Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in National Security Law
Icworld: An Mmog-Based Approach To Analysis, Kimberly Gill, David Rolston, Wyatt Wong, Robert Pietrusko
Icworld: An Mmog-Based Approach To Analysis, Kimberly Gill, David Rolston, Wyatt Wong, Robert Pietrusko
Journal of Strategic Security
Intelligence analysts routinely work with "wicked" problems—critical,time-sensitive problems where analytical errors can lead to catastrophic consequences for the nation's security. In the analyst's world, important decisions are often made quickly, and are made based on consuming, understanding, and piecing together enormous volumes of data. The data is not only voluminous, but often fragmented, subjective, inaccurate and fluid.Why does multi-player on-line gaming (MMOG) technology matter to the IC? Fundamentally, there are two reasons. The first is technological: stripping away the gamelike content, MMOGs are dynamic systems that represent a physical world, where users are presented with (virtual) life-and-death challenges that can …
Research Note: Using The Iterate And Dots Databases, Peter A. Flemming, Edward Mickolus, Todd Sandler
Research Note: Using The Iterate And Dots Databases, Peter A. Flemming, Edward Mickolus, Todd Sandler
Journal of Strategic Security
For more than three decades, Vinyard Software's two ITERATE (International Terrorism: Attributes of Terrorist Events) datasets have set the standard in events research for terrorism researchers. It has recently been supplemented by the DOTS (Data on Terrorist Subjects) biographies project, which covers all terrorists, supporters, and other individuals mentioned in the ITERATE project.