 1 issue per year

© 2016 Hans Liwång, Marika Ericson, Martin Bang, published by National Defense University
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.