Crossref Citations
This Book has been
cited by the following publications. This list is generated based on data provided by Crossref.
Steele, Robert David
2002.
Crafting Intelligence in the Aftermath of Disaster.
International Journal of Intelligence and CounterIntelligence,
Vol. 15,
Issue. 2,
p.
161.
LAHNEMAN, WILLIAM J.
2003.
Outsourcing the IC's Stovepipes?.
International Journal of Intelligence and CounterIntelligence,
Vol. 16,
Issue. 4,
p.
573.
Trim, Peter R.J.
2003.
Disaster management and the role of the intelligence and security services.
Disaster Prevention and Management: An International Journal,
Vol. 12,
Issue. 1,
p.
6.
Maxwell, Terrence A.
2003.
Homeland security and information control: A model of asymmetric information flows.
Proceedings of the American Society for Information Science and Technology,
Vol. 40,
Issue. 1,
p.
128.
Tomes, Robert
2003.
Informing US National Security Transformation Discussions: An Argument for Balanced Intelligence, Surveillance and Reconnaissance.
Defence Studies,
Vol. 3,
Issue. 2,
p.
20.
Nomikos, John M.
2004.
The Greek Intelligence Service and Post-9/11 Challenges.
Journal of Intelligence History,
Vol. 4,
Issue. 2,
p.
75.
Rovner, Joshua
and
Long, Austin
2005.
The Perils of Shallow Theory: Intelligence Reform and the 9/11 Commission.
International Journal of Intelligence and CounterIntelligence,
Vol. 18,
Issue. 4,
p.
609.
Cronin, Blaise
2005.
Intelligence, terrorism, and national security.
Annual Review of Information Science and Technology,
Vol. 39,
Issue. 1,
p.
395.
Strickland, Lee S.
Baldwin, David A.
and
Justsen, Marlene
2005.
Domestic security surveillance and civil liberties.
Annual Review of Information Science and Technology,
Vol. 39,
Issue. 1,
p.
433.
Bar-Joseph, Uri
and
McDermott, Rose
2008.
Change the Analyst and Not the System: A Different Approach to Intelligence Reform.
Foreign Policy Analysis,
Vol. 4,
Issue. 2,
p.
127.
Agrell, Wilhelm
2009.
National Intelligence Systems.
p.
93.
Zanasi, Alessandro
2009.
Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS’08.
Vol. 53,
Issue. ,
p.
53.
2009.
Intelligence for an Age of Terror.
p.
263.
Sims, Jennifer E.
2009.
National Intelligence Systems.
p.
58.
Nomikos, John
and
Liaropoulos, Andrew
2010.
Truly Reforming or Just Responding to Failures? Lessons Learned from the Modernisation of the Greek National Intelligence Service.
Journal of Policing, Intelligence and Counter Terrorism,
Vol. 5,
Issue. 1,
p.
28.
Roberts, Nancy C.
2011.
Tracking and disrupting dark networks: Challenges of data collection and analysis.
Information Systems Frontiers,
Vol. 13,
Issue. 1,
p.
5.
Skillicorn, David
and
Bourassa, M. A. J.
2011.
Counterterrorism and Open Source Intelligence.
p.
33.
Kelly, Lesly
and
Vincent, Deborah
2011.
The dimensions of nursing surveillance: a concept analysis.
Journal of Advanced Nursing,
Vol. 67,
Issue. 3,
p.
652.
Cronin, Blaise
2011.
The intelligence disconnect.
Journal of the American Society for Information Science and Technology,
Vol. 62,
Issue. 10,
p.
1867.
Kang, Youn-ah
and
Stasko, John
2011.
Characterizing the intelligence analysis process: Informing visual analytics design through a longitudinal field study.
p.
21.