Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Law

Icworld: An Mmog-Based Approach To Analysis, Kimberly Gill, David Rolston, Wyatt Wong, Robert Pietrusko Nov 2008

Icworld: An Mmog-Based Approach To Analysis, Kimberly Gill, David Rolston, Wyatt Wong, Robert Pietrusko

Journal of Strategic Security

Intelligence analysts routinely work with "wicked" problems—critical,time-sensitive problems where analytical errors can lead to catastrophic consequences for the nation's security. In the analyst's world, important decisions are often made quickly, and are made based on consuming, understanding, and piecing together enormous volumes of data. The data is not only voluminous, but often fragmented, subjective, inaccurate and fluid.Why does multi-player on-line gaming (MMOG) technology matter to the IC? Fundamentally, there are two reasons. The first is technological: stripping away the gamelike content, MMOGs are dynamic systems that represent a physical world, where users are presented with (virtual) life-and-death challenges that can …


Strategic Security As A New Academic Discipline, Sheldon Greaves, Ph.D Nov 2008

Strategic Security As A New Academic Discipline, Sheldon Greaves, Ph.D

Journal of Strategic Security

The creation of Henley-Putnam University was an effort to create an academic institution for the purpose of offering degree programs in intelligence management, counterterrorism, and personal protection; subjects that arguably did not exist as academic disciplines when the school was conceived. The experience of two of the co-founders of the school, Nirmalya Bhowmick and Dr. Michael Corcoran, indicated that the training of officers tasked with vital security and intelligence work was carried out by partnering young officers with a training officer to help the new officer learn on the job. The effectiveness of this training depended to a great extent …


Short Takes: Intelligence-Service Psychology: A German Perspective, Sven Max Litzcke, Helmut Müller-Enbergs Nov 2008

Short Takes: Intelligence-Service Psychology: A German Perspective, Sven Max Litzcke, Helmut Müller-Enbergs

Journal of Strategic Security

To date, four German volumes in the series "Intelligence-Service Psychology" (Nachrichtendienstpsychologie) have been published. These volumes generated interest in both the German and non-German speaking communities. It was therefore decided to translate some of the basic articles of the series into English (Litzcke, Müller-Enbergs & Ungerer, 2008), making them accessible to a wider range of readers. This article contains abbreviated versions of the articles in the book.


Research Note: Using The Iterate And Dots Databases, Peter A. Flemming, Edward Mickolus, Todd Sandler Nov 2008

Research Note: Using The Iterate And Dots Databases, Peter A. Flemming, Edward Mickolus, Todd Sandler

Journal of Strategic Security

For more than three decades, Vinyard Software's two ITERATE (International Terrorism: Attributes of Terrorist Events) datasets have set the standard in events research for terrorism researchers. It has recently been supplemented by the DOTS (Data on Terrorist Subjects) biographies project, which covers all terrorists, supporters, and other individuals mentioned in the ITERATE project.


Books Received Nov 2008

Books Received

Journal of Strategic Security

No abstract provided.


Cover & Front Matter Nov 2008

Cover & Front Matter

Journal of Strategic Security

No abstract provided.


Dividing Up Intelligence Education, Robert Clark, Ph.D Nov 2008

Dividing Up Intelligence Education, Robert Clark, Ph.D

Journal of Strategic Security

At this year's annual conference of the International Association for Intelligence Education (IAFIE) in Monterey, CA, the keynote speaker posed the question, "How much do you need intelligence education outside the beltway?" Which led to a second question discussed during the conference: "What should such education look like?" In short, what should we be teaching in universities? What should we leave to the intelligence community as training? And what could be done in either or both settings? The first question of any educational effort is:What are we preparing students for?


Book Reviews, Bart Bechtel, Jeffrey Ahn Nov 2008

Book Reviews, Bart Bechtel, Jeffrey Ahn

Journal of Strategic Security

Fair Play: The Moral Dilemmas of Spying. By James M. Olson.

The Corporate Spy: Industrial Espionage and Counterintelligence inthe Multinational Enterprise with Case Studies (Abridged Version) by Edward M. Roche.