This is made up of values and norms
Culture
This is the creation, maintenance, and transformation across generations of semi-shared patterns of meaning, sense-making, affiliation, action, and organization
Culture
The four (4) types of diversity are _____
Demographic, cognitive/behavioral, organizational/structural, global
An information-related capability that preserves friendly essential secrecy by using a process to identify, control, and protect critical information
Operations security
This branch of government establishes military authority
Executive branch
Three strategies to building a positive organizational climate are ________
High standards, respect diversity, safe and secure work environment
This provides cultural context; this can yield significant influence within a culture and shape its world views
History; myth
Cognitive/behavioral
An adversary is a(n) ___________
The number of provisions embodied in the U.S. Constitution
Climate
This is an analytic view that examines how the treatment of men, women, and children in society shapes needs and interests
Gender perspective
Global diversity is the in-depth knowledge and experience with ______
Foreign languages and cultures
This step in the OPSEC process is best handled by personnel responsible for planning and executing the mission
Identifying critical information
The division of sharing power between the federal and state governments
Federalism
Three strategies to positively change an organizational climate are _______
Address your unit, Inspire action, Focus on little things
Gang violence is considered a unique security need of ______
Men
Acknowledge, Calibrate, Transform
This is step four (4) of the OPSEC process
Assess Risk
Define enumerated powers
The federal government does not have powers unless explicitly granted to it by the U.S. Constitution
Respect, openness, and encouragement to take calculated risk are examples of ______
Safe and secure work environment
The five barriers to cultural and gender competence are ______
Transcending binary thinking is an example of this step in the three-step process for countering bias
Calibrate
These are the key terms for OPSEC
OPSEC, adversary, threats, vulnerabilities, critical information
DAILY DOUBLE
Article 15s are considered an exception to this/these amendment(s)
6th, 7th, and 8th