Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Political Science (34)
- Defense and Security Studies (28)
- Public Affairs, Public Policy and Public Administration (28)
- Other Political Science (25)
- Psychology (24)
-
- Other Psychology (18)
- International Relations (13)
- American Politics (9)
- Law (8)
- Peace and Conflict Studies (8)
- Arts and Humanities (5)
- International and Area Studies (5)
- Social Psychology (5)
- Communication (4)
- National Security Law (4)
- Terrorism Studies (4)
- Asian Studies (3)
- Business (3)
- Personality and Social Contexts (3)
- Criminal Law (2)
- Gender and Sexuality (2)
- History (2)
- Law and Race (2)
- Other Law (2)
- Philosophy (2)
- Portfolio and Security Analysis (2)
- Social Influence and Political Communication (2)
- Social Media (2)
- Sociology (2)
- Institution
- Publication Year
Articles 1 - 30 of 41
Full-Text Articles in Social and Behavioral Sciences
B613?, Donna Roberts
B613?, Donna Roberts
International Bulletin of Political Psychology
Comment from IBPP Editor: Psychological research traditions relevant to this article include (1) magical thinking not as schizotypal indicator but as normative phenomenon, (2) the developmental sequence of primary omniscience followed by the paranoid-schizoid and depressive positions of Kleinian psychoanalysis, and (3) collective psychologies including the Jungian collective unconscious as exploitable by charismatic political leaders.
Author's abstract: Hollywood will always be Hollywood. There will always be ridiculous chase scenes, impossible rescues and implausible conspiracies, each accompanied by the proverbial warning, “Don’t try this at home.” But sometimes, when art seems to imitate life and aspects of the fantasy world on …
Evaluasi Fungsi Kontra Intelijen Indonesia Dalam Menghadapi Spionase Intelijen Asing, Yosa Bayu Kuswara
Evaluasi Fungsi Kontra Intelijen Indonesia Dalam Menghadapi Spionase Intelijen Asing, Yosa Bayu Kuswara
Jurnal Kajian Stratejik Ketahanan Nasional
Espionage is an information gathering methode conducted by intelligence services both in intelligence acivities or closed/clandestine operations using open or closed tactics With its huge valuable resources, Indonesia becomes attractive for great powers intervention. Such a condition creates a threat to Indonesia national resiliency, especially threats from espionage activities. These threats should be seriously handled by the Indonesian government. Empirical cases of strategic surprises have suggested the role of foreign intelligence in Indonesia. Despite the fact that Indonesia has several intelligence agencies and some of them have conducted counter intelligence activities, Indonesia has yet had specific agency that deals with …
“I’Ll Be Your Mirror”, The Soul, And Intelligence And Counterintelligence Applications, Ibpp Editor
“I’Ll Be Your Mirror”, The Soul, And Intelligence And Counterintelligence Applications, Ibpp Editor
International Bulletin of Political Psychology
This article describes how the psychological trope of mirroring can explicate mass leadership and betrayals of trust.
Writing The Official History Of The Joint Intelligence Committee, Michael Goodman
Writing The Official History Of The Joint Intelligence Committee, Michael Goodman
Secrecy and Society
This article recounts the experience of a professional historian in being given the keys to the kingdom: access to the classified vaults of Britain’s Joint Intelligence Committee. This article includes some of the problems in having access, but complying with the sensitivities around official accounts, difficulties in writing a global history, or trying to make the work of a committee interesting and accessible, and of trying to determine the impact of intelligence on policy.
Historical Amnesia: British And U.S. Intelligence, Past And Present, Calder Walton
Historical Amnesia: British And U.S. Intelligence, Past And Present, Calder Walton
Secrecy and Society
Many intelligence scandals in the news today seem unprecedented - from Russian meddling in the 2016 U.S. Presidential election, to British and U.S. intelligence agencies monitoring activities of their citizens. They seem new largely because, traditionally, intelligence agencies on both sides of the Atlantic were excessively secretive about their past activities: even the names “GCHQ” and “NSA” were airbrushed from declassified records, and thus missing from major historical works and scholarship on on post-war international relations. The resulting secrecy about British and U.S. intelligence has led to misunderstandings and conspiracy theories in societies about them. Newly opened secret records now …
Treason, Treachery, And Betrayal Of Trust: The Psychological Search For The Why, Ibpp Editor
Treason, Treachery, And Betrayal Of Trust: The Psychological Search For The Why, Ibpp Editor
International Bulletin of Political Psychology
Treason, treachery, and betrayal of trust constitute a motif of human history. Can scientific psychology help us understand why?
Contemporary Soviet Criminal Law: An Analysis Of The General Principles And Major Institutions Of Post-1958 Soviet Criminal Law, Chris Osakwe
Georgia Journal of International & Comparative Law
No abstract provided.
People's War In Cyberspace: Using China's Civilian Economy In The Information Domain, Kieran Richard Green
People's War In Cyberspace: Using China's Civilian Economy In The Information Domain, Kieran Richard Green
Military Cyber Affairs
China is identified as posing a key challenge to US national security interests in cyberspace. These threats are incurred across the spectrum of conflict, ranging from low-level crime, to network penetration, to cyberattacks that have the potential to cause major physical destruction. Thus far, the majority of strategic assessments of China’s cyber capabilities have focused on the role of the People’s Liberation Army (PLA), which is officially tasked with undertaking offensive operations in cyberspace.[1] However, China does not employ its cyber capabilities in isolation. Rather, it considers cyber to be part of the “Information Domain.” In Chinese doctrine, controlling …
Who Was Elizabeth Hanson? Book Reveals The Secret Circumstances Surrounding The Death Of The Cia's Rising Star, Gerry Boyle
Who Was Elizabeth Hanson? Book Reveals The Secret Circumstances Surrounding The Death Of The Cia's Rising Star, Gerry Boyle
Colby Magazine
Book by Washington Post reporter reveals the secret circumstances surrounding the death of rising CIA star Elizabeth Hanson ’02.
Murder And Martial Justice: Spying And Retribution In Wwii America. By Meredith Lentz Adams (Kent, Ohio: The Kent State University Press, 2011), Millard E. Moon Ed.D.
Murder And Martial Justice: Spying And Retribution In Wwii America. By Meredith Lentz Adams (Kent, Ohio: The Kent State University Press, 2011), Millard E. Moon Ed.D.
Journal of Strategic Security
No abstract provided.
Fool For Love: The Psychology Of Security Violation, Ibpp Editor
Fool For Love: The Psychology Of Security Violation, Ibpp Editor
International Bulletin of Political Psychology
This article discusses why Pfc. Bradley Manning, United States (US) Army, who has been accused of illegally disclosing classified material—more than 150,000 diplomatic cables, 90,000 intelligence reports, and at least one video – allegedly performed the actions in question.
Spy High: The Secret Of Secret Russian Agents, Ibpp Editor
Spy High: The Secret Of Secret Russian Agents, Ibpp Editor
International Bulletin of Political Psychology
The author discusses Russian spying the United States, the psychology of espionage, and how spying as such may be part of the human condition.
The Birds And The Bees: Sex And Personnel Security, Ibpp Editor
The Birds And The Bees: Sex And Personnel Security, Ibpp Editor
International Bulletin of Political Psychology
The author discusses gender identity and sexual activity as they relate to security personnel in the context of espionage.
Short Takes: Intelligence-Service Psychology: A German Perspective, Sven Max Litzcke, Helmut Müller-Enbergs
Short Takes: Intelligence-Service Psychology: A German Perspective, Sven Max Litzcke, Helmut Müller-Enbergs
Journal of Strategic Security
To date, four German volumes in the series "Intelligence-Service Psychology" (Nachrichtendienstpsychologie) have been published. These volumes generated interest in both the German and non-German speaking communities. It was therefore decided to translate some of the basic articles of the series into English (Litzcke, Müller-Enbergs & Ungerer, 2008), making them accessible to a wider range of readers. This article contains abbreviated versions of the articles in the book.
Trends. Espionage And Sex: A Commentary On Personnel Security Criteria, Ibpp Editor
Trends. Espionage And Sex: A Commentary On Personnel Security Criteria, Ibpp Editor
International Bulletin of Political Psychology
This Trends article discusses one aspect of sexual orientation – homosexuality - in a security and intelligence context.
Special Article: Recommendations For Optimal Personnel Security In The Cyberworld, Ibpp Editor
Special Article: Recommendations For Optimal Personnel Security In The Cyberworld, Ibpp Editor
International Bulletin of Political Psychology
This article considers the social construction of recommendations for personnel security in the context of a global cyberworld.
Musings On One Who Got Away: Personnel Security, Counterintelligence, And Edward Lee Howard, Ibpp Editor
Musings On One Who Got Away: Personnel Security, Counterintelligence, And Edward Lee Howard, Ibpp Editor
International Bulletin of Political Psychology
This article describes several concerns with the United States Government's (USG) approach to minimizing betrayal by its personnel who are entrusted with security clearances, special access to sensitive information, and sensitive positions.
Counter-Intelligence On Espionage In The People's Republic Of China, Ibpp Editor
Counter-Intelligence On Espionage In The People's Republic Of China, Ibpp Editor
International Bulletin of Political Psychology
This article analyzes the consensual Western perception that many allegations of espionage made by the government of the People's Republic of China (PRC) are violations of universal human rights.
Latrogenic Insecurity: A Legacy Of Marie Jahoda, Ibpp Editor
Latrogenic Insecurity: A Legacy Of Marie Jahoda, Ibpp Editor
International Bulletin of Political Psychology
This article describes the security relevance of an article published 45 years ago by the recently deceased social psychologist, Marie Jahoda.
Trends. Banning Espionage, Ibpp Editor
Trends. Banning Espionage, Ibpp Editor
International Bulletin of Political Psychology
This article discusses the psychological aspects of the idea of banning espionage as presented in an article in SECRECY NEWS from the Federation of American Scientists Project on Government Secrecy.
Fantasy And The Fantasy Of Espionage, Ibpp Editor
Fantasy And The Fantasy Of Espionage, Ibpp Editor
International Bulletin of Political Psychology
This article explores relationships between fantasy and the commission of espionage.
Tit For Tat, Patty Cake, And Hide And Seek: The Psychology Of Spy Games, Ibpp Editor
Tit For Tat, Patty Cake, And Hide And Seek: The Psychology Of Spy Games, Ibpp Editor
International Bulletin of Political Psychology
This article explores the psychology of tit-for-tat reactions in the context of espionage and counterespionage.
Counterintelligence And Insecure Cognitions: The Case Of Robert P. Hanssen, Ibpp Editor
Counterintelligence And Insecure Cognitions: The Case Of Robert P. Hanssen, Ibpp Editor
International Bulletin of Political Psychology
This article identifies cognitions harbored as security-philic beliefs by well-meaning policymakers but associated with even greater security vulnerability.
The Person In Personnel Security: A Vulnerability In Espionage Analysis, Ibpp Editor
The Person In Personnel Security: A Vulnerability In Espionage Analysis, Ibpp Editor
International Bulletin of Political Psychology
This article describes some espionage-relevant content variables within which individual behavior is embedded.
Trends. Psychologies Of Personnel Security And Counterintelligence Failure: Racism, Satisficing, And Wen Ho Lee, Ibpp Editor
Trends. Psychologies Of Personnel Security And Counterintelligence Failure: Racism, Satisficing, And Wen Ho Lee, Ibpp Editor
International Bulletin of Political Psychology
This article discusses issues surrounding the actions of Mr. Wen Ho Lee in the context of espionage, treason, and national security as well as racial profiling and the problems with conducting counterintelligence.
The Pollard Case And The Nature Of Espionage, Ibpp Editor
The Pollard Case And The Nature Of Espionage, Ibpp Editor
International Bulletin of Political Psychology
This article describes some common misconceptions in evaluating the appropriateness of penalties for individuals convicted of espionage.
The Need For Racial Profiling: Negative Fallout Of The Wen Ho Lee Case, Ibpp Editor
The Need For Racial Profiling: Negative Fallout Of The Wen Ho Lee Case, Ibpp Editor
International Bulletin of Political Psychology
This article describes a counterproductive theme within public discourse on racial profiling, as the Wen Ho Lee case has been resolved.
The Psychology Of Espionage: Contemporary Commentary, Ibpp Editor
The Psychology Of Espionage: Contemporary Commentary, Ibpp Editor
International Bulletin of Political Psychology
This article provides commentary on some of the common personnel security and counterintelligence criteria employed to minimize espionage within a political organization. The article takes as a point of departure "Security and Motivational Factors in Espionage" by Mr. Terry Thompson in the July 2000 The Intelligencer.
A Textual Analysis Of Security: The Republican Platform As Propaganda, Ibpp Editor
A Textual Analysis Of Security: The Republican Platform As Propaganda, Ibpp Editor
International Bulletin of Political Psychology
This article comments on international security appraisals and pledges contained in the United States (US) Republican Party platform at the 2000 Republican National Convention.
The Classifieds And Classified Information: Lee And Deutch Redux, Ibpp Editor
The Classifieds And Classified Information: Lee And Deutch Redux, Ibpp Editor
International Bulletin of Political Psychology
This article describes positive and negative security implications of classifying information.