Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences

University of South Florida

2008

Methodology

Articles 1 - 2 of 2

Full-Text Articles in Law

Icworld: An Mmog-Based Approach To Analysis, Kimberly Gill, David Rolston, Wyatt Wong, Robert Pietrusko Nov 2008

Icworld: An Mmog-Based Approach To Analysis, Kimberly Gill, David Rolston, Wyatt Wong, Robert Pietrusko

Journal of Strategic Security

Intelligence analysts routinely work with "wicked" problems—critical,time-sensitive problems where analytical errors can lead to catastrophic consequences for the nation's security. In the analyst's world, important decisions are often made quickly, and are made based on consuming, understanding, and piecing together enormous volumes of data. The data is not only voluminous, but often fragmented, subjective, inaccurate and fluid.Why does multi-player on-line gaming (MMOG) technology matter to the IC? Fundamentally, there are two reasons. The first is technological: stripping away the gamelike content, MMOGs are dynamic systems that represent a physical world, where users are presented with (virtual) life-and-death challenges that can …


Research Note: Using The Iterate And Dots Databases, Peter A. Flemming, Edward Mickolus, Todd Sandler Nov 2008

Research Note: Using The Iterate And Dots Databases, Peter A. Flemming, Edward Mickolus, Todd Sandler

Journal of Strategic Security

For more than three decades, Vinyard Software's two ITERATE (International Terrorism: Attributes of Terrorist Events) datasets have set the standard in events research for terrorism researchers. It has recently been supplemented by the DOTS (Data on Terrorist Subjects) biographies project, which covers all terrorists, supporters, and other individuals mentioned in the ITERATE project.