You are on page 1of 16

Shaping military intelligence management with e-interaction

CHENG, Yu Chin
PhD candidate, Institute of Political Science, Charles University in Prague
Adjunct Lecturer, school of International Relations and Diplomacy,
Anglo-American University (Prague)

Email: cheng@fsv.cuni.cz

The Scholar, Hinsley, defines that military intelligence is a military service that uses
intelligence gathering disciplines which informs the commanders' decision making
process by providing analysis of available data from a wide range of sources including
forecast environmental changes. In tradition and practice, military intelligence is seldom
interacted with informers, who stand outside army. Notwithstanding, the gathering
approaches of military intelligence are in the time to shape again in the era of Internet
application.

Since Robert Metcalfe invented Internet, Metcalfe’s Law has been domination in the
field of communication, and this law has also impacted on intelligence community,
particularly military intelligence. This paper is based on the approach of single case study,
and employs organizational decision-making theory to analyze the study; furthermore, the
method of open source intelligence is applied for data processing.

The goals of the paper are twofold—argument and statement. The argument is to
demonstrate the availability of military intelligence application in the model of civilian-
military cooperation. Regardless of the classified intelligence, civilian-military
cooperation can be in the way of the cooperation of open-source intelligence. Secondly,
the possibility of civilian-military cooperation could be undertaken via Internet tools, and
the safety of Internet is so important that the model of e-interaction between military and
civilian can be effective.

Keywords: military intelligence, Intellipedia, open-source intelligence

1. Introduction
The paper has two key points—e-interaction and open-source intelligence. E-
interaction means PC users interact over Internet, and the methods of e-interaction are

 The text of this part is very similar with one of my papers— The application of OSINT in IR
studies that had been published at NCCU in Taipei. Regardless of no innovative ideas, many
scholars have discussed the principles, approaches and even theories of OSINT, and they have
already defined them undoubtedly; therefore, this paper applies the partial text of The application
of OSINT in IR studies in this research.

1
mentioned, such as Intellipedia, Blog, WWW, and Rollyo. In accordance with these
methods, PC users become great public military intelligence contributors to help
commanders make better decisions. Whatsoever PC users contribute, the source of
military intelligence comes from public and open data better, and open source
intelligence is also encouraged in this research.

The definition of OSINT (Open-Source Intelligence) exists two basic meaning—open


source and intelligence circle. In this way, Open Source is interpreted to denote public
and unclassified data and the researchers are not worried about lack of data under this
condition; although a wide range source comes toward the research, the researchers could
be lost in large-scale source and discover no research direction immediately. Therefore,
solicitously, the solution of data management is not ignorable, and consequently,
intelligence circle is the ideal answer to this question.

Most OSINT experts define open source intelligence as unclassified information that
has been deliberately discovered, discriminated, distilled and disseminated to a select
audience in order to address specific questions. With knowledge of relevant and
reliable sources of open source information, the PC users can devote collection
energy and analytical expertise to develop source-collection strategy and to fulfill the
goals of military intelligence.

1. 1 The structure of OSINT


What does exactly open source consist of? There are four categories and rootstocks
of open source. First of them is Open Source Data [OSD] that comes from raw print,
broadcast, oral debriefing or other form of information from primary source. Having said
that, this could be a photograph, a tape recording, a commercial satellite image, or a
personal letter from an individual. Even though primary source is valuable, its validation
requires much verification and filtering.

Secondly, it is named Open Source Information [OSIF]. OSIF has an editorial process
that filters and validates data. Those can be newspapers, general daily report, books and
periodicals. Third one is OSINT, and it is unclassified information that has been
deliberately discovered, discriminated, distilled and disseminated to a select audience in
order to address specific question. After those abovementined procedures, the last one
action is designed to examine the accuracy and the relevance of OSINT regarding the
ongoing IR researches.

Validated OSINT (OSINT-V) is last but not least one in these four categories of open
information and intelligence. OSINT-V is information to which a very high degree of
certainty can be attributed and it can also come from an assured open source to which no
question can be raised concerning its validity. As a matter of fact, applying OSINT-V can
not only speed up the research, but also can compare and contrast among OSINTs. But it
is very disputable that the PC users have no ways to exploit OSINT-V, because the
military intelligence services never share its intelligence products with PC users.

Summing up, OSINT is high capable of processing huge amount of open source, and
mapping the process of data collecting, analyzing and synthesis. In expectation, OSINT

2
can satisfy what the commander needs; and in the other words, PC users provide OSINT
to help the military intelligence service modify itself in the more complex environment of
military intelligence gathering.

1.2. The categories of open data and information


OSINT is an ideal and costless tool of data processing for public military intelligence
contributors. Apparently, most intelligence services view OSINT significantly, and it is
estimated that OSINT provides between 80 and 95 percent of the information used by the
intelligence community as well1. OSINT consists of all sources of information which
matches the designed purposes, and is sharable and communicative to improve the
process of data gathering and processing. (Figure 1 the process of OSINT)

Planning and directing


Open source
OSINT
Collection, gathering and processing

Analysis and synthesis OSINT-V

Figure 1 the process of OSINT

The procedure is clear and the function needs care. Figure indicates that the procedure
of OSINT comes out with input (source), manufacture (data processing), and output
(OSINT), and supervision (OSINT-V). Open source involves OSD and OSIF basically,
and their functions are quite different. OSD harmonizes all primary source, such like raw
print, broadcast, oral debriefing, photography, tape recording, commercial satellite image
or personal letter. Having said that, OSD has visual-audio, image and context. (Table 1
Type and characteristics of OSD)

1 Chris Pallaris, Open Source Intelligence: A Strategic Enabler of National Security, retrieved
from http://www.isn.ethz.ch/pubs/ph/details.cfm?id=50169

3
Table 1 Type and characteristics of OSD
Raw Oral Photo- Tape Commercial Personal
Broadcast
print debriefing graphy recording satellite image letter
Visual √
Raw Oral Photo- Tape Commercial Personal
Broadcast
print debriefing graphy recording satellite image letter
Audio √ √ √
Visual-Audio √
Image √ √
Context √ √

Raw print
Raw print may indicate unpublished works, such like draft articles, thesis,
dissertations, or like non-academic works. This data reveal the purpose, inspiration and
aspiration of research; however, it needs verification and examination. Because this data
is primary but immature, and therefore it is supposed to be cross-reference, instead of
citation. Of course, this data could be cited after corroboration.

Oral debriefing
This data could be useful, valuable but neither worthy nor evident. As usual, oral
debriefing is interview, and this type relates highly with interviewee and interviewer, and
Q&A circle. Qualified interviewee and interviewer are important and not ambiguous, but
nevertheless unqualified interviewee or interviewer cannot match unqualified interviewer
or interviewee anymore. (Table 2 Interaction between interviewer and interviewee during
oral debriefing)

Table 2 Interaction between interviewer and interviewee during oral debriefing


Qualified Qualified Unqualified Unqualified
Interviewee Interviewee Interviewee Interviewee
& & & &
Qualified Unqualified Qualified Unqualified
Interviewer interviewer Interviewer interviewer
Useful √ √ √ ×
Valuable √ × × ×
Worthy √ √ × ×
Evident √ × × ×
Ambiguity × √ √ √

After some careful consideration, oral debriefing needs one evaluation checklist to
start off. This checklist has the high five elements such as who, what, where, when, and
why. (List 1 Oral debriefing checklist)

4
List 1 Oral debriefing checklist
Oral debriefing checklist
Oral debriefing offers information but it needs organization and verification. During
interview, there are usually five most important question and answers that the
researchers are keen to discover and know.

1. WHO? Identify the players and their position


2. WHAT? Discover the mission or task
3. WHERE? Connect the location and site
4. WHEN? Make sure the exact date
5. WHY? Realize aim, purpose and intent

Photography
Photography is partial data and can provide some characteristics of the target. Under
the conditions of empirical public military intelligence contributors, the photography is
the evidence to testify experience. For example, the public military intelligence
contributors require some evidence to proof facts, such like troop activities or exercises,
the development of new innovative weapons, and the location of military facilities. By
using photography, the public military intelligence contributors can strength the
accountability of the facts.

Nonetheless, most photography of military activities are high sensitive, and cannot be
allowable; even the source of photography originates publicly, but some nations prohibit
the photography of military activities. In respect of nations’ concern for safety, the public
military intelligence contributors must cross-refer themselves to laws.

Tape recording
Tape recording is an ambiguous data, but is an obvious manifestation; particulary,
when military intelligence services got them from the public. This type of data can help
the military intelligence officers apprehend the whole situation, but it sometimes brings
them imposture. Having said that, In addition, the military intelligence services need to
verify tape recording seriously when they report to the commanders before. This is real
argument that tape recording of military activities might be either real or a trick;
therefore, the serious and precise procedure of processing tape recording is very
necessary.

Commercial satellite image


Commercial satellite image is costly, tailor-made but not related to national classified
information. The commercial satellite image is very closer to high secret data, but is
accessible. The public military intelligence contributors, who employ this type of data,
are skillful and experienced. Moreover, the solution of commercial satellite image is very
important, and influences the research a lot. In general, the public military intelligence
contributors, who have expertise in defense and military studies, often exploit the
commercial satellite image to identify the enemy’s military facilities, arsenals, activities,

5
and exercises. However, most of important, the enemy’s military capacity and action are
effortless to be watched via commercial satellite image.

Personal letter
Personal letter is this kind of data which can provide the writer’s intent, purpose and
people net. Having said that, personal letter let the public military intelligence
contributors uncover one person’s background, and reveal unknown secret. However, it is
high exceptionable to connect secret and truth, particularly the persons who had appeared
in the past; obviously, the military intelligence contributor cannot find a word within
ancestor’s mouth. The researchers need attention to apply this data and in this regard to
examine it very carefully.

OSINT includes editorial information, and it has already been mentioned in the
abovementioned paragraph. OSINF is the feature that represents the editorial information
in OSINT. OSINF is referred as newspaper, general daily report, books and periodicals,
and so on; having said that, all information that is edited can be OSINF. It is obvious that
OSINF is either paper or on-line format, and is hard to explain whether OSINF is easy to
access or not difficult to discover in local or globe.

Newspaper
Newspaper always provides immediate information and correct but sometimes
incorrect to audiences. As a matter of fact, no news will be reported and sometimes the
reported news is accompanied with built-purpose. Therefore it is very fastidious to apply
newspaper for public military intelligence contributors. In practice, newspaper indicates
the date, the publisher, the reporter’s name, the topic and context of event, and sometimes
offers comment. Newspaper is always around public military intelligence contributors,
and is thought easily to access but no way to deal with actually.

In reality, processing newspaper needs a collection strategy. This strategy subsumes


collection definition, collection key words or terms, collection tool and collection
timeframe. The Collection definition is influential in the collection strategy, and it can
save public military intelligence contributors’ time and resource. One good collection
definition clarifies public military intelligence contributor’s idea, and indicates what
information needs gathering in the particular subject, such like politics, military,
economic, society, religion, culture or technology.

Nowadays many media company owners invest a lot in the construction of news
databases that could be free-access or not. Metaphorically speaking, key words are like
arrows, and one good archer is able to maximize the shooting average. To pick up the
good collection key words or terms, it is one easy job for the well-training experts.

However, software technology is advanced and this cutting-edge innovation can help
public military intelligence contributors to tackle about key words setting. Google
Suggest and Google Sets provide the researchers the example and suggested key words to
narrow down the scope of newspaper search. Those functions can help public military
intelligence contributors who are not very familiar with the Boolean operation, and offer
some researchers who have not idea about the right key words.

6
General daily report
General daily report could be concise, comprehensive and on time. One report is
designed to aim on the certain readers by the particular writers. General daily report
refers to the situation in the whole day, but lacks of long-term strategic information and
analysis. This kind of information can favor the researchers who charge of the short-term
research, but can need more help in analysis activities while the long-term researches
carry on.

One good thing is that general daily report usually exploits primary source, and the
researchers can save time in raw data management. Nonetheless, the researchers should
pay more attention on applying general daily report, because this information can save
the researchers’ energy, but they should pick up some suitable report to match their
purpose-built research. The general daily report can be formulated:

General daily report= comprehensive data+ certain date/timeframe+5 w report (who, what,
where, when, why)+ report whom (1)

Books and periodicals


Books and periodicals have different characteristics respectively, and also have
different ways to process this information. Basically, one book consists of introduction
(úvod), main part (hlavní část) and závěr (conclusion). The introduction explains the
topic of research, and the relation between the question and the structure of each chapter;
the main part demonstrates the readers what the outcome will be produced via crossing
all reference; the conclusion is the complexity of outcome and analysis.2

Regardless of books, the periodicals seem more serious and professional. It is not
thought correctly that book is less professional; however, in truth, the periodicals disscuss
the certain subject or issue very often. The reseachers need to know what periodicals are
highly related with their studies, and they seize the current development or reshape their
researches in this way.

2 Hendl, J. (2005). Kvalitativní výzkum: Základní metody a aplikace. Praha: Portál, s.320. (The
qualitative research: the basic methods and its application)

7
Issue

Topic
Volume number

Date
Title of papers

Author
Essay review

Book review
Commentary

Publisher
Figure 2 the cover of the periodical— intelligence and national security
Source: http://www.informaworld.com/smpp/title~content=g792283661~db=all

Apparently, the periodicals proclaim basic information on the cover, such as issue
number, topic of the periodical, published date, name of author, book review, name of
publisher, volume number, title of papers, essay review, and commentary. These
information from the periodical just matches the method of information collection
strategy—who, what, when, where, and why.

Table 3 the relation between the basic information of periodical and collection strategy
WHO WHAT WHEN WHERE WHY
Issue √
Topic √
Date √
Author √
Book Review √ √ √ √ √
Publisher √ √ √ √
Volume number √
Essay review √ √ √
Commentary √ √ √ √ √

In theory, public military intelligence contributors collect OSD and OSINF, and
process them systematically, and will obtain OSINT. Otherwise, however, it is arguable
for public military intelligence contributors to produce OSINT; because neither the
procedure of intelligence providing nor data collection or distinguishing is familiar with
every public military intelligence contributor. On the contrary, the public military
intelligence contributor, who employs the procedure of intelligence producing, may
confuse the military intelligence services; therefore not every public military intelligence
contributor should undertake the last phase of intelligence cycle.

8
2. The architecture of e-interaction
The architecture of e-interaction is based on three tools and one concept. The tools are
Intellipedia, Blog and WWW, and particularly Blog and WWW are suggested to operate
with the search engine—Rollyo, which is a self-organised search engine. In addition, the
concept is e-interaction, and this activity need basing on Internet among PC users. Since
Robert Metcalfe invented Internet, Metcalfe’s Law has been domination in the field of
communication, and this law has also impacted on intelligence community, particularly
military intelligence. In Metcalfe’s term, communication is interaction, and it is no
limitation of immigration.

However, in military intelligence term, communication needs identification as well as


Internet application. It is very obvious that interaction among military entities has to
satisfy several conditions; as well, the interaction between military and civilian also needs
particular requirements. Having regard of broad application of Internet, military
intelligence services should create the conditions and requirements to establish civilian-
military interaction and cooperation over Internet under good Internet safety.

It is believed that technology enhances the effectiveness of military activities, but it


complicates the activities of military intelligence, either. Having argued that, civilian-
military cooperation and interaction would be the trend to remove the fog of intellignce in
the activities of military intelligence.

2.1. Intellipedia
In general, intelligence should come from all sources, and it is named ASINT (All
Source Intelligence); in detail, ASINT consists of OSINT and SECINT (Secret Source
intelligence). Having abovementioned OSINT, SECINT is quiet different among them,
and its authorship and ownership often belongs to national authorities. SECINT is
formidable for public military intelligence contributors, and instead OSINT could be
possible and available for them. Based on this principle and condition, Intellipedia
bridges military staffs and civilian in the activities of military intelligence.

D. Calvin Andrus wrote, “We must transform the Intelligence Community into a
community that dynamically reinvents itself by continuously learning and adapting as the
national security environment changes.”3 Andrus and his superiors broke the limitation
and boundary of the intelligence community and officers, and succeeded to invent
Intellipedia via the concept of Wikipedia. “Wiki” is the vocabulary of Hawaiian, and it
means fast; according to the concept of fast, the U.S. intelligence community gather
intelligence not only fast and tremendously.

Intellipedia characterises self-organised and interactive as the core of intelligence


cooperation between civilians and military. Intellipedia is maintained by the network
infrastructure—DNI-U, and it needs VPN desktop application and the web browser,
which is SSL-enabled. In addtion, Intellipedia is a platform of intelligence sharing and

3 Andrus, D. C. (2005). The wiki and the blog. Intelligence, 49(3) 2.

9
cooperation; definitely, the system welcomes U.S. natives, foreigners, civilians and
military to be a military intelligence contributor. Surely, Intellipedia grants different
access for various groups; in case, potential threat damages national security.

Figure 3 The complex system of personal adaptive behaviours


Source: Andrus, D. C. (2005). The wiki and the blog. Intelligence, 49(3)

The basic idea of intelligence management in Intellipeida is that this graphic depicts
these six characteristics. From simple, self-organized personal relationships emerges
complex adaptive behavior. Information from the external environment enters the system
and impinges on the on these relationships as either positive or negative feedback. The
personal relationships are changed and the complex behavior adapts.4

Intellipedia is the driver that changes the nature of intelligence. Andrus applies
Melcalfe’s Law to proof the change, and it is persuasive for intelligence officers to
establish the mode of civilian-military cooperation in the activities of military intelligence
over Internet.

Figure 4 The curve of Melcalfe’s Law on Critical Mass


Source: Andrus, D. C. (2005). The wiki and the blog. Intelligence, 49(3)

2.2. (Blog+WWW) Rollyo

4 Ibid, 9

10
Blog and WWW are very familiar with PC users, who are military lovers or fans; as
usual, they can exploit search engine to discover whatever they need, such like google or
yahoo. However, mass irrelative data wastes time and resource; therefore designing own
search engine become a new trend among Internet users. Here comes the formula, and it
demonstrates the author’s idea for military intelligence contributors:

(Blog+WWW) Rollyo (2)

The outlook of Rollyo is as the same as other search engines for PC users, but its
function is certainly various among them. In particular, Rollyo specialises in customised
search engines; via Rollyo, PC users can add or delete favorite web address or blog, and
seek target information. Having said that, Rollyo can search the content of blog or web
pages automatically, instead of looking up manually. Rollyo brings the vital importance
for public military intelligence contributors, because they should not spend more time to
find military data or information than before; furthermore, they strengthen the percentage
of target information under the frame of customised search engines.

Figure 4 The outlook of Rollyo


Source: http://rollyo.com/

Give a name of this


customised search engine

Add or delete
blogs or web
papers

Figure 5 The key function of Rollyo


Source: http://rollyo.com/

For instance, one PC user would update the news of google’s products among google
users in the world; eventually, they publish that news on their blogs or web pages.

11
Nevertheless, it cannot be possible to view every blog or web page; Instead of that, PC
users can apply Rollyo for the latest news of google products. All the same, public
military intelligence contributors can also exploit Rollyo to discover the latest or valuable
information.

Key in “google”

The relative results of


google are coming up in
the web pages or blogs

Figure 6 The result of Rollyo exploitation


Source: http://rollyo.com/

3. Quid pro quo, Pro and Con


In this paper, it is an obvious argument that e-interaction can shape military
intelligence management, and even can be a new trend of the nature of intelligence.
Theoretically and practically, e-interaction of military intelligence management could
generate positive and negative influence or impact respectively; no doubt, e-interaction
points out the two key elements—real-time and quantity.

Having agreed that, fast, the latest and tremendous data could support the system of
military intelligence; on the contrary, unqualified or non-verified data can reserve the
original and health military intelligence. “To be or not to be, that is a question.” However,
aut viam inveniam aut faciam and dulce bellum inexpertis can trigger a meaningful
discussion with this matter.

3.1. aut viam inveniam aut faciam


“aut viam inveniam aut faciam” (I'll either find a way or make one) has been one of
the hot issues on military intelligence recently; as we know, military intelligence
management needs shaping again in order to face new challenge in the 21 st century.
User’s identification and the safety of the e-interaction system are the vital factors on the
topic of shaping military intelligence management. Although user’s identification can be
supervised, it is still difficult to be notified of user’s real background somehow;
particularly, this user is on the purpose of cheating or tricking.

In addition, the safety of Internet between military intelligence services and home PCs
is still in the centre of people’s concern; more and more ghost networks or PCs penetrate
the Internet system of military intelligence services or PC users lack of Internet security.
Like intelligence, PC viruses or programme destroyers could foster collapse of e-
interaction; furthermore, e-interaction could become e-leaking in the aftermath of PC or

12
Internet infection. Even though a few disadvantages cannot benefit in the aftermath, e-
interaction is becoming the new trend of military intelligence management.

For example, the first time chlorine was used in an improvised explosive device in
Iraq, someone created a wiki page asking what intelligence officers and others in the field
should do to collect evidence of the usage. “Twenty-three people at 18 or 19 locations
around the world chimed in on this thing, and we got a perfectly serviceable set of
instructions in two days,” says Tom Fingar, who headed the National Intelligence Council
from 2005 to 2008.5 On the contrary, when Tom Fingar tried in 2006 to produce an NIE
on Nigeria using Intellipedia, he failed because it generated a stream of information
rather than a formal thesis and was taken over by the traditional system. 6 Whether
consequence or effort is brought for military intelligence community, the e-interaction has
been a role in the activities of military intelligence management.

3.2. dulce bellum inexpertis


“dulce bellum inexpertis” (war is sweet to those who have never fought) is a real
lesson for on-the-spot military intelligence officers; some of them are afraid that e-
interaction could not balance quality and quantity of military intelligence. Moreover, they
are scared of intelligence leaking, and that could be a butterfly effect to expose their
identification; worst of all, that consequence may damage their lives. From the
perspective of military intelligence officers, it is a long journey to educate person to be
sensible to military intelligence.

In peace time, misuse of military intelligence may be corrected without injuries, but by
contrast, that incident costs military intelligence officer’s life in war time. At the same
time, it is more complicated to develop or execute e-interaction in the battlefield; in
particular, how one military intelligence receiver and contributor functions e-interaction
while escalation into war. That could be a critical problem to deal with in e-interaction.

4. Conclusion
Open source produces useful and valuable intelligence, and Internet enriches the
effectiveness of data collection. Melcalfe’s Law indicates Critical Mass, and it also paves
the way to broaden intelligence activities. E-interaction emphasises the mode of civilian-
military cooperation in military intelligence, but it also triggers military intelligence’s
worry, but it appeals to public military intelligence contributors. High speed and broad
variety of information are the special characteristics, but personal identification and
Internet safety worry military intelligence officers or expose informers.

5 Calabresi, M. (2009). Wikipedia for spies: The CIA discovers web 2.0. Retrieved April 2,
2009, from http://www.time.com/time/nation/article/0,8599,1890084,00.html

6 Ibid.

13
Whether advantage or disadvantage is coming up to military intelligence, but it is
believed that Melcalfe’s Law has changed the nature of military intelligence, and e-
interaction provides a new approach for data collectors. Having believed that, the
approach of military intelligence gathering has changed definitely, but the safety and
personal identification will be a setback or critical issue in military intelligence
management.

14
References

Amason, A. C., & Schweiger, D. M. (1997). The effects of conflict on strategic decision
making effectiveness and organizational performance. Using Conflict in
Organizations,

Anderson, P. A. (1983). Decision making by objection and the cuban missile crisis.
Administrative Science Quarterly, 28(2), 201-222.

Andrus, D. C. (2005). The wiki and the blog. Intelligence, 49(3)

Barnard, C. I. The functions of the executive Harvard University Press.

Ben-Yashar, R., & Nitzan, S. (1998). Quality and structure of organizational decision-
making. Journal of Economic Behavior and Organization, 36(4), 521-534.

Bernhardt, D. (2002). Competitive intelligence : How to acquire and use corporate


intelligence and counter-intelligence. Harlow: Financial Times Prentice Hall.

Björn Müller-Wille. (2006). Intelligence and domestic accountability: A blessing, not a


curse. European Security, 15(4), 491-506.

Conrath, D. W. (1967). Organizational decision making behavior under varying


conditions of uncertainty. Management Science, 13(8), 487-500.

DRUMMOND, H. (1994). Escalation in organizational decision making. Journal of


Behavioral Decision Making, 7, 55.

Eisenhardt, K. M., & Zbaracki, M. J. (1992). Strategic decision making. Strategic


Management Journal, 13, 17-37.

Goldschmidt, E. Open source intelligence: Sources methods, and questions. Presentation


at Harvard University (may 7, 2004),

Grandori, A. (1984). A prescriptive contingency view of organizational decision making.


Administrative Science Quarterly, 29(2), 192-209.

Huber, G. P. (1981). The nature of organizational decision making and the design of
decision support systems. MIS Quarterly, 5(2), 1-10.

Huber, G. P., & McDaniel, R. R. (1986). The decision-making paradigm of organizational


design. Management Science, 32(5), 572-589.

Jordan, A. A., Taylor, William J. , Jr., & Mazarr, M. J. (1999). American national security
(5th ed.). Maryland: the John Hopkins University Press.

15
Koltuksuz, A., & Tekir, S. (2006). Intelligence analysis modeling. Proceedings of the
2006 International Conference on Hybrid Information Technology-Volume 01, , 146-
151.

Lin, Z., & Carley, K. (1997). Organizational decision making and error in a dynamic task
environment. Journal of Mathematical Sociology, 22(2), 125-150.

Lowenthal, M. (1998). Open source intelligence: New myths, new realities. Special
Report from Open Source Solutions,

Manickam, R. N. (2001). Security, espionage, and counter intelligence. New Delhi:


Manas Publications.

Mayes, B. T., & Allen, R. W. (1977). Toward a definition of organizational politics. The
Academy of Management Review, 2(4), 672-678.

Memon, N., Hicks, D., & Esbensen, K. (2008). Special edition on open source
intelligence and web mining. International Journal of Networking and Virtual
Organisations (IJNVO),

Papadakis, V. M., Lioukas, S., & Chambers, D. (1998). Strategic decision‐making


processes: The role of management and context. Strategic Management Journal,
19(2), 115-147.

Pinfield, L. T. (1986). A field evaluation of perspectives on organizational decision


making. Administrative Science Quarterly, 31(3), 365-388.

Rues, R., & Kunz, P. J. (2003). Corporate open source intelligence on the internet.
Proceedings of 2nd European Conference on Information Warfare and Security:
University of Reading, 30th June-1st July 2003.,

Saveri, A., & Rheingold, H. (2005). Rapid decision making for complex issues: How
technologies of cooperation can help.

Shapira, Z. (2002). Organizational decision making Cambridge University Press


Cambridge.

Singh, J. V. (1986). Performance, slack, and risk taking in organizational decision


making. The Academy of Management Journal, 29(3), 562-585.

Stalder, F., & Hirsh, J. (2002). Open source intelligence. First Monday, 7(6)

Umphress, D. A. (2005). Diving the digital dumpster: The impact of the internet on
collecting open-source intelligence. Air & Space Power Journal, 19(4), 82-91.

Versions, A. Open source intelligence (OSINT): Issues for congress.

16

You might also like