://www.strategicstudiesinstitute.army.mil/pubs/download.cfm?q=752 [19 Oct 2010].
Mouffe, C. (2005) On the political. London: Routledge.
Rantapelkonen, J. (2006) The Narrative Leadership of War: Presidential Phrases in the 'War on Terror'and their Relation to Information Technology. Doctoral Dissertation. Publication Series 1, Research n:o 34, Helsinki: National Defence University.
Shimko, K. L. (2010) The Iraq Wars and America’s Military Revolution, New York: Cambridge University Press.
Taylor, P. (2003) Munitions of the Mind: A History of Propaganda from the
transatlantic defence R&D gap: causes, consequences and controversies. Defence & Peace Economics. [Article]. 2006;17(3):223-38.
20. Bellais R, Guichard R. Defense innovation, technology transfers and public policy. Defence & Peace Economics. [Article]. 2006;17(3):273-86.
21. Kelly T, Rishi M, Hartley K, Warner JT. An empirical study of the spin-off effects of military spending. Defence & Peace Economics. [Article]. 2003;14(1):7.
22. McGuire MC. Uncertainty, risk aversion, and optimal defense against interruptions in supply
Vesa Kuikka, Juha-Pekka Nikkarila and Marko Suojanen
Gediminas Adomavicius, Jesse C. Bockstedt, Alok Gupta, Robert J. Kauffman (2005). Technology roles and paths of influence in an ecosystem model of technology evolution, Information Technology and Management, Vol. 8, Issue 2, 185-202.
Muhammad Amer, Tugrul U. Daim, Antonie Jetter (2013). A review of scenario planning, Futures 46, 23-40.
Patrick T. Biltgen, Dimitri N. Mavris (2007). Capability-based quantitative technology evaluation for systems-of-systems, IEEE System of Systems Engineering Conference
). Explaining the Musudan. Munich: Schmucker Technologie.
Schiller, M., & Schmucker, R. H. (2012b). The Assumed KN-08 Technology. Munich: Schmucker Technologie.
Sessions, J. (2008). Ballistic Missile Defense: A National Priority. Strategic Studies Quarterly, 22-30.
Shampine, L.F., Reichelt, M. W. (1997), The Matlab ODE Suite. SIAM Journal on Scientific Computing 18 (1), 1-22.
Vallado, D.A. (2007) Fundamentals of Astrodynamics and applications (3rd ed.), New York : Springer.
Vick, C. P. (2012
The clearance of unexploded ordnance (UXO) and other explosive remnants of war (ERW) containing shaped charge warheads poses a particular technical hazard to consider for explosive ordnance disposal (EOD) personnel. The wide use of light anti-tank weapons, such as rocket propelled grenades and the scattering of sub-munitions in different conflict areas have made the clearance of shaped charge ammunition a frequent task. However, unlike other hazards, for shaped charges, EOD personnel lack adequate means for the establishment of the maximum hazardous area and for the design of measures for hazard confinement against the shaped charge effect.
In this article two different models are suggested, which together give guidance for protective measures during clearance of shaped charge ammunition. The development of these models is based on their military utility, by consideration of the limited information availability, the short time frames, the working methods and the technology level that are characteristic for EOD operations. The two suggested models are developed further into a complete set of design rules for protective measures, giving a versatile tool to replace today´s rough estimates and guesswork, in these safety-related decisions.
G.L.A. Harris, Ayanna Shivers and Patricia Deuster
Press, June 24.
Berwick, D.M. 2002. A User’s Manual for the IoM’s ‘Quality Chasm’ Report. Health Affairs, 21, 3, 60-87.
Betancourt, J.R., Green, A.R., Carillo, J.E., and Park, E.R. 2005. Cultural Competence and Health Care Disparities: Key Perspectives on Trends. Health Affairs, 24, 499-505.
Bigard, Xavier., Koulmann, Natalie., Banzet, Sebastien., Sanchez, Herve., and Malgoyre, Alexandra. 2009. Are There Ethical Limitations for Improving Physical Performance in Soldiers? The Research and Technology (RTO) Organisation
Paret. Princeton University Press: Princeton.
Cohen, E, 2007. Technology and Warfare. In Baylis, J et al., ed. Strategy in contemporary world: An Introduction to Strategic Studies. Oxford University Press: Oxford.
Dawkins, James, 2005. Unmanned Combat Aerial Vehicles: Examining the Political, Moral, and Social Implications. School for Advanced Air and Space Studies: Montgomery.
Dunlap, Charles, 1999. Technology and the 21st Century Battlefield. Strategic Studies Institute: Carlisle.
Ehrhard, Thomas, 2010
Militancy,” RAND Corporation, 2001.
 Arquilla, J. and Ronfeldt, D., “In Athena’s Camp: Preparing for Conflict in the Information Age,” RAND Corporation, 1997.
 BBC News, “US prepares first-strike cyber-forces,” BBC News Technology, Oct. 12, 2012. Available: http://www.bbc.co.uk/news/technology-19922421
 Beidleman, S. W., “Defining and Deterring Cyber War”, Strategy Research Project, U.S. Army War College, Jan. 2009.
 Bernstein, M. S., Monroy-Hernándex, Harry D., Andreé, P., Panovich, K. and Vargas
Influence of Clausewitz." Strategic Studies Quarterly 1 (Fall 2007).
Mertins, Silke. “Krieg ohne Chronisten.” die tageszeitung, 31 December 2008: 14.
Mittelstaedt, Juliane von, Christoph Schult, Daniel Steinvorth, Bernhard Zand. Tage des Krieges, Tage des Zorns. 5 January 2009. http://www.spiegel.de/spiegel/print/d-63344797.html (accessed 09 January 2012).
NATO. "Human Systems Integration for Network Centric Warfare." Technical Report, Reserach and Technology Organisation, NATO, 2010.
Perrow, Charles. Normal