Browsing by Title
Now showing items 703-722 of 2869
-
Et troverdig alliert mottak – erfaringer fra Trident Juncture 2018
(2019-05-08)I løpet av det siste tiåret har den sikkerhetspolitiske situasjonen blitt stadig mer krevende og kompleks, og varslingstiden har blitt potensielt svært lav. Dette stiller strenge krav til Forsvarets logistikkunderstøttelse ... -
Et uunyttet gevinstpotensial? - insentiver for forbedring og effektivisering på tvers av etatene i forsvarssektoren
(2019-10-21)I den inneværende langtidsplanen (2017–2020) utgjør det samlede effektiviseringskravet i forsvarssektoren 1,82 mrd. 2017-kroner. Dette kravet fordeles på alle de fem etatene i sektoren. Effektiviseringsgevinstene realiseres ... -
Et varmere Arktis i en kald krig – klimaendringenes sikkerhetspolitiske konsekvenser i Arktis
(2023-10-18)Oppvarmingen av Arktis forekommer langt raskere enn den globale gjennomsnittlige oppvarmingen. Dette får alvorlige sikkerhetspolitiske konsekvenser både på globalt og regionalt arktisk nivå. Denne rapporten sammenstiller ... -
Ett helsevesen i fred, krise og krig? – ekspertundersøkelse om fremtidens sanitet
(2023-12-13)Det militære forsvaret har bare blitt viktigere de siste årene. Men Forsvaret kan ikke ta seg av utfordringene alene. De siste årene har totalforsvaret vokst frem som et viktig strategisk satsningsområde. En rekke kvaliteter ... -
The EU and the challenges of Civil-Military Coordination at the strategic level
(2008)The purpose of this report is to analyse the practical framework for effective planning and coordination between different EU actors (both intra-pillar and inter-pillar) for EU crisis management. This has to do with a ... -
EU capabilities for a comprehensive approach : broad interoperability as comparative advantage
(2009)A recurring criticism against the burgeoning European Security and Defence Policy (ESDP) has been the notorious shortfalls in Europe’s military capabilities, resulting in a well-documented transatlantic capability gap. ... -
EU i USAs industrielle slagskygge - forsvarsrelaterte europeiske og transatlantiske industrielle og teknologiske utfordringer i forbindelse med EUs "headline goal"
(2000)At the EU December 1999 European Council in Helsinki it was decided that the Union by 2003 should establish an autonomous capacity to conduct military operations in response to international crisis. The aim of this report ... -
EUCLID JP 9.16: Space-based AIS reception for ship identification
(2004)This report documents the results of Work element 3100 “Space-based AIS reception for ship identification” of the WEAG study JP 9.16 “Emerging Satellite Technologies, System Trends and Space Utilization”. The Automatic ... -
The European Arctic after the Cold War - how can we analyze it in terms of security
(2007)Som sikkerhetspolitisk arena har nordområdene gjennomgått store og viktige endringer etter den kalde krigens slutt og Sovjetunionens oppløsning. Under den kalde krigen var Barentshavsregionen et av verdens tyngst militariserte ... -
European defence research in crisis? The way towards strategic autonomy
(2016)Defence research, in the form of both research and development (R&D) and research and technology (R&T), are important factors in achieving long-term European strategic autonomy. The present paper analyses this debate from ... -
Europeisk sikkerhet i en foranderlig tid : en analyse av Norges utenriks- og sikkerhetspolitiske handlingsrom
(Forsvarets forskningsinstitutt, 2000) -
EUs "nye" sikkerhetspolitikk: Bekjempelse av terrorisme og internasjonal kriminalitet
(2003)This report is devoted to the EU as a comprehensive security policy actor. The aim is to study how the EU approaches the new threats and challenges facing the western communities and Europe. The analysis emphasises the ... -
EUs sikkerhetslogikk
(2004)The EU has developed a common foreign and security policy which in many ways differs from the current US policy. There are several reasons for these differences. Unlike the US the EU is not a unitary state, but a system ... -
Evaluating applied information security measures - an analysis of the data from the Norwegian Computer Crime Survey 2006
(2007)Forfatteren deltok i arbeidet med Mørketallsundersøkelsen sammen med Datakrimutvalget i Næringslivets sikkerhetsråd (NSR) fra januar 2006 frem til arbeidet ble presentert på Sikkerhetskonferansen i september 2006. Etter ... -
Evaluating Publish/Subscribe Protocols for use in Constrained Networks
(2023-03-09)Considering the case of disaster relief and search and rescue operations, we can anticipate personnel operating with a total or partial lack of any pre-existing infrastructure. This means that ad hoc com- munication solutions ... -
Evaluating the performance of JXTA over SATCOM
(2004)The transition towards a network-based defence brings along requirements to both network and distributed applications. Distributed applications are faced with a variety of networks ranging from high bandwidth links to ... -
Evaluating the recommended safety distance of a recoil booster
(2023-06-01)After a supplier course for the FN MINIMI 7.62 mm Tactical machine gun, it was noted that the accompanying recoil booster FN Herstal S. A. B0897 has a hole going through it, which is parallel to the line of fire. The ... -
Evaluation methods of signature effectiveness - a first evaluation of camouflage assessments by CAMAELEON compared to human observers
(2016-07-04)Signature control and a good understanding of the performance of signature control measures is a very important topic for the Norwegian Armed Forces. In order to achieve this we need methods for test and evaluation of ... -
Evaluation of a highly discriminating multiplex multi-locus variable-number of tandem-repeats (MLVA) analysis for Vibrio cholerae
(2009)Vibrio cholerae is the etiological agent of cholera and may be used in bioterror actions due to the easiness of its dissemination, and the public fear for acquiring the cholera disease. A simple and highly discriminating ...