Harvard University Program on Information Resources Policy
 
  Pirp Home
  Complete listing of publications, with abstracts
  Publications listed alphabetically by author
  Publications listed alphabetically by title
   

[A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

Author(s)TitlePublication Details
A'Hearn, Francis W.Northeast Power Failure and Lyndon B. Johnson: An Interview with Donald F. Hornig, June 30, 1983.5 pages; October 1983/Incidental Paper
A'Hearn, Francis W.The Information Arsenal: A C3I Profile.162 pages; March 1984/Research Report
Alberts, David S.21st Century National Security Challenges, in Guest Presentations, Spring 1997.34 pages; April 1998/Incidental Paper
Alden, Raymond A.Coordination Workshop October 18-19, 1984—Report of Proceedings.23 pages; April 1985/Incidental Paper
Allard, C. KennethBusiness Intelligence: Open Sources and Methods, in Guest Presentations, Spring 2001.31 pages; June 2002/Incidental Paper
Allard, C. Kenneth, George N. Curuby, Kenneth Freeman, Newell Highsmith, Thomas Leney, Marc Dean Millot, David McGaffey.Student Papers, Spring 1980.273 pages; January 1981/Incidental Paper
Allard, C. Kenneth.Command, Control, and the Common Defense.1990/Book: New Haven, Conn.: Yale University Press.
Allard, C. Kenneth.Thinking about Command and Control, in Guest Presentations, Spring 1991.20 pages; February 1993/Incidental Paper
Allard, Kenneth.Information Warfare: Hieararchies or Networks?, in Guest Presentations, Spring 1997.29 pages; April 1998/Incidental Paper
Allen, Charles E.Intelligence: Cult, Craft, or Business?, in Guest Presentations, Spring 2000.34 pages; July 2001/Incidental Paper
Andrews, Duane P.Restructuring the World of C3I, in Guest Presentations, Spring 1991.28 pages; February 1993/Incidental Paper
Aulik, Jaak.Financial Structures in Competitive Telecommunications: An International Overview.212 pages; August 1987/Research Report
Auluck, V. H.Computer and Telecommunications Policies of the Government of India.122 pages; December 1992/Research Draft
[go to top]

Baker, James A.The Foreign Intelligence Surveillance Act18 pages; September 2007/Incidental Paper
Baker, R. C. M. (Mark).The Globalization of Telecommunications, in Guest Presentations, Spring 1995.28 pages; January 1996/Incidental Paper
Baker, Thomas E.Computers and Political Campaigns: A Look at Technology and Social Change.69 pages; June 1983/Research Report
Baker, William O.The Convergence of C3I Techniques and Technology, in Guest Presentations, Spring 1981.44 pages; December 1981/Incidental Paper
Bansemer, John D.Intelligence Reform: A Question of Balance140 pages; August 2005/Research Report
Barrett, Archie D.Defense Reorganization: A View from the House, in Guest Presentations, Spring 1987.23 pages; May 1988/Incidental Paper
Barrett, Archie.Politics and the Military—The Climate for Reform, in Guest Presentations, Spring 1985.21 pages; April 1986/Incidental Paper
Barth, GustaveRegulation of Intra-EU Roaming: A Summary of the 2000-2010 Decade22 pages; April 2011/Incidental Paper
Barth, GustaveSpectrum for Mobile Communications in the World86 pages; December 2003/Research Draft
Barth, Gustave.Cellular Phones: Is There Really Competition?59 pages; August 1994/Incidental Paper
Beal, Richard S.Decision Making, Crisis Management, Information, and Technology, in Guest Presentations, Spring 1984.16 pages; February 1985/Incidental Paper
Benda, Charles G.State Organization and Policy Formation: The Reorganization of the Post Office Department.247 pages; August 1978/Incidental Paper
Benjamin, Milton R., and William H. Read"Ma Bell Fights for Her Monopoly."November 1976/Other: The New York Times Magazine
Berner, Richard.Constraints on the Regulatory Process: A Case Study of Regulation of Cable Television.1976/Book: Cambridge, Mass.: Ballinger Publishing Co.
Berresford, John W.How Government Can Bring New Communications to All Americans: Six Lessons from History59 pages; October 2004/Research Report
Bessey, K. Michael.In Whose Interest? Telecommunications Privatization and Universal Service in Canada.29 pages; March 1997/Incidental Paper
Besson, Paul M.The Goldwater-Nichols Act: A Ten-Year Report Card.69 pages; June 1998/Research Report
Bloom, Justin L.Japan's Ministry of International Trade and Industry (MITI) as a Policy Instrument in the Development of Information Technology.88 pages; October 1984/Research Report
Bodea, Sorin A.Information Technology and Economic Performance: Is Measuring Productivity Still Useful?41 pages; October 1994/Research Report
Bodea, Sorin A.The Impact of Section 310 of the Communications Act of 1934: Economic and National Security Issues.11 pages; August 1992/Incidental Paper
Borchardt, Kurt, and John C. LeGates.The Diverse Effects of Compunications Uses: A Suggested Diagnostic Framework.51 pages; August 1983/Research Report
Borchardt, Kurt, Benjamin M. Compaine, John C. LeGates, John F. McLaughlin, and Anthony G. Oettinger.Congressional Testimonies, 1979–1980.33 pages; August 1980/Incidental Paper
Borchardt, Kurt.Actors and Stakes: A Map of the Compunications Arena (Computers and Communications).18 pages; June 1978/Incidental Paper
Borchardt, Kurt.Coordinating Domestic Telecommunications Facilities and Services in a Changing Environment: An Overview and Some Suggestions Regarding Negotiating Processes.47 pages; October 1983/Research Report
Borchardt, Kurt.The Exchange Network Facilities for Interstate Access (ENFIA) Interim Settlement Agreement.23 pages; August 1979/Research Report
Borchardt, Kurt.Towards a Theory of Legislative Compromise.50 pages; May 1976/Research Report
Borg, LindseyCommunicating With Intent: The Department of Defense and Strategic Communication76 pages; February 2008/Incidental Paper
Boykin, William G.Defense Intelligence and Transformation36 pages; May 2007/Incidental Paper
Branch, Stuart E.C3I and Crisis Management, in Guest Presentations, Spring 1984.17 pages; February 1985/Incidental Paper
Brannon, Robert B.Human Intelligence, in Guest Presentations, Spring 200230 pages; June 2002/Incidental Paper
Branscomb, Anne W.Cybercommunities and Cybercommerce: Can We Learn to Cope?17 pages; January 1996/Incidental Paper
Branscomb, Anne W.Nurturing Creativity in a Competitive Global Economy: Intellectual Property and New Technologies. In Martin L. Ernst, ed., Mastering the Changing Information World.1993/Book
Branscomb, Anne W.Rogue Computer Programs—Viruses, Worms, Trojan Horses, and Time Bombs: Prank, Prowess, Protection, or Prosecution?83 pages; September 1989/Incidental Paper
Branscomb, Anne W.Technical Rips in the Seams of Intellectual Property Law.62 pages; April 1992/Research Report
Branscomb, Anne W.Who Owns Information? From Privacy to Public Access.1994/Book: New York: Basic Books, Harper Collins.
Branscomb, Anne W., Benjamin M. Compaine, John H. Cushman, John C. LeGates, John F. McLaughlin, and Anthony G. Oettinger.Congressional Testimonies, July 1983–April 1990.536 pages; February 1992/Incidental Paper
Braunstein, Yale M., Konrad K. Kalba, and Larry S. Levine.The Economic Impact of State Cable TV Regulation.75 pages; October 1978/Research Report
Breth, Frank J.Getting in Front of C4I2 Problems, in Guest Presentations, Spring 1988.20 pages; March 1989/Incidental Paper
Briggs, Charles A.CIA Paths Toward the Information Highway, in Guest Presentations, Spring 1997.26 pages; April 1998/Incidental Paper
Brown, Michael L.Information Warfare and the Revolution in Military Affairs, in Guest Presentations, Spring 1995.29 pages; January 1996/Incidental Paper
Bucholz, Douglas D.Ensuring Interoperability in Military Communications Systems: The J-6 Campaign Plan, in Guest Presentations, Spring 1997.24 pages; April 1998/Incidental Paper
Butcher, Joseph, David Sulek, Erin MacDougall, Katie Hines, Anna Kertesz, and David SvecDigital Democracy: Voting in the Information Age95 pages; October 2002/Research Report
[go to top]

Capasso, Paul F.Telecommunications and Information Assurance: America's Achilles' Heel?58 pages; March 1997/Research Report
Cartney, Michael.The Art of Balancing Information Security and Information Sharing.69 pages; December 2001/Research Paper
Cassity, James, Jr.Restructuring Military Policy to Reflect Worldwide Political Changes, in Guest Presentations, Spring 1990.17 pages; December 1991/Incidental Paper
Cebrowski, Arthur K.Command and Information Systems, in Guest Presentations, Spring 1996.22 pages; January 1997/Incidental Paper
Cebrowski, Arthur K.Control and Transformation27 pages; May 2004/Incidental Paper
Cherne, Leo.Television News and the National Interest, in Guest Presentations, Spring 1984.15 pages; February 1985/Incidental Paper
Cherniavsky, Barry.Early Warning Systems and the American Peacekeeping Mission: The Case of the Sinai II Agreement Between Egypt and Israel.47 pages; July 1981/Incidental Paper
Clapper, James R., Jr.A Proposed Restructuring of the Intelligence Community, in Guest Presentations, Spring 1996.33 pages; January 1997/Incidental Paper
Clemons, Dean R.Interlocking Stakes in NATO Security: A Primer on Investment, Dual-Use Technologies, and Export Control for the Military Leader in NATO46 pages; October 2002/Research Report
Clift, A. Denis"Catching Field Mice": Intelligence and Policy in the Twenty-First Century, in Guest Presentations, Spring 200331 pages; May 2003/Incidental Paper
Clift, Denis.Intelligence: The Left Hand of Curiosity, in Guest Presentations, Spring 1997.25 pages; April 1998/Incidental Paper
Clontz, William R.C3I Issues from a United Nations Perspective, in Guest Presentations, Spring 1994.33 pages; January 1995/Incidental Paper
Clontz, William R.C3I Issues from a United Nations Perspective-Revisited, in Guest Presentations, Fall 1997.29 pages; January 1999/Incidental Paper
Coakley, Thomas P.Command and Control for War and Peace.1992/Book: Washington D.C.: National Defense University.
Coakley, Thomas P., Ed.C3I: Issues of Command and Control.1991/Book: Washington, D.C.: National Defense University.
Colby, William E.The Developing Perspective of Intelligence, in Guest Presentations, Spring 1980.26 pages; December 1980/Incidental Paper
Compaine, Benjamin M.A New Framework for the Media Arena: Content, Process and Format.1984/Book
Compaine, Benjamin M.Chronology of Telecommunications and Cable Television Regulation in the United States.57 pages; January 1984/Research Report
Compaine, Benjamin M.Electronic Distribution of Information to the Consumer and Low Volume Institutional Market.1984/Book
Compaine, Benjamin M.Information Gaps: Myth or Reality?12 pages; January 1992/Incidental Paper
Compaine, Benjamin M.Information Technology and Cultural Change: Toward a New Literacy?55 pages; September 1984/Research Report
Compaine, Benjamin M.Issues in New Information Technology.1988/Book: Norwood, N.J.: Ablex Publishing Corp.
Compaine, Benjamin M.New Competition and New Media.25 pages; January 1985/Incidental Paper
Compaine, Benjamin M.New Literacy Indicators.36 pages; August 1986/Research Draft
Compaine, Benjamin M.Shifting Boundaries in the Information Marketplace.1984/Book
Compaine, Benjamin M.Size and Growth Trends of the Information Industry, 1970–1983.12 pages; February 1986/Incidental Paper
Compaine, Benjamin M.Understanding New Media.1984/Book: Cambridge, Mass.: Ballinger Publishing Co.
Compaine, Benjamin M., and John F. McLaughlin.Management Information: Back to Basics.25 pages; July 1986/Research Report
Compaine, Benjamin M., and William H. Read, Eds.The Information Resources Policy Handbook: Research for the Information Age.1999/Book: Cambridge, Mass., and London, Eng.: The MIT Press.
Compaine, Benjamin M., Oswald H. Ganley, John C. LeGates, John F. McLaughlin, and Anthony G. Oettinger.Congressional Testimonies, March 1980–March 1982.201 pages; September 1982/Incidental Paper
Conley, Robert.Data Security in the Information Age, in Guest Presentations, Spring 1986.29 pages; February 1987/Incidental Paper
Cougill, Roscoe M.C3 During Desert Shield and Desert Storm, in Guest Presentations, Spring 1992.26 pages; August 1994/Incidental Paper
Crawford, Morris H.Communications Networks for Finance and Trade in the USSR and Eastern Europe.27 pages; June 1991/Incidental Paper
Crawford, Morris H.Competition, Cooperation, and Discord in Information Technology Trade.87 pages; November 1982/Research Report
Crawford, Morris H.Data Communications and Industrial Policy in Southeast Asia: A Summary of Interviews with Nine Government and Industry Leaders in Malaysia, Singapore and Indonesia.35 pages; July 1984/Incidental Paper
Crawford, Morris H.EC '92: The Making of a Common Market in Telecommunications.28 pages; July 1988/Incidental Paper
Crawford, Morris H.Information Technology and Industrial Policy in the Third World: A Case Study of Singapore, Malaysia, and Indonesia.124 pages; August 1984/Research Report
Crawford, Morris H.Programming the Invisible Hand: The Computerization of Korea and Taiwan.138 pages; July 1986/Research Report
Crawford, Morris H.The Common Market for Telecommunications and Information Services.132 pages; July 1990/Research Report
Cristol, A. Jay.The Liberty Incident, in Guest Presentations, Spring 1995.25 pages; January 1996/Incidental Paper
Cunningham, Charles J.Information Technology and Organizational Agility, in Guest Presentations, Spring 1999.17 pages; June 2000/Incidental Paper
Cushman, John H.C3I and the Commander: Responsibility and Accountability, in Guest Presentations, Spring 1981.25 pages; December 1981/Incidental Paper
Cushman, John H.Command and Control of Theater Forces: Adequacy.1985/Book: Washington, D.C.: AFCEA International Press.
Cushman, John H.Command and Control of Theater Forces: Issues in the Mideast Coalition Command.98 pages; February 1991/Research Report
Cushman, John H.Command and Control of Theater Forces: The Future of Force Projection Operations.111 pages; March 1995/Research Report
Cushman, John H.Command and Control of Theater Forces: The Korea Command and Other Cases.604 pages; March 1986/Research Report
Cushman, John H.Desert Shield/Desert Storm and the Future of Force Projection, in Guest Presentations, Spring 1991.28 pages; February 1993/Incidental Paper
Cushman, John H.Planning and Early Execution of the War in Iraq: An Assessment of Military Participation31 pages; January 2007/Research Report
[go to top]

Da Costa, EduardoGlobal E-Commerce Strategies for Small Businesses2001/Book: Cambridge, Mass.: The MIT Press
Daguio, Kawika.Protecting the Financial and Payment System by Dispelling Myths, in Guest Presentations, Spring 1999.21 pages; June 2000/Incidental Paper
Daly, Peter H.Critical Infrastructure Protection, in Guest Presentations, Spring 1999.16 pages; June 2000/Incidental Paper
Daly, Peter H.IT's Place in U.S. History: Information Technology as a Shaper of Society35 pages; April 2002/Research Report
Daly, Peter H.Soldiers, Constables, Bankers, and Merchants: Managing National Security Risks in the Cyber Era.39 pages; June 2000/Research Report
Daniels, Harold.The Role of the National Security Agency in Command, Control, and Communications, in Guest Presentations, Spring 1986.31 pages; February 1987/Incidental Paper
Danner, Carl"Infrastructure" and the Telephone Network: Defining the Problem.16 pages; July 1992/Incidental Paper
Davis, James D.The Role of Army Intelligence in the National Foreign Intelligence Program, in Guest Presentations, Spring 1994.36 pages; January 1995/Incidental Paper
Davis, Neil W.Japanese Space Policy: Communications Satellite and Launch Vehicle Technology—Policy Issues.83 pages; August 1985/Research Report
Davis, Ruth M.Putting C3I Development in a Strategic and Operational Context, in Guest Presentations, Spring 1988.15 pages; March 1989/Incidental Paper
DeGross, Robert L.Teaching Intelligence, in Guest Presentations, Spring 1987.20 pages; May 1988/Incidental Paper
DeLauer, Richard D.A Consultant's View, in Guest Presentations, Spring 1985.17 pages; April 1986/Incidental Paper
DeLauer, Richard D.A Major Contractor's View of C3I, in Guest Presentations, Spring 1981.27 pages; December 1981/Incidental Paper
DeLauer, Richard D.The View from the Hot Seat, in Guest Presentations, Spring 1982.18 pages; December 1982/Incidental Paper
DeMarines, Victor A.FFRDC Business at MITRE, in Guest Presentations, Fall 1997.36 pages; January 1999/Incidental Paper
Demech, Fred R., Jr.Making Intelligence Better, in Guest Presentations, Spring 1987.23 pages; May 1988/Incidental Paper
Dempsey, Joan A.Intelligence and Homeland Security after 9/1123 pages; May 2004/Incidental Paper
Dempsey, Joan A.The Limitations of Recent Intelligence Reforms27 pages; September 2006/Incidental Paper
Dickinson, Hillman.Planning for Defense-Wide Command and Control, in Guest Presentations, Spring 1982.46 pages; December 1982/Incidental Paper
DiGennaro, Joann P.Science Literacy: Essential for Responsible Decision-Making63 pages; January 2005/Research Report
Dinneen, Gerald P.C3 Priorities, in Guest Presentations, Spring 1982.18 pages; December 1982/Incidental Paper
Donahue, Arnold E.Perspectives on U.S. Intelligence, in Guest Presentations, Spring 1997.31 pages; April 1998/Incidental Paper
Duberstein, Kenneth M.The White House Information Process, in Guest Presentations, Spring 1990.17 pages; December 1991/Incidental Paper
Dutta-Roy, Amit.The State of Brazilian Telecommunications Services.18 pages; February 1992/Incidental Paper
[go to top]

Edmonds, AlbertIntegrated Information Systems for the Warrior, in Guest Presentations, Spring 1995.41 pages; January 1996/Incidental Paper
Edmonds, Albert J.C4I Issues, in Guest Presentations, Spring 1994.40 pages; January 1995/Incidental Paper
Edmonds, Albert J.Information Systems Support to DOD and Beyond, in Guest Presentations, Spring 1996.46 pages; January 1997/Incidental Paper
Edmonds, Albert J.Managing Your E-Business:Electrifying Reality, in Guest Presentations, Spring 2000.34 pages; July 2001/Incidental Paper
Elkmann, Greg S.Post-Cold War Secrecy Policy.172 pages; June 1994/Research Report
Ellis, Richard H.Strategic Connectivity, in Guest Presentations, Spring 1982.11 pages; December 1982/Incidental Paper
Entman, Robert M.Issues in Telecommunications Regulation and Competition: Early Policy Perspectives from the States.131 pages; March 1985/Research Report
Epperson, G. Michael.Contracts for Transnational Information Services: Securing Equivalency of Data Protection.21 pages; August 1981/Incidental Paper
Epperson, G. Michael.Implications for the "Compunications" Industries of Proposed Amendments to the Webb-Pomerene Act.74 pages; February 1982/Research Report
Epstein, Samuel M.A Conceptual Framework for Pre- and Post-Divestiture Telecommunications Industry Revenue Requirements. Behind the Telephone Debates – 4.188 pages; June 1985/Research Report
Ernst, Martin L.At the Heart of Evolving Literacy: A Framework for Action.117 pages; December 1997/Research Report
Ernst, Martin L.Computers and Literacy: Redefining Each Other.85 pages; August 1994/Research Report
Ernst, Martin L.Electronic–Print Competition: Determinants of the Potential for Major Change.1993/Book
Ernst, Martin L.HDTV Issues: Rallying Cry or Whimper?11 pages; May 1989/PIRP Perspectives
Ernst, Martin L.Shaping the Nature of Future Literacy: A Synopsis.20 pages; September 1996/Incidental Paper
Ernst, Martin L.The Personal Computer: Growth Patterns, Limits, and New Frontiers.78 pages; October 1991/Research Report
Ernst, Martin L.Users and Personal Computers: Languages and Literacy, Costs and Benefits.42 pages; January 1993/Research Report
Ernst, Martin L., Ed.Mastering the Changing Information World.1993/Book: Norwood, N.J.: Ablex Publishing Corp.
[go to top]

Fairbanks, Walter P.Information Superiority: What Is It? How to Achieve It?69 pages; June 1999/Research Report
Fan, Xing.China Telecommunications: Constituencies and Challenges.167 pages; August 1996/Research Report
Faughn, Anthony W.Interoperability: Is It Achievable?61 pages; October 2002/Research Report
Faurer, Lincoln.The Role of Intelligence Within C3I, in Guest Presentations, Spring 1985.17 pages; April 1986/Incidental Paper
Ferguson, Tom.Private Locks, Public Keys and State Secrets: New Problems in Guarding Information with Cryptography.99 pages; April 1982/Research Report
Fleishman, Joel L.Postal Policy and Public Accountability: Is the 1970 Bargain Coming Unglued?124 pages; December 1982/Research Report
Fort, Randall M.The Role of Intelligence in Economic and Other Crises, in Guest Presentations, Spring 1993.23 pages; August 1994/Incidental Paper
Fort, Randall M.Whither the Elephant? Public-Private Sector Dynamics in the Information Realm, in Guest Presentations, Spring 1999.21 pages; June 2000/Incidental Paper
Foster, Gregory D.The National Defense University's Command and Control Program, in Guest Presentations, Spring 1987.23 pages; May 1988/Incidental Paper
Fox, James M.Crisis Management at the FBI, in Guest Presentations, Spring 1989.19 pages; August 1990/Incidental Paper
Friedenberg, Ellen S.Judicial Requirements for the Apportionment of Joint Costs.62 pages; June 1981/Incidental Paper
Friesinger, GretchenThe Wired World of Anthony Oettinger8 pages; June 1982/Other
Furst, Karen, William W. Lang, and Daniel E. NolleInternet Banking: Developments and Prospects.55 pages; April 2002/Research Report
[go to top]

Ganley, Gladys D.The Exploding Political Power of Personal Media.1992/Book: Norwood N.J.: Ablex Publishing Corp.
Ganley, Gladys D.Unglued Empire: The Soviet Experience with Communications Technologies.1996/Book: Norwood, N.J.: Ablex Publishing Corp.
Ganley, Gladys D., and Oswald H. Ganley.Global Political Fallout: The VCR's First Decade.1987/Book: Norwood, N.J.: Ablex Publishing Corp.
Ganley, Gladys D., and Oswald H. Ganley.Unexpected War in the Information Age. Communications and Information in the Falklands Conflict.135 pages; April 1984/Research Report
Ganley, Oswald H.Communications and Information in the Post Cold War Era.29 pages; May 1993/Incidental Paper
Ganley, Oswald H.EC'92 and the Telecommunications/Computer and Information Industries23 pages; May 1989/Other
Ganley, Oswald H.International Communications and Information in the 1990s: Forces and Trends.18 pages; August 1988/Incidental Paper
Ganley, Oswald H.International Communications and Information: The Need to Take It Seriously.55 pages; August 1981/Incidental Paper
Ganley, Oswald H.Interpreting Changes in the USSR, Eastern Europe, and the European Economic Community: Some Guideposts for Communications and Information Industries.7 pages; December 1989/PIRP Perspectives
Ganley, Oswald H.Rewards and Risks: Communications and Information in the Global Financial Services Industry.15 pages; November 1992/PIRP Perspectives
Ganley, Oswald H.The International Communications and Information Arena: A Research Plan.24 pages; July 1981/Research Draft
Ganley, Oswald H.The Role of Communications and Information Resources in Canada.51 pages; June 1979/Research Report
Ganley, Oswald H.The United States–Canadian Communications and Information Resources Relationship and Its Possible Significance for Worldwide Diplomacy.98 pages; March 1980/Research Report
Ganley, Oswald H.Trade as a Key Determinant for the Communications and Information Industry.5 pages; April 1987/Other
Ganley, Oswald H.U.S. Trade in Communications and Information vs. General Trade: Is There Really a Difference?25 pages; December 1982/Research Report
Ganley, Oswald H., and Gladys D. Ganley.To Inform or To Control? The New Communications Networks.1989/Book: 2d. Ed. Norwood N.J.: Ablex Publishing Corp.
Gannon, John C.Intelligence and Homeland Security After 9/1129 pages; May 2004/Incidental Paper
Garstka, John J.Information Superiority for the Warfighter, in Guest Presentations, Spring 2000.48 pages; October 2001/Incidental Paper
Ginsburg, Douglas.Interstate Banking.457 pages; April 1982/Research Report
Godbey, Robert C.A Distance-Insensitive Uniform National Telephone Rate Structure: A Speculative Exercise in Federalism.83 pages; July 1981/Research Report
Godbey, Robert C.Revenue and Cost Allocations: Policy Means and Ends in the Railroad and Telecommunications Industries.33 pages; July 1979/Research Report
Goodman, David J.Standards for Personal Communications in Europe and the United States.63 pages; April 1998/Research Report
Grant, Arthur V., Jr.Effective Intelligence and Free Democracy—Is That an Oxymoron?, in Guest Presentations, Spring 1995.32 pages; January 1996/Incidental Paper
Green, Anthony T.New Personal Media—Outpacing Society?109 pages; November 1994/Incidental Paper
Green, Anthony T.U.S–Japan Technology Transfer: Accommodating Different Interests.128 pages; March 1986/Research Report
Grimes, John.Information Technologies and Multinational Corporations, in Guest Presentations, Spring 1986.16 pages; February 1987/Incidental Paper
[go to top]

Haave, Carol A.Risk Management in the Department of Defense30 pages; May 2004/Incidental Paper
Hall, Keith R.Intelligence Needs in the Post Cold War Environment, in Guest Presentations, Spring 1994.28 pages; January 1995/Incidental Paper
Hall, Keith R.Space Systems as Contributors to Information Superiority, in Guest Presentations, Fall 1997.21 pages; January 1999/Incidental Paper
Haver, Richard L.The Process of Reorganization Within the U.S. Intelligence Community, in Guest Presentations, Spring 1992.18 pages; August 1994/Incidental Paper
Hays, George W.Do Mobile Satellite Service Systems Fundamentally Improve Military Communications Capabilities? An Operational Perspective45 pages; April 2001/Research Report
Hearn, James J.Information System Security, in Guest Presentations, Spring 1992.23 pages; August 1994/Incidental Paper
Herres, Robert T.A CINC's View of Defense Organization, in Guest Presentations, Spring 1985.22 pages; April 1986/Incidental Paper
Herres, Robert T.Strengthening the Chairman of the Joint Chiefs of Staff, in Guest Presentations, Spring 1988.20 pages; March 1989/Incidental Paper
Herres, Robert T.The Role of the Joint Chiefs after the 1986 Defense Reorganization Act, in Guest Presentations, Spring 1989.27 pages; August 1990/Incidental Paper
Heymann, Philip B.Relationships Between Law Enforcement and Intelligence in the Post-Cold War Era, in Guest Presentations, Spring 1997.24 pages; April 1998/Incidental paper
Highsmith, Newell.A Critique of the War Powers Resolution of 1973 in Light of the Intelligence Accountability Act of 1980.103 pages; August 1982/Research Report
Hilton, Robert.Roles of the Joint Chiefs of Staff in Crisis Management, in Guest Presentations, Spring 1985.33 pages; April 1986/Incidental Paper
Hirokado, Osamu.Competition in the Financial Industry: Who Can Survive?113 pages; June 1995/Research Report
Hochberg, Philip R.Federal Preemption of State Regulation in Cable Television.39 pages; November 1978/Research Report
Hochberg, Philip R.The States Regulate Cable: A Legislative Analysis of Substantive Provisions.135 pages; July 1978/Research Report
Hoechst, Timothy G.I3I: Information, Information, Information, and Information, in Guest Presentations, Spring 2000.36 pages; July 2001/Incidental Paper
Hooper, Richard.Prestel, Escher, Bach: Changes Within Changes.13 pages; January 1984/Incidental Paper
Horowitz, Barry M.The Emergence of Data Systems: Cost and Technical Change in Military Systems, in Guest Presentations, Spring 1993.22 pages; August 1994/Incidental Paper
Horton, Frank B. III.The Unified Command Plan and C3I, in Guest Presentations, Spring 1992.37 pages; August 1994/Incidental Paper
Huang, Derrick C.Managing the Spectrum: Win, Lose, or Share.66 pages; February 1993/Research Report
Huang, Derrick C.Size and Growth Trends of the Information Industry: 1975–1987.23 pages; April 1990/Incidental Paper
Huang, Derrick C.Size, Growth, and Trends of the Information Industries: 1978–1990.21 pages; December 1992/Incidental Paper
Huang, Derrick C.Up in the Air—New Wireless Communications.133 pages; August 1992/Research Report
Huffstutler, Rae M.Intelligence Sources and Their Applications, in Guest Presentations, Spring 1988.20 pages; March 1989/Incidental Paper
Hughes, Patrick M.Future Conditions: The Character and Conduct of War, 2010 and 2020, in Guest Presentations, Spring 200345 pages; July 2003/Incidental Paper
Hughes, Patrick M.Future Threats and Challenges, in Guest Presentations, Spring 1999.25 pages; June 2000/Incidental Paper
Huntington, Samuel P.Centralization of Authority in Defense Organizations, in Guest Presentations, Spring 1985.16 pages; April 1986/Incidental Paper
[go to top]

Inman, Bobby R.Issues in Intelligence, in Guest Presentations, Spring 1981.24 pages; December 1981/Incidental Paper
Inman, Bobby R.Managing Intelligence for Effective Use, in Guest Presentations, Spring 1980.22 pages; December 1980/Incidental Paper
Inman, Bobby R.Technological Innovation and the Cost of Change, in Guest Presentations, Spring 1986.19 pages; February 1987/Incidental Paper
Inoue, Hiroo.CATV Policy Development in Japan: Some Comparisons with the U.S.45 pages; December 1985/Research Draft
Iwata, Satoshi.Connecting to the Home: Alternatives for the Last Mile.41 pages; June 1999/Research Report
[go to top]

Jajko, Walter.Defense Intelligence: Adaptability, Character, and Capability, in Guest Presentations, Spring 1993.32 pages; August 1994/Incidental Paper
Jajko, Walter.Department of Defense Information Operations: A Critical Commentary, in Guest Presentations, Spring 1999.12 pages; June 2000/Incidental Paper
Jelen, George F.Information Security: An Elusive Goal.343 pages; June 1985/Research Report
Jenkins, Will M., Jr.The DOD's Changing Roles and Missions: Implications for Command and Control.118 pages; September 1996/Research Report
Jensen, Richard M.Information War Power: Lessons from Air Power.83 pages; September 1997/Research Report
Johnson, David M.Korean Air Lines Incident: U.S. Intelligence Disclosures.51 pages; April 1984/Incidental Paper
Johnson, Stuart E.Command and Control Education and Research, in Guest Presentations, Spring 1989.21 pages; August 1990/Incidental Paper
Jones, Anita K.Defense Science and Technology: Foundation of the Future, in Guest Presentations, Spring 1997.26 pages; April 1998/Incidental Paper
Jonscher, CharlesThe Evolution of Wired Life: From the Alphabet to the Soul-Cather Chip? How Information Technologies Change Our World1999/Book: John Wiley & Sons
Jonscher, CharlesWired Life: Who Are We in the Digital Age?1999/Book: London: Bantam Press
Jung, H. S.The Telecommunications Market in Korea: Current Status and Future Challenges.64 pages; November 2000/Research Report
[go to top]

Kalba, KasTelecom in the Time of Crash41 pages; November 2002/Incidental Paper
Kalba, KasThe Global Adoption and Diffusion of Mobile Phones112 pages; December 2008/Research Report
Kalba, Konrad K., Larry S. Levine, and Anne E. Birinyi.Regulatory Politics: State Legislatures and the Cable Television Industry.121 pages; August 1978/Research Report
Kalba, Konrad K., Larry S. Levine, Yale M. Braunstein, and Philip R. Hochberg.Executive Summary of Findings of the State Cable Television Regulation Project.20 pages; December 1978/Research Report
Kanuck, Sean P."Information Warfare: New Challenges for Public International Law."1996/Other
Kelley, David J.Providing Global Information Services to the Warfighter, in Guest Presentations, Spring 1999.46 pages; June 2000/Incidental Paper
Kerr, Richard J.The Evolution of the U.S. Intelligence System in the Post-Soviet Era, in Guest Presentations, Spring 1992.18 pages; August 1994/Incidental Paper
Kertz, Hubert L. with Oettinger, Anthony G.With AT&T in Iran, in Guest Presentations, Spring 1984.5 pages; February 1985/Incidental Paper
Kim, Seon-JaeThe Digital Economy and the Role of Government: Information Technology and Economic Performance in Korea37 pages; January 2002/Research Report
Kingston, Robert C.The Special Operations Command: Structure and Responsibilities, in Guest Presentations, Spring 1988.17 pages; March 1989/Incidental Paper
Kira, Masao.Where to Put the Smarts: Network or CPE?140 pages; July 1987/Research Report
Kist, Joost.The Role of Print on Paper in the Publishing House of the Future.23 pages; December 1993/Incidental Paper
Klie, Robert H.Compunications Network Management.72 pages; February 1980/Research Report
Knauf, Daniel J.The Family Jewels: Corporate Policy on the Protection of Information Resources.174 pages; June 1991/Research Report
Knisbacher, Mitchell.Government Competition with Private Enterprise: Some Thoughts on Pricing the Mails.89 pages; November 1982/Research Report
Knisbacher, Mitchell.Regulator, Overseer or Advisor? The Role of the Postal Rate Commission Under the Reorganization Act of 1970.184 pages; September 1983/Research Draft
Koike, Naoyuki.Cable Television and Telephone Companies: Towards Residential Broadband Communications Services in the U.S. and Japan.180 pages; December 1990/Research Report
Krasnow, Erwin G., and Jill Abeshouse Stern.The New Video Marketplace: A Regulatory Identity Crisis.163 pages; July 1985/Research Report
Kreps, Robert P.Buying Hens Not Eggs: The Acquisition of Communications and Information Technology by the Peoples' Republic of China.121 pages; October 1988/Research Report
[go to top]

Laboy, J. Edward.Capital Recovery in the Telecommunications Industry: Issues for the '80s.104 pages; December 1986/Research Report
Larios, Richard A.Teleport Concept: A Local Telecommunications Carrier Reality?38 pages; March 1985/Research Report
Latham, Donald.A View from Inside OSD, in Guest Presentations, Spring 1985.22 pages; April 1986/Incidental Paper
Latimer, Thomas K.The Congressional Intelligence Committees, in Guest Presentations, Spring 1990.19 pages; December 1991/Incidental Paper
Lavey, Warren G.Factors Influencing Investment, Costs and Revenues of REA Telephone Companies.34 pages; June 1982/Research Report
Lavey, Warren G.Making and Keeping Regulatory Promises64 pages; May 2002/Research Report
Lavey, Warren G.Telecom Globalization and Deregulation Encounter U.S. National Security and Labor Concerns62 pages; June 2007/Research Report
Lawrence, Robert.Global Reach Laydown, in Guest Presentations, Spring 1995.37 pages; January 1996/Incidental Paper
Lawrence, Stephen H.Centralization and Decentralization: The Compunications Connection.123 pages; July 1983/Incidental Paper
Layman, Richard L.Survivability and Space-Based Missile Warning Capabilities, in Guest Presentations, Spring 1994.21 pages; January 1995/Incidental Paper
Lederman, GordonRestructuring the U.S. Intelligence Community26 pages; February 2006/Incidental Paper
Lederman, Gordon N.Reorganizing the Joint Chiefs of Staff: The Goldwater-Nichols Act of 1986.1999/Book: Westport, Conn., and London: Greenwood Press (Contributions in Military Studies, No. 182), 1999.
Lee, Dong Wook.The Challenges for Value-Added Services in Korea.155 pages; May 1989/Research Report
LeGates, John C.Changes in the Information Industries: Their Strategic Implications For Newspapers20 pages; September 1980/Incidental Paper
LeGates, John C.Changes in the Information Industries—Their Strategic Implications for Newspapers. In Benjamin M. Compaine, ed., Understanding New Media.1984/Book
LeGates, John C.Telecommunications Costs and Prices in the United States: An Overview.27 pages; March 1982/Research Report
LeGates, John C.The Strategic Environment and Choices of Local Exchange Telephone Companies.5 pages; July 1990/PIRP Perspectives
LeGates, John C. B.Growing Up With the Information Age77 pages; April 2011/Incidental Paper
LeGates, John C. B.Open Access in the Local Telephone Loop: A Grand Tour of the Entangled Issues.23 pages; April 2000/Incidental Paper
LeGates, John C. B.The Internet: Is It a Bird? Is It a Plane? Will It Fly?14 pages; December 1995/Incidental Paper
LeGates, John C. B.The Sound, the Fury, and the Significance.19 pages; January 1995/Incidental Paper
LeGates, John C., and John F. McLaughlin.Forces, Trends, and Glitches in the World of Compunications.33 pages; May 1989/Research Report
Leide, John A.Coalition Warfare and Predictive Analysis, in Guest Presentations, Spring 1995.26 pages; January 1996/Incidental Paper
Leide, John A.Intelligence Analysis in Coalition Warfare, in Guest Presentations, Spring 1994.20 pages; January 1995/Incidental Paper
Lemler, Mark L.The FCC Access Charge Plan: The Debates Continue.197 pages; October 1987/Research Report
Lenczowski, Roberta E.NIMA and the Intelligence Community, in Guest Presentations, Spring 200335 pages; July 2003/Incidental Paper
Lenczowski, Roberta E.The National Imagery and Mapping Agency, in Guest Presentations, Spring 200228 pages; March 2003/Incidental Paper
Levine, Larry S.The Regulation of Cable Television Subscriber Rates by State Commissions.96 pages; August 1978/Research Report
Levine, Larry S., Konrad K. Kalba, and Philip R. Hochberg.Taxation, Regionalization, and Pole Attachments: A Comparison of State Cable Television Policies.126 pages; August 1978/Research Report
Levine, Richard.Data Base Publishing for Business Intelligence, in Guest Presentations, Spring 1986.15 pages; February 1987/Incidental Paper
Libicki, Martin C.Information Technology Standards: Quest for the Common Byte.1995/Book: Boston: Digital Press, Butterworth-Heinemann.
Libicki, Martin C.Information War: Ready for Prime Time?, in Guest Presentations, Spring 1996.32 pages; January 1997/Incidental Paper
Libicki, Martin C.Standards: The Rough Road to the Common Byte.46 pages; August 1994/Research Report
Lichstein, Henry A.The Smartcard as the Ultimate Thin Client: Looking Beyond the New York Smartcard Pilot, in Guest Presentations, Fall 1997.26 pages; January 1999/Incidental Paper
Lingl, Herbert F.Risk Allocation in International Interbank Electronic Funds Transfers: CHIPS & SWIFT.44 pages; June 1982/Incidental Paper
Linville, Ray P.Command and Control of Third World Forces: The Transfer of Military Capabilities.112 pages; July 1987/Research Report
Lipscomb, Greg.Private and Public Defenses Against Soviet Interception of U.S. Telecommunications: Problems and Policy Points.64 pages; July 1979/Research Report
Liscouski, Robert P.Taking Responsibility for Our Security24 pages; May 2004/Incidental Paper
Locher, James R. III.Defense Reorganization: A View from the Senate, in Guest Presentations, Spring 1987.26 pages; May 1988/Incidental Paper
Locher, James R. III.Special Operations and Low Intensity Conflict: A Congressional Perspective, in Guest Presentations, Spring 1988.25 pages; March 1989/Incidental Paper
Lockwood, Earl F.The Evolution of Special Operations Forces, in Guest Presentations, Spring 1988.18 pages; March 1989/Incidental Paper
Lodge, George C.Ideology and National Competitiveness, in Guest Presentations, Spring 1987.18 pages; May 1988/Incidental Paper
Loeb, Guy Hamilton.The Communications Act Policy Toward Competition: A Failure to Communicate.95 pages; October 1977/Research Report
Longstaff, P. H.Competition and Cooperation: From Biology to Business Regulation.58 pages; October 1998/Research Report
Longstaff, P. H.Information Theory As a Basis for Rationalizing Regulation of the Communications Industry.44 pages; June 1994/Research Report
Longstaff, P. H.Networked Industries: Patterns in Development, Operation, and Regulation.90 pages; March 2000/Research Report
Longstaff, P. H.New Ways to Think About the Visions Called “Convergence”: A Guide for Business and Public Policy82 pages; April 2001/Research Report
Longstaff, P. H.Telecommunications Competition and Universal Service: The Essential Tradeoffs.45 pages; May 1996/Research Report
Longstaff, P. H., Raja Velu, Jonathan ObarResilience for Industries in Unpredictable Environments: You Ought To Be Like Movies66 pages; June 2004/Research Report
Longstaff, P.H.The Communications Toolkit: How to Build and Regulate Any Communications Business2002/Book: Cambridge, Mass,: The MIT Press
Longstaff, P.H.The Puzzle of Competition in the Communications Sector: Can Complex Systems be Regulated or Managed?47 pages; July 2003/Research Report
Longstaff, P.H. and Joseph SteinhardtListening to Uncertainty in the Music Business: Fat Tails and Resilience44 pages; January 2011/Incidental Paper
Longstaff, PatSecurity, Resilience, and Communication in Unpredictable Environments Such as Terrorism, Natural Disasters and Complex Technology113 pages; November 2005/Research Report
Lord, Carnes.Bureaucratic Problems in Formulating National Strategy, in Guest Presentations, Spring 1991.16 pages; February 1993/Incidental Paper
Lotochinski, Eugene B.Global Communications Capabilities for the Banking Industry, in Guest Presentations, Spring 1991.22 pages; February 1993/Incidental Paper
Lotochinski, Eugene B.The Information Management Marketplace, in Guest Presentations, Spring 1987.28 pages; May 1988/Incidental Paper
Lowenthal, Mark M.Congress and the Intelligence Community: Oversight.and Reorganization Plans, in Guest Presentations, Spring 1996.30 pages; January 1997/Incidental Paper
Lowenthal, Mark M.Intelligence Analysis31 pages; May 2004/Incidental Paper
Lowenthal, Mark M.The Quest for "Good" Intelligence, in Guest Presentations, Spring 1986.19 pages; February 1987/Incidental Paper
Lubarsky, Albert R.C3I in Transition, in Guest Presentations, Spring 1992.25 pages; August 1994/Incidental Paper
Lucas, James W.The Information Needs of Presidents, in Guest Presentations, Spring 1990.18 pages; December 1991/Incidental Paper
[go to top]

Macke, Richard C.C4I for the Warrior, in Guest Presentations, Spring 1992.29 pages; August 1994/Incidental Paper
Magee, John.Some Business Analogies to C3I, in Guest Presentations, Spring 1989.17 pages; August 1990/Incidental Paper
Magnan, Richard A.Software User Interface Compatibility and Copyright after Lotus Development Corporation v. Paperback Software International.49 pages; November 1993/Research Report
Maher, William F., Jr.Legal Aspects of State and Federal Regulatory Jurisdiction Over the Telephone Industry: A Survey.135 pages; March 1985/Research Report
Marier, Vincent.U.S. Communications Policy: A Survey and Database of Executive Orders and Congressional Acts Over 24 Years.30 pages; July 1986/Research Report
Mark, HansThe Doctrine of Command, Control, Communications, and Intelligence: A Gentle Critique, in Guest Presentations, Spring 2000.31 pages; July 2001/Incidental Paper
Marsh, R. Thomas.Air Force C3I Systems, in Guest Presentations, Spring 1982.21 pages; December 1982/Incidental Paper
Marsh, Robert T.Critical Foundations: Protecting America's Infrastructure, in Guest Presentations, Spring 1999.28 pages; June 2000/Incidental Paper
Martin, Richard.Stopping the Unthinkable: C3I Dimensions of Terminating a "Limited" Nuclear War.46 pages; April 1982/Research Report
Masoner, Jeffrey A.Alternatives to Rate Base/Rate of Return Regulation of Local Exchange Carriers: An Analysis of Stakeholder Positions.May 1990/Research Report
Masoner, Jeffrey A.Alternatives to Rate Base/Rate of Return Regulation of Local Exchange Carriers: An Analysis of Stakeholder Positions. (Long Version)356 pages; May 1990/Research Report
Masoner, Jeffrey A.Alternatives to Rate Base/Rate of Return Regulation of Local Exchange Carriers: An Analysis of Stakeholder Positions. (Summary Version)9 pages; May 1990/Research Report
Maurer, Martha E.Coalition Command and Control: Key Considerations.1994/Book: Washington, D.C.: National Defense University Press/Harvard University.
McConnell, John M.The Evolution of Intelligence and the Public Policy Debate on Encryption, in Guest Presentations, Spring 1996.33 pages; January 1997/Incidental Paper
McConnell, John M.The Role of the Current Intelligence Officer for the Chairman of the Joint Chiefs of Staff, in Guest Presentations, Spring 1992.18 pages; August 1994/Incidental Paper
McDaniel, Rodney B.C3I: A National Security Council Perspective, in Guest Presentations, Spring 1987.19 pages; May 1988/Incidental Paper
McGarrity, John.Implementing Access Charges: Stakeholders and Options.140 pages; March 1983/Research Report
McKnight, Clarence E.C3I Systems at the Joint Level, in Guest Presentations, Spring 1986.31 pages; February 1987/Incidental Paper
McLaughlin, John F."Information Services": Inevitable Policy Controversies and Market Uncertainties.3 pages; February 1989/PIRP Perspectives
McLaughlin, John F.Making Money as a Telphone Company: Risks, Opportunities, and Likely Failures6 pages; October 1989/Other
McLaughlin, John F.Marketing Megalomania: The Lure of the Information Business.6 pages; February 1989/PIRP Perspectives
McLaughlin, John F.Talking Yellow Pages: Some Observations on U.S. Developments.6 pages; November 1987/PIRP Perspectives
McLaughlin, John F.The Baby Boom Bust: A Boon for the Information Business?4 pages; June 1988/PIRP Perspectives
McLaughlin, John F.The Rise in Low Intensity Conflict: A Theory, in Guest Presentations, Spring 1988.6 pages; March 1989/Incidental Paper
McLaughlin, John F.Unequal Access to Information Resources Among Corporations: Causes and Implications15 pages; November 1992/Other
McLaughlin, John F.Using Competing Carriers to Ensure the Survivability of Corporate Information Systems.3 pages; November 1987/PIRP Perspectives
McLaughlin, John F., with Anne E. Birinyi, David Dominik, and Eddie Munoz-Perou.Telephone–Letter Mail Competition: A First Look.118 pages; December 1981/Research Report
McLaughlin, John F., with Anne Louise Antonoff.Mapping the Information Business.83 pages; September 1986/Research Report
McManis, David Y.National Security and the Democratization of Information, in Guest Presentations, Spring 1989.19 pages; August 1990/Incidental Paper
McManis, David Y.Technology, Intelligence, and Command, in Guest Presentations, Spring 1991.20 pages; February 1993/Incidental Paper
McManis, David Y.Warning as a Peacekeeping Mechanism, in Guest Presentations, Spring 1984.15 pages; February 1985/Incidental Paper
McManus, Thomas E.Telephone Transaction-Generated Information: Rights and Restrictions.101 pages; May 1990/Research Report
McManus, Thomas E. and John F. McLaughlin.Competitive Uses of Regulation in the Financial Services Arena.83 pages; July 1994/Incidental Paper
McMullen, Thomas H.A Tactical Commander's View of C3I, in Guest Presentations, Spring 1982.21 pages; December 1982/Incidental Paper
Mendes, Meredith W.Privacy and Computer-Based Information Systems.108 pages; January 1985/Research Report
Meyerrose, Dale W.Adapting the Military to the Homeland Defense and Homeland Security Missions, in Guest Presentations, Spring 200328 pages; May 2003/Incidental Paper
Meyerrose, Dale W.Networks, Information Technology, and Paved Cowpaths, in Guest Presentations, Spring 2000.44 pages; July 2001/Incidental Paper
Miller, William G.Foreign Affairs, Diplomacy, and Intelligence, in Guest Presentations, Spring 1982.18 pages; December 1982/Incidental Paper
Minamikawa, Setsuko.Changing Money: Cash and Cards, Virtual and Electronic.56 pages; March 1998/Research Draft
Mines, Christopher W.Policy Development for Cellular Telephone Service in the United States and the United Kingdom.58 pages; September 1993/Research Report
Mines, Christopher W.Transnational Investments in Mobile Telephone Systems: Toward Global Telephone Companies?53 pages; November 1994/Research Report
Minihan, Kenneth A.Shaping the Intelligence Environment in the Information Age, in Guest Presentations, Fall 1997.24 pages; January 1999/Incidental Paper
Mockos, Robert E.NATO Tactical Ground C3: Interoperability Is Not Enough.47 pages; April 1983/Research Report
Montgomery, Mark C.Cyber Threats: Developing a National Strategy for Defending Our Cyberspace, in Guest Presentations, Spring 2000.39 pages; July 2001/Incidental Paper
Moorman, Thomas S., Jr.The Commission to Assess U.S. National Security Space Management and Organizations, In Guest Presentations, Spring 200131 pages; November 2001/Incidental Paper
Mosco, Vincent.Broadcasting in the United States: Innovative Challenge and Organizational Control.1979/Book: Norwood, N.J.: Ablex Publishing Corp.
Mosco, Vincent.Doing It Right with Computer Communication: A Case Study of the United Services Automobile Association.31 pages; December 1994/Research Report
Mosco, Vincent.Will Computer Communication End Geography?42 pages; September 1995/Research Report
Murrett, Robert B.Intelligence to Support Military Operations30 pages; May 2004/Incidental Paper
Murrett, Robert B.Issues Confronting Military Intelligence57 pages; December 2006/Incidental Paper
Musashi, Takehiko.Japanese Telecommunications Policy.44 pages; July 1985/Research Report
Myers, John T.Future Directions for Defense Communications, in Guest Presentations, Spring 1989.21 pages; August 1990/Incidental Paper
Myers, Roc A.Strategic Knowledgecraft: Operational Art for the Twenty-First Century60 pages; September 2000/Research Report
[go to top]

Negus, GordonIntelligence in Support of U.S. Foreign Policy, in Guest Presentations, Spring 1990.15 pages; December 1991/Incidental Paper
Northfield, Dianne.The Information Policy Maze: Global Challenges—National Responses.1999/Book: Melbourne, RMIT University Press.
Norton, Roy.Canada's Nationalistic Book Publishing Policy: A Review of Stakeholders' Criticisms, 1985–1990.71 pages; February 1991/Research Report
[go to top]

Odom, William.C3I and Telecommunications at the Policy Level, in Guest Presentations, Spring 1980.24 pages; December 1980/Incidental Paper
Oettinger, Anthony G."Counting the New Ways Computers Will Affect Us."October 1979/Other: LI: Newsday's Magazine for Long Island
Oettinger, Anthony G.Context for Decisions: Global and Local Information Technology Issues.23 pages; January 1998/Incidental Paper
Oettinger, Anthony G.Elements of Information Resources Policy: Library and Other Information Services.217 pages; January 1976/Research Report
Oettinger, Anthony G.Information Age Choices: The Ecstasy and the Agony29 pages; August 1993/Other
Oettinger, Anthony G.Information Resources: Knowledge and Power in the 21st Century.8 pages; January 1980/Incidental Paper
Oettinger, Anthony G.Information Technologies, Governance and Government: Some Insights from History.68 pages; September 1998/Incidental Paper
Oettinger, Anthony G.Knowledge Innovations: The Endless Adventure.42 pages; November 2000/Incidental Paper
Oettinger, Anthony G.National Politics and the Telecommunications World100 pages; January 1990/Other
Oettinger, Anthony G.Political Scientific, and Other Truths in the Information World.1988/Book: The Samuel Lazerow Memorial Lecture. Pittsburgh: University of Pittsburgh School of Library and Information Science.
Oettinger, Anthony G.Telling Ripe from Hype in Multimedia: The Ecstasy and the Agony.35 pages; July 1994/Incidental Paper
Oettinger, Anthony G.The Abundant and Versatile Digital Way.Book
Oettinger, Anthony G.The Formula Is Everything: Costing and Pricing in the Telecommunications Industry.57 pages; October 1988/Research Report
Oettinger, Anthony G.The Information Evolution: Building Blocks and Bursting Bundles.Book
Oettinger, Anthony G.Whence and Whither Intelligence, Command and Control? The Certainty of Uncertainty.34 pages; February 1990/Research Report
Oettinger, Anthony G., and John C. LeGates.Domestic and International Information Resources Policy—Congressional Testimony of Anthony G. Oettinger and John C. LeGates 1976–77.96 pages; 1978/Incidental Paper
Oettinger, Anthony G., and Kurt Borchardt, with Carol L. Weinhaus.Stakes in Telecommunications Costs and Prices (Part 2).145 pages; November 1980/Research Report
Oettinger, Anthony G., Paul J. Berman, and William H. Read.High and Low Politics: Information Resources for the 80s.1977/Book: Cambridge, Mass.: Ballinger Publishing Co.
Oettinger, Anthony G., with Carol L. Weinhaus.Players, Stakes, and Politics of Regulated Competition in the Compunications Infrastructure of the Information Industry. (Part 1)139 pages; August 1981/Research Report
Oettinger, Anthony G., with Carol L. Weinhaus.The Federal Side of Traditional Telecommunications Cost Allocations (Part 3).107 pages; January 1980/Research Report
Oettinger, Anthony G., with Carol L. Weinhaus.The Traditional State Side of Telecommunications Cost Allocations (Part 4).177 pages; September 1980/Research Report
Okamura, Tsutomu.Issues Concerning BOCs' Entry into Information Services: Experience in the United States, France, and Japan.148 pages; March 1992/Research Report
Olek, Gerald J.Nuclear Arms Control: Why Doesn't It Work?121 pages; February 1987/Research Draft
Olmer, LionelIntelligence Techniques for the American Business Community, in Guest Presentations, Spring 1986.14 pages; February 1987/Incidental Paper
Olmer, Lionel.Watchdogging Intelligence, in Guest Presentations, Spring 1980.22 pages; December 1980/Incidental Paper
O'Neill, Richard P.The Highlands Forum Process, in Guest Presentations, Spring 2001.31 pages; December 2001/Incidental Paper
Ongstad, Per.Information Resources Policy Viewed by an Outskirter.53 pages; June 1981/Incidental Paper
Onishi, Ken.Users' Needs for Systems Integration and Evaluation of Systems Integrators' Capabilities.42 pages; October 1991/Incidental Paper
Osborne, James M.Meeting Military Needs for Intelligence Systems, in Guest Presentations, Spring 1981.24 pages; December 1981/Incidental Paper
Osborne, Tommy T.Better Telephone Service for the Have Nots: In Whose Interest, by Which Means, and Who Pays?57 pages; August 1992/Research Report
O'Shaughnessy, Gary W.The Structure and Missions of the Air Force Intelligence Command, in Guest Presentations, Spring 1993.27 pages; August 1994/Incidental Paper
Owen, Bruce M., and Robert D. Willig.Economics and Postal Pricing Policy.36 pages; January 1981/Research Report
Owens, William A.The Three Revolutions in Military Affairs, in Guest Presentations, Spring 1995.22 pages; January 1996/Incidental Paper
[go to top]

Pappas, ArisRyszard Kuklinski: A Case Officer's View31 pages; May 2004/Incidental Paper
Paschall, Lee M.C3I and the National Military Command System, in Guest Presentations, Spring 1980.21 pages; December 1980/Incidental Paper
Paschall, Lee M.Network Management Policy.35 pages; November 1981/Research Report
Patrick, Sean M.More Bandwidth Doesn't Mean What You Think It Means: Why the Air Force Cannot Utilize the Full Potential of Its Enterprise Information Technology Systems60 pages; July 2003/Research Draft
Pepper, Robert.Competition in Local Distribution: The Cable Television Industry.63 pages; May 1983/Research Report
Piontkowsky, Curtis O.Leaks in the Dike: Who Will Protect the National Information Infrastructure53 pages; September 2004/Research Report
Plehal, James B.The National Infrastructure Protection Center31 pages; January 2004/Incidental Paper
Popper, CharlesAchieving High-Quality Software Systems: A Comprehensive Approach to Testing and Validation62 pages; March 2004/Research Paper
Popper, Charles.A Holistic Approach to IT Governance.25 pages; February 2000/Research Report
Povich, E. Laurence.Federal Communications Commission Common Carrier Policy Approaches to Selective Market Entry and Alternative Pipelines.119 pages; July 1981/Research Report
Program on Information Resources PolicyArenas, Players, and Stakes49 pages; 1977/Report
Program on Information Resources PolicyArenas, Players, and Stakes.39 pages; 1976/Report
Program on Information Resources PolicyInformation Resources: Performance, Profits & Policy38 pages; November 1978/Report
Program on Information Resources PolicyProgram Projects50 pages; 1976/Report
Program on Information Resources PolicyProgram Projects57 pages; 1977/Report
Program on Information Resources PolicyProgram Scope, Aims, and Practices; A Perspective on Information Resources21 pages; 1975/PIRP Perspectives
Program on Information Resources PolicyReport of the Program on Information Resources Policy, July 1978 - June198040 pages; June 1980/Report
Program on Information Resources PolicyThe Program Year in Review 1972-1973; A Perspective on the National Information Resources20 pages; 1973/PIRP Perspectives
Program on Information Resources PolicyThe Program Year in Review 1973-1974; A Perspective on the National Information Resources35 pages; 1974/PIRP Perspectives
Program on Information Resources PolicyThe Program Year in Review; A Perspective on Information Resources33 pages; 1975/PIRP Perspectives
Program on Information Resources PolicyThe Program: Who We Are & What We Do49 pages; 1978/Report
Program on Information Resources PolicyThe Scope of the Program 1972-1973; A Perspective on Information Resources12 pages; 1973/PIRP Perspectives
Program on Information Resources PolicyThe Scope of the Program 1973-1974; A Perspective on Information Resources13 pages; 1974/PIRP Perspectives
[go to top]

Quinn, Thomas P.Acquiring C3 Systems for the Department of Defense: Process and Problems, in Guest Presentations, Spring 1994.30 pages; January 1995/Incidental Paper
[go to top]

Radabaugh, Gregory C.Information Operations, in Guest Presentations, Spring 200228 pages; November 2002/Incidental Paper
Radi, David A.Intelligence Inside the White House: The Influences of Executive Style and Technology.28 pages; March 1997/Incidental Paper
Raduege, Harry D., Jr.DISA and NCS, In Guest Presentations, Spring 200144 pages; July 2001/Incidental Paper
Rankine, Robert R., Jr.Military Applications of Commercial SATCOM Systems, in Guest Presentations, Fall 1997.37 pages; January 1999/Incidental Paper
Rattray, Gregory J.Defensive Strategic Information Warfare: Challenges for the United States, in Guest Presentations, Spring 1999.26 pages; June 2000/Incidental Paper
Rattray, Gregory J.Securing Cyberspace24 pages; May 2004/Incidental Paper
Rattray, Gregory J.Strategic Information Warfare, in Guest Presentations, Spring 1997.13 pages; April 1998/Incidental Paper
Rattray, Gregory J.Strategic Warfare in Cyberspace.2001/Book: Cambridge, Mass.: The MIT Press
Read, William H.America's Mass Media Merchants.1977/Book: Baltimore: The Johns Hopkins University Press.
Read, William H.Knowledge As a Strategic Business Resource.27 pages; January 1999/Incidental Paper
Read, William H.Rethinking International Communications.19 pages; April 1978/Research Report
Read, William H.The First Amendment Meets the Second Revolution.1984/Book
Read, William H., and Benjamin M. Compaine, Eds.The Information Resources Policy Handbook: Research for the Information Age1999/Book
Read, William H., and Ronald Alan Weiner.FCC Reform: Does Governing Require a New Standard?41 pages; April 1999/Research Report
Reynolds, Richard T.Formal and Informal C3I Structures in the Desert Storm Air Campaign, in Guest Presentations, Spring 1994.19 pages; January 1995/Incidental Paper
Reynolds, Richard T.The Pitfalls of Peacetime Military Bureaucracy, in Guest Presentations, Spring 1996.26 pages; January 1997/Incidental Paper
Reynolds, Richard T.What Fighter Pilots' Mothers Never Told Them About Tactical Command and Control—and Certainly Should Have.80 pages; November 1991/Research Report
Richardson, David C.The Uses of Intelligence, in Guest Presentations, Spring 1981.23 pages; December 1981/Incidental Paper
Richardson, Robert P.The U.S. Diplomatic Telecommunications System: Its Role in U.S. National Security, War Prevention, and War Termination.74 pages; November 1984/Incidental Paper
Roby, Cheryl J.Challenges Facing the Defense Department in the Twenty-First Century, in Guest Presentations, Spring 2001.31 pages; December 2001/Incidental Paper
Rose, Charles.Congress and C3I, in Guest Presentations, Spring 1981.24 pages; December 1981/Incidental Paper
Rosenberg, Robert A.Defense Science Board Recommendations on Information Architecture for the Battlefield, in Guest Presentations, Spring 1996.40 pages; January 1997/Incidental Paper
Rosenberg, Robert A.Improved Application of Information to the Battlefield-Revisited, in Guest Presentations Spring 200240 pages; August 2002/Incidental Paper
Rosenberg, Robert A.Strategic Defense: A Challenge for C3I, in Guest Presentations, Spring 1984.25 pages; February 1985/Incidental Paper
Rosenberg, Robert A.The Influence of Policy Making on C3I, in Guest Presentations, Spring 1980.18 pages; December 1980/Incidental Paper
Rosenbloom, Richard S.The Continuing Revolution in Communications Technology: Implications for the Broadcasting Business.30 pages; June 1981/Incidental Paper
Roth, Michael, and Philip Sunshine.Administrative Procedural Policy: Rulemaking or Adjudication in Dealing with Technology?37 pages; November 1980/Incidental Paper
Rothman, John.Copyright of Compilations in the Post-Feist Era.34 pages; October 1992/Research Report
Rothman, John.Freelance Writings in the High-Tech Age: A Conflict of Interests.28 pages; April 1995/Research Report
Rothman, John.Tasini Revisited, or Freelance Writings in the High-Tech Age (cont.).19 pages; May 1998/Incidental Paper
Rothrock, John E.The Challenge of Leverage in the Post Cold War Era, in Guest Presentations, Spring 1994.28 pages; January 1995/Incidental Paper
Rowell, William F.Arms Control Verification: A Guide to Policy Issues for the 1980s.1986/Book: Cambridge, Mass.: Ballinger Publishing Co.
Rubin, Jerome S., and Janet Wikler.Publishing as a Creature of Technology.1993/Book
Ruddy, John M.Military Use of Satellite Communications, in Guest Presentations, Spring 1991.24 pages; February 1993/Incidental Paper
Rudman, Warren B.Perspectives on National Security in the Twenty-First Century, in Guest Presentations, Spring 200229 pages; June 2002/Incidental Paper
Ruess, John C.Future United States Air Force Strategy in the Third World: C3I Challenges.71 pages; September 1990/Research Report
Ryan, Julie J. C. H.Information Security Practices and Experiences in Small Businesses.173 pages; May 2001/Incidental Paper
Ryan, Julie J. C. H.Information Warfare: A Conceptual Framework, in Guest Presentations, Spring 1996.45 pages; January 1997/Incidental Paper
[go to top]

Salisbury, Gary L.The C4ISR-Enabled Warfighter, in Guest Presentations, Spring 200249 pages; November 2002/Incidental Paper
Sato, Yoshihiro.Non-Fixed and Fixed Networks, Complements or Alternatives? Background Issues.64 pages; May 1996/Research Report
Schwartz, Paul R.Coalition Command and Control in Desert Shield/Desert Storm, in Guest Presentations, Spring 1991.30 pages; February 1993/Incidental Paper
Seipp, David John.English Judicial Recognition of a Right to Privacy.133 pages; October 1982/Research Report
Seipp, David John.The Right to Privacy in American History.212 pages; July 1978/Research Report
Seminar on Command, Control, Communications, and IntelligenceGuest Presentations, Spring 1980.183 pages; December 1980/Seminar Master
Seminar on Command, Control, Communications, and IntelligenceGuest Presentations, Spring 1981.214 pages; December 1981/Seminar Master
Seminar on Command, Control, Communications, and IntelligenceGuest Presentations, Spring 1982.181 pages; December 1982/Seminar Master
Seminar on Command, Control, Communications, and IntelligenceGuest Presentations, Spring 1984.125 pages; February 1985/Seminar Master
Seminar on Command, Control, Communications, and IntelligenceGuest Presentations, Spring 1985.189 pages; April 1986/Seminar Master
Seminar on Command, Control, Communications, and IntelligenceGuest Presentations, Spring 1986.168 pages; February 1987/Seminar Master
Seminar on Command, Control, Communications, and IntelligenceGuest Presentations, Spring 1987.194 pages; May 1988/Seminar Master
Seminar on Command, Control, Communications, and IntelligenceGuest Presentations, Spring 1988.176 pages; March 1989/Seminar Master
Seminar on Command, Control, Communications, and IntelligenceGuest Presentations, Spring 1989.132 pages; August 1990/Seminar Master
Seminar on Command, Control, Communications, and IntelligenceGuest Presentations, Spring 1990.146 pages; December 1991/Seminar Master
Seminar on Intelligence, Command, and ControlGuest Presentations, Spring 2002June 2002/Seminar Master
Seminar on Intelligence, Command, and ControlGuest Presentations, Spring 2003May 2003/Seminar Master
Seminar on Intelligence, Command, and ControlGuest Presentations, Spring 2004May 2004/Seminar Master
Seminar on Intelligence, Command, and Control.Guest Presentations, Fall 1997.January 1999/Seminar Master
Seminar on Intelligence, Command, and Control.Guest Presentations, Spring 1991.February 1993/Seminar Master
Seminar on Intelligence, Command, and Control.Guest Presentations, Spring 1992.August 1994/Seminar Master
Seminar on Intelligence, Command, and Control.Guest Presentations, Spring 1993.August 1994/Seminar Master
Seminar on Intelligence, Command, and Control.Guest Presentations, Spring 1994.January 1995/Seminar Master
Seminar on Intelligence, Command, and Control.Guest Presentations, Spring 1995.January 1996/Seminar Master
Seminar on Intelligence, Command, and Control.Guest Presentations, Spring 1996.January 1997/Seminar Master
Seminar on Intelligence, Command, and Control.Guest Presentations, Spring 1997.April 1998/Seminar Master
Seminar on Intelligence, Command, and Control.Guest Presentations, Spring 1999.June 2000/Seminar Master
Seminar on Intelligence, Command, and Control.Guest Presentations, Spring 2000.July 2001/Seminar Master
Seminar on Intelligence, Command, and Control.Guest Presentations, Spring 2001.July 2001/Seminar Master
Seminar on Intelligence, Command, and Control.Guest Presentations, Spring 2006August 2006/Seminar Master
Seminar on Intelligence, Command, and Control.Guest Presentations, Spring 2007.May 2007/Seminar Master
Sheafer, Edward D.Naval Intelligence in the Post-Cold War Era, in Guest Presentations, Spring 1993.8 pages; August 1994/Incidental Paper
Sheehan, John J.Planning Information Operations for a Changing World, in Guest Presentations, Fall 1997.20 pages; January 1999/Incidental Paper
Shimizu, Akira.Global Telecommunications: Myth or Reality?72 pages; June 1994/Research Report
Shin, Yun-Sik.The Present Status and Future Tasks of Telecommunications Policy in Korea.9 pages; January 1995/Incidental Paper
Shinoda, Satoshi.Competition in Local Telecommunications Markets: The U.S. and Japan.110 pages; February 1989/Research Draft
Shukunami, Tatsushiro.The Race for Value-Added Services: Challenges and Opportunities in the U.S., Japan, and the U.K.145 pages; May 1988/Research Report
Sichter, James W.Profits, Politics, and Capital Formation: The Economics of the Traditional Telephone Industry.226 pages; October 1987/Research Report
Sichter, James W.Separations Procedures in the Telephone Industry: The Historical Origins of a Public Policy.146 pages; January 1977/Research Report
Silberberg, Jay L.Alternative Costing Methods: Fundamentals and Discretion—A Fixed Allocator Separations Model.185 pages; November 1989/Research Report
Simon, James M. Jr.Analysis, Analysts, and Their Role in Government and Intelligence, in Guest Presentations, Spring 200328 pages; July 2003/Incidental Paper
Simon, James M., Jr.Crucified on a Cross of Goldwater-Nichols, in Guest Presentations, Spring 2001.11 pages; July 2001/Incidental Paper
Singh, Supriya.Understanding the Use of Electronic Money: The Missing Factor in Policy.25 pages; November 1998/Research Report
Sivan, Yesha Y.Knowledge Age Standards: Present Scope and Potential Use in Education.122 pages; March 1996/Final Report
Sivan, Yesha Y.Nine Keys to a Knowledge Infrastructure: A Proposed Analytic Framework for Organizational Knowledge Management21 pages; March 2001/Research Paper
Snodgrass, Charles W.Funding C3I, in Guest Presentations, Spring 1981.29 pages; December 1981/Incidental Paper
Snook, Scott A.Friendly Fire: The Accidental Shootdown of U.S. Black Hawks over Northern Iraq.2000/Book: Princeton, N.J.: Princeton University Press, 2000.
Snook, Scott A.Leading Complex Organizations: Lessons from a Tragic Organizational Failure, in Guest Presentations, Spring 2000.49 pages; July 2001/Incidental Paper
Snyder, Frank M.Command and Control: The Literature and Commentaries.1993/Book: Washington, D.C.: National Defense University Press.
Sonneman, Karin L.Louisiana v. FCC: Its Implication For the Balance of Power between State and Federal Authorities in Telecommunications Regulation.63 pages; October 1990/Research Report
Spar, Debora L.A World of Lawyers: The Internationalization of Legal Practice.33 pages; August 1998/Research Report
Spar, Debora L.Cyberrules: Problems and Prospects for On-Line Commerce.33 pages; September 1996/Research Report
Spero, Joan.International Trade and the Information Revolution.17 pages; April 1985/Incidental Paper
Stansberry, James W.Cost-Effective Rearmament, in Guest Presentations, Spring 1984.14 pages; February 1985/Incidental Paper
Stenbit, John P.A Conversation with the Assistant Secretary of Defense for C3I, in Guest Presentations, Spring 200330 pages; July 2003/Incidental Paper
Stewart, Nina J.Infrastructure for Security, in Guest Presentations, Spring 1993.17 pages; August 1994/Incidental Paper
Stiles, Charles L.The U.S. Sinai Support Mission, in Guest Presentations, Spring 1991.18 pages; February 1993/Incidental Paper
Stilwell, Richard G.Policy and National Command, in Guest Presentations, Spring 1982.32 pages; December 1982/Incidental Paper
Stilwell, Richard G.Structure and Mechanisms for Command and Control, in Guest Presentations, Spring 1985.34 pages; April 1986/Incidental Paper
Studeman, W. O.The Philosophy of Intelligence, in Guest Presentations, Spring 1990.20 pages; December 1991/Incidental Paper
Sulick, Michael J.Human Intelligence26 pages; September 2007/Incidental Paper
Sung, Keuk Je.Korean Telecommunications Policies into the 1990s.71 pages; April 1990/Research Report
Sutton, Stephen W.Unholy Matrimony: The Marriage of Operations and Intelligence in C3I.91 pages; August 1990/Incidental Paper
[go to top]

Tanase, MasanaoIntegrated Services Digital Networks (ISDN): Concepts and Issues in the U.S. and Japan. Behind the Telephone Debates – 5.138 pages; November 1985/Research Report
Taschdjian, Martin.From Open Networks to Open Markets: How Public Policy Affects Infrastructure Investment Decisions.66 pages; November 2000/Research Report
Tate, Raymond.Worldwide C3I and Telecommunications, in Guest Presentations, Spring 1980.24 pages; December 1980/Incidental Paper
Tewlow, Jules S.Are Newspapers in Trouble? Observations on Some Trends and Developments in the Newspaper Business.14 pages; August 1991/Other
Thompson, W. Scott.U.S.–U.S.S.R. Information Competition, in Guest Presentations, Spring 1984.22 pages; February 1985/Incidental Paper
Thornburgh, Richard L.Three Mile Island: A Case Study in C3I for Crisis Management, in Guest Presentations, Spring 1988.20 pages; March 1989/Incidental Paper
Tirman, W. Robert.The Elephant and the Blind Men: The Phenomenon of HDTV and Its Would-Be Stakeholders.183 pages; April 1991/Research Report
Toma, Joseph S.C3: A View from Inside the Joint Staff, in Guest Presentations, Spring 1991.20 pages; February 1993/Incidental Paper
Travis, Robert A.The Telecommunications Industry in the U.S. and International Competition: Policy vs. Practice.108 pages; May 1991/Research Report
Tuttle, Jerry O.Tailoring C3I Systems to Military Users, in Guest Presentations, Spring 1988.16 pages; March 1989/Incidental Paper
Tuttle, Jerry O.The Copernican Pull, in Guest Presentations, Spring 1993.25 pages; August 1994/Incidental Paper
Tygier, Claude.The Foreign Exchange Market: A Descriptive Study.318 pages; August 1986/Research Report
[go to top]

Ungerer, Herbert.Access Issues Under EU Regulation and Antitrust Law: The Case of Telecommunications and Internet Markets.34 pages; July 2000/Incidental Paper
Urban, Christine D.Factors Influencing Media Consumption: A Survey of the Literature.1984/Book
Urban, Christine D.Factors Influencing Media Consumption: A Survey of the Literature.September 1981/Research Report
[go to top]

Van Cleave, Michelle K.Infrastructure Protection and Assurance, in Guest Presentations, Spring 1999.26 pages; June 2000/Incidental Paper
Van Cleave, Michelle K.Intelligence: The Science and Technology Connection, in Guest Presentations, Spring 1993.20 pages; August 1994/Incidental Paper
[go to top]

Wackler, Ted M.Government Advisory Boards: Improving the Business of Government? Lessons from the Trenches27 pages; August 2006/Incidental Paper
Wallace, Lewis S., Jr.From the Soviet Union to Russia: Contradictions and Implications, in Guest Presentations, Spring 1994.21 pages; January 1995/Incidental Paper
Wallace, Peter P.Military Command Authority: Constitutional, Statutory, and Regulatory Bases.90 pages; September 1983/Research Report
Weinhaus, Carol L., and Anthony G. Oettinger.At the Heart of the Debates: Costs, Control, and Ownership of the Existing Network. Behind the Telephone Debates – 1.1988/Book: Norwood, N.J.: Ablex Publishing Corp.
Weinhaus, Carol L., and Anthony G. Oettinger.Behind the Telephone Debates.1988/Book: Norwood, N.J.: Ablex Publishing Corp.
Weinhaus, Carol L., and Anthony G. Oettinger.Concepts: Understanding Debates Over Competition and Divestiture. Behind the Telephone Debates – 2.1988/Book: Norwood, N.J.: Ablex Publishing Corp.
Weinhaus, Carol L., and Anthony G. Oettinger.Federal/State Costing Methods: Who Controls the Dollars. Behind the Telephone Debates – 3.188 pages; June 1985/Research Report
Weinhaus, Carol L., and Jay L. Silberberg.Telecommunications Industry: Tactical Disputes, Elements of Change, and Strategic Outcomes.91 pages; March 1989/Research Draft
Weinhaus, Carol L., and Mark Jamison.Alternative Costing Methods Project: Examples of Modeling—Transport and Other Issues.60 pages; December 1991/Research Report
Weinhaus, Carol L., and Mark Jamison.Alternative Costing Methods Project: Update on Modeling Process and Key Components of Technology Deployment.21 pages; December 1991/Research Report
Weinhaus, Carol L., and Mark L. Lemler.Evaluating Proposals Changing the Carrier Common Line Pool.59 pages; January 1987/Research Report
Weinhaus, Carol, Bill Campbell, Linda Garbanati, Ben Harrell, and Rainer Thönes.Broadband Capable Network: Voice, Data, Video, and Graphics—Architecture and Modeling Assumptions.33 pages; August 1992/Research Report
Weinhaus, Carol, Mark Jamison, Peter Copeland, Dan Harris, and Jim Sichter.New Wine and Old Wineskins: Modeling Effects of Competition and Expanded Interconnection in the Local Exchange.77 pages; August 1992/Research Report
Weinhaus, Carol, Sandra Makeef, Mark Jamison, Harry Albright, Linda Garbanati, Gordon Calaway, Dan Harris, Mike O'Brien, Fred Hedemark, Peter Copeland, Glen Sims, Suzanne Adams, Jim Sichter, Steve Inman, Ben Harrell, Räiner Thönes, and Kevin Connors.Who Pays Whom? Cash Flow for Some Support Mechanisms and Potential Modeling of Alternative Telecommunication Policies.53 pages; December 1992/Research Report
Weinhaus, Carol, Sandra Makeeff, Harry Albright, Gordon Calaway, Fred Hedemark, and Michael S. O'Brien.Support Mechanisms: Issues and an Example of Potential Problems in the Future.28 pages; August 1992/Research Report
Welsh, Nancy A.Cost Separations Formulae in Telecommunications: The Development of the "Relative Use" Standard.61 pages; September 1983/Research Report
White, Thomas, and Gladys D. Ganley.The "Death of a Princess" Controversy.60 pages; September 1983/Research Report
Wikler, Janet, and Jerome S. Rubin.Publishing as a Creature of Technology.1993/Book
Williams, Darryl R.Combating Global Terrorism: Bringing All Elements of National Power to Bear39 pages; November 2006/Incidental Paper
Williams, Darryl R.National Security in the Twenty-First Century: An "All Elements" Approach36 pages; December 2007/Incidental Paper
Wilson, Thomas R.Asymmetric Approaches to Joint Vision 2020, In Guest Presentations, Spring 200133 pages; November 2001/Incidental Paper
Wolgast, A. K.Oil Crisis Management, in Guest Presentations, Spring 1980.29 pages; December 1980/Incidental Paper
Wood, C. Norman.The Policy Aspect of Intelligence, in Guest Presentations, Spring 1990.21 pages; December 1991/Incidental Paper
Wu, Ouyang.Deregulating Telecommunications in the United States.January 2000/Other
[go to top]

Yokokura, Takashi.Emerging Corporate Information Networks: Regulatory and Industrial Policy in Japan.81 pages; August 1987/Research Report
Yokoyama, Kunie.Voice Over the Internet: Fad or Future?135 pages; March 1999/Research Report
Yoshihara, ToshiChinese Information Warfare: A Phantom Menace or Emerging Threat?, in Guest Presentations, Spring 2001.51 pages; January 2002/Incidental Paper
[go to top]

Zadarecky II, Joseph T.The Role of the Air Force in U.S. Counternarcotics Policy, in Guest Presentations, Spring 1990.23 pages; December 1991/Incidental Paper
Zak, Michael J.Coming of Age in C3I, in Guest Presentations, Spring 1987.18 pages; May 1988/Incidental Paper
Zimbel, Norman S.Cooperation Meets Competition: The Impact of Consortia for Precompetitive R&D in the Computer Industry, 1982–92.160 pages; December 1992/Research Report
Zraket, Charles.Four Vital Issues in C3I, in Guest Presentations, Spring 1989.13 pages; August 1990/Incidental Paper

Copyright © 2001 by the President and Fellows of Harvard College. All Rights Reserved.