Works matching IS 19440464 AND DT 2015 AND VI 8
Results: 46
Understanding the Intelligence Cycle.
- Published in:
- 2015
- By:
- Publication type:
- Book Review
How Power-Laws Re-Write The Rules Of Cyber Warfare.
- Published in:
- Journal of Strategic Security, 2015, v. 8, n. 4, p. 39, doi. 10.5038/1944-0472.8.4.1439
- By:
- Publication type:
- Article
The Routledge History of Terrorism.
- Published in:
- 2015
- By:
- Publication type:
- Book Review
The Red Web: The Struggle Between Russia's Digital Dictators and the New Online Revolutionaries.
- Published in:
- 2015
- By:
- Publication type:
- Book Review
The Grand Strategy of Nonstate Actors: Theory and Implications.
- Published in:
- Journal of Strategic Security, 2015, v. 8, n. 4, p. 69, doi. 10.5038/1944-0472.8.4.1452
- By:
- Publication type:
- Article
Using the Oldest Military Force for the Newest National Defense.
- Published in:
- Journal of Strategic Security, 2015, v. 8, n. 4, p. 1, doi. 10.5038/1944-0472.8.4.1441
- By:
- Publication type:
- Article
ISAF'S Afghan Truck Drivers: The Overlooked Counterinsurgency Population.
- Published in:
- Journal of Strategic Security, 2015, v. 8, n. 4, p. 92, doi. 10.5038/1944-0472.8.4.1457
- By:
- Publication type:
- Article
Intelligence Communication in the Digital Era: Transforming Security, Defence and Business.
- Published in:
- 2015
- By:
- Publication type:
- Book Review
The Influence of U.S. Strategic Culture on Innovation and Adaptation in the U.S. Army.
- Published in:
- Journal of Strategic Security, 2015, v. 8, n. 4, p. 79, doi. 10.5038/1944-0472.8.4.1453
- By:
- Publication type:
- Article
Best Practices for Operating Government-Industry Partnerships in Cyber Security.
- Published in:
- Journal of Strategic Security, 2015, v. 8, n. 4, p. 53, doi. 10.5038/1944-0472.8.4.1456
- By:
- Publication type:
- Article
Deterring and Dissuading Cyberterrorism.
- Published in:
- Journal of Strategic Security, 2015, v. 8, n. 4, p. 23, doi. 10.5038/1944-0472.8.4.1460
- By:
- Publication type:
- Article
A Spy Among Friends: Kim Philby and the Great Betrayal.
- Published in:
- 2015
- By:
- Publication type:
- Book Review
Social Media and U.S. Intelligence Agencies: Just Trending or a Real Tool to Engage and Educate?
- Published in:
- Journal of Strategic Security, 2015, v. 8, p. 67, doi. 10.5038/1944-0472.8.3S.1476
- By:
- Publication type:
- Article
Sample Size of One: Operational Qualitative Analysis in the Classroom.
- Published in:
- Journal of Strategic Security, 2015, v. 8, p. 40, doi. 10.5038/1944-0472.8.3S.1474
- By:
- Publication type:
- Article
America's Evolution of Women and Their Roles in the Intelligence Community.
- Published in:
- Journal of Strategic Security, 2015, v. 8, p. 99, doi. 10.5038/1944-0472.8.3S.1479
- By:
- Publication type:
- Article
Developing a Better Understanding of the Personal Dimensions of Working at the Central Intelligence Agency.
- Published in:
- Journal of Strategic Security, 2015, v. 8, p. 1, doi. 10.5038/1944-0472.8.3S.1470
- By:
- Publication type:
- Article
Nexus between Intelligence Education and Intelligence Training: A South African Perspective.
- Published in:
- Journal of Strategic Security, 2015, v. 8, p. 162, doi. 10.5038/1944-0472.8.3S.1484
- By:
- Publication type:
- Article
Intelligence Sesquicentennial: Testament of Bleeding War.
- Published in:
- Journal of Strategic Security, 2015, v. 8, p. 53, doi. 10.5038/1944-0472.8.3S.1475
- By:
- Publication type:
- Article
Human Aspects in Intelligence Education.
- Published in:
- Journal of Strategic Security, 2015, v. 8, p. 123, doi. 10.5038/1944-0472.8.3S.1481
- By:
- Publication type:
- Article
How to Keep our Youth away from IS: The Need for Narrative Analysis and Strategy.
- Published in:
- Journal of Strategic Security, 2015, v. 8, p. 48, doi. 10.5038/1944-0472.8.3S.1469
- By:
- Publication type:
- Article
Global Climate Change as a Threat to U.S. National Security.
- Published in:
- Journal of Strategic Security, 2015, v. 8, p. 134, doi. 10.5038/1944-0472.8.3S.1482
- By:
- Publication type:
- Article
All Propaganda is Dangerous, but Some are More Dangerous than Others: George Orwell and the Use of Literature as Propaganda.
- Published in:
- Journal of Strategic Security, 2015, v. 8, p. 149, doi. 10.5038/1944-0472.8.3S.1483
- By:
- Publication type:
- Article
From WMD to WME: An Ever-Expanding Threat Spectrum.
- Published in:
- Journal of Strategic Security, 2015, v. 8, p. 110, doi. 10.5038/1944-0472.8.3S.1480
- By:
- Publication type:
- Article
Cyberspace's Dynamic Duo: Forging a Cybersecurity Public-Private Partnership.
- Published in:
- Journal of Strategic Security, 2015, v. 8, p. 85, doi. 10.5038/1944-0472.8.3S.1478
- By:
- Publication type:
- Article
Critical Infrastructure Protection: Maintenance is National Security.
- Published in:
- Journal of Strategic Security, 2015, v. 8, p. 25, doi. 10.5038/1944-0472.8.3S.1471
- By:
- Publication type:
- Article
Choosing an SAT with SAnTA: A Recommender System for Informal Workplace Learning.
- Published in:
- Journal of Strategic Security, 2015, v. 8, p. 80, doi. 10.5038/1944-0472.8.3S.1477
- By:
- Publication type:
- Article
Before and Beyond Anticipatory Intelligence: Assessing the Potential for Crowdsourcing and Intelligence Studies.
- Published in:
- Journal of Strategic Security, 2015, v. 8, p. 15, doi. 10.5038/1944-0472.8.3S.1468
- By:
- Publication type:
- Article
The Test of Terrorism: Responding to Political Violence in the Twenty-First Century.
- Published in:
- 2015
- By:
- Publication type:
- Book Review
The Black Banners: The Inside Story of 9/11 and the War Against al-Qaeda.
- Published in:
- 2015
- By:
- Publication type:
- Book Review
The Fight for the High Ground: The U.S. Army and Interrogation during Operation Iraqi Freedom, May 2003 - April 2004.
- Published in:
- 2015
- By:
- Publication type:
- Book Review
The Cyber Intelligence Challenge of Asyngnotic Networks.
- Published in:
- Journal of Strategic Security, 2015, v. 8, n. 3, p. 107
- By:
- Publication type:
- Article
Revolutionary Intelligence: The Expanding Intelligence Role of the Iranian Revolutionary Guard Corps.
- Published in:
- Journal of Strategic Security, 2015, v. 8, n. 3, p. 93
- By:
- Publication type:
- Article
Setauket to Abbottabad: The Value of Film and Television in Teaching Human Intelligence.
- Published in:
- Journal of Strategic Security, 2015, v. 8, n. 3, p. 80
- By:
- Publication type:
- Article
Human Functions, Machine Tools, and the Role of the Analyst.
- Published in:
- Journal of Strategic Security, 2015, v. 8, n. 3, p. 69
- By:
- Publication type:
- Article
Terra Incognita: Mapping American Intelligence Education Curriculum.
- Published in:
- Journal of Strategic Security, 2015, v. 8, n. 3, p. 46
- By:
- Publication type:
- Article
Cultures, Conditions, and Cognitive Closure: Breaking Intelligence Studies' Dependence on Security Studies.
- Published in:
- Journal of Strategic Security, 2015, v. 8, n. 3, p. 24
- By:
- Publication type:
- Article
Professionalizing Intelligence Analysis.
- Published in:
- Journal of Strategic Security, 2015, v. 8, n. 3, p. 1
- By:
- Publication type:
- Article
From Police to Security Professional: A Guide to a Successful Career Transition.
- Published in:
- 2015
- By:
- Publication type:
- Book Review
The Bremer Detail: Protecting The Most Threatened Man In The World.
- Published in:
- 2015
- By:
- Publication type:
- Book Review
The Making of Terrorism in Pakistan: Historical and Social Roots of Extremism.
- Published in:
- 2015
- By:
- Publication type:
- Book Review
Essentials of Strategic Intelligence.
- Published in:
- 2015
- By:
- Publication type:
- Book Review
Why Pakistan Does Not Have a Counterterrorism Narrative.
- Published in:
- Journal of Strategic Security, 2015, v. 8, n. 1/2, p. 63, doi. 10.5038/1944-0472.8.1.1409
- By:
- Publication type:
- Article
Countering Insurgency and the Myth of "The Cause".
- Published in:
- Journal of Strategic Security, 2015, v. 8, n. 1/2, p. 43, doi. 10.5038/1944-0472.8.1.1419
- By:
- Publication type:
- Article
Understanding Radicalization and Engagement in Terrorism through Religious Conversion Motifs.
- Published in:
- Journal of Strategic Security, 2015, v. 8, n. 1/2, p. 16, doi. 10.5038/1944-0472.8.1.1430
- By:
- Publication type:
- Article
Adjusting Our Gaze: An Alternative Approach to Understanding Youth Radicalization.
- Published in:
- Journal of Strategic Security, 2015, v. 8, n. 1/2, p. 1, doi. 10.5038/1944-0472.8.1.1428
- By:
- Publication type:
- Article
Lethal Brands: How VEOs Build Reputations.
- Published in:
- Journal of Strategic Security, 2015, v. 8, n. 1/2, p. 27, doi. 10.5038/1944-0472.8.1.1436
- By:
- Publication type:
- Article