Target Practice
暂无分享,去创建一个
[1] Michael C. Horowitz,et al. Separating Fact from Fiction in the Debate over Drone Proliferation , 2016, International Security.
[2] Peter L. Bergen,et al. Drone wars : transforming conflict, law, and policy , 2014 .
[3] W. Carter. Networks of Rebellion: Explaining Insurgent Cohesion and Collapse , 2015 .
[4] J. Lindsay. Reinventing the Revolution: Technological Visions, Counterinsurgent Criticism, and the Rise of Special Operations , 2013 .
[5] Roger Petersen,et al. Resistance and Rebellion: Lessons from Eastern Europe , 2001 .
[6] Keith L. Shimko. The Iraq Wars and America's Military Revolution: The Third Iraq War, 2003–? – A Revolution Denied? , 2010 .
[7] Katherine A. Austin,et al. Living Under Drones : Death , Injury and Trauma to Civilians from US Drone Practices in Pakistan , 2012 .
[8] Jacob N. Shapiro,et al. Correspondence: Assessing the Synergy Thesis in Iraq , 2013, International Security.
[9] T. Searle. Tribal Engagement in Anbar Province: The Critical Role of Special Operations Forces , 2008 .
[10] Alex S. Wilner,et al. Targeted Killings in Afghanistan: Measuring Coercion and Deterrence in Counterterrorism and Counterinsurgency , 2010 .
[11] Michal Handel,et al. Clausewitz, intelligence, uncertainty and the art of command in military operations , 1995 .
[12] Michael S. Galloucis. The Gamble: General David Petraeus and the American Military Adventure in Iraq, 2006-2008 , 2009 .
[13] Jenna Jordan,et al. Attacking the Leader, Missing the Mark: Why Terrorist Groups Survive Decapitation Strikes , 2014, International Security.
[14] Dennis L. Sepper. Being-in-the-World: A Commentary on Heidegger’s Being and Time, Division I , 1991 .
[15] A. K. Cronin. How al-Qaida Ends: The Decline and Demise of Terrorist Groups , 2006, International Security.
[16] J. R. Griffin,et al. The Closed World: Computers and the Politics of Discourse in Cold War America , 2000 .
[17] L. Anderson. Analytic Autoethnography , 2006 .
[18] Herbert R McMaster,et al. Crack in the Foundation Defense Transformation and the Underlying Assumption of Dominant Knowledge in Future War , 2003 .
[19] Niel Smith,et al. ANBAR AWAKENS: The Tipping Point , 2008 .
[20] P. N. Edwards. A Vast Machine: Computer Models, Climate Data, and the Politics of Global Warming , 2010 .
[21] Wiebe E. Bijker,et al. Science in action : how to follow scientists and engineers through society , 1989 .
[22] Nina A. Kollars. Military Innovation's Dialectic: Gun Trucks and Rapid Acquisition , 2014 .
[23] A. Tsing,et al. Friction: An Ethnography of Global Connection by Anna Lowenhaupt Tsing , 2009, Transforming Anthropology.
[24] Sean Lawson. Nonlinear Science and Warfare: Chaos, complexity and the U.S. military in the information age , 2013 .
[25] A. Clark,et al. The Extended Mind , 1998, Analysis.
[26] A. Long. The Soul of Armies: Counterinsurgency Doctrine and Military Culture in the US and UK , 2016 .
[27] B. Latour. 10 ''Where Are the Missing Masses? The Sociology of a Few Mundane Artifacts'' , 1992 .
[28] Gregory S. McNeal. Targeted Killing and Accountability , 2014 .
[29] S. Shapin. HERE AND EVERYWHERE: Sociology of Scientific Knowledge , 1995 .
[30] J. Overhage,et al. Sorting Things Out: Classification and Its Consequences , 2001, Annals of Internal Medicine.
[31] Monika Richter,et al. Cognition In The Wild , 2016 .
[32] J OrlikowskiWanda. Using Technology and Constituting Structures , 2000 .
[33] Michael T. Flynn,et al. Employing ISR SOF Best Practices , 2008 .
[34] Keith L. Shimko. The Iraq Wars and America's Military Revolution: Contents , 2010 .
[35] K. Sterelny. Externalism, Epistemic Artefacts and The Extended Mind , 2004 .
[36] William F. Mullen,et al. Fallujah Redux: The Anbar Awakening and the Struggle with Al-Qaeda , 2014 .
[37] Christine L Borgman,et al. Science friction: Data, metadata, and collaboration , 2011, Social studies of science.
[38] A. Cobb. My Share of the Task: A Memoir , 2013 .
[39] Diane Vaughan,et al. The Challenger Launch Decision: Risky Technology, Culture, and Deviance at NASA , 1996 .
[40] J. Sumida. Decoding Clausewitz: A New Approach to On War , 2008 .
[41] J. Lindsay. "War upon the Map": User Innovation in American Military Software , 2010 .
[42] Derek Jones,et al. Understanding the Form, Function, and Logic of Clandestine Cellular Networks: The First Step in Effective Counternetwork Operations , 2012 .
[43] S. Stephenson. A CHANCE IN HELL: The Men Who Triumphed over Iraq's Deadliest City and Turned the Tide of the War , 2011 .
[44] S. Kalyvas,et al. The logic of violence in civil war , 2011 .
[45] Barry D. Watts. Clausewitzian Friction and Future War, Revised Edition , 2004 .
[46] Keven G. Ruby,et al. Attacking the Leader, Missing the Mark , 2014 .
[47] J. Ferris. Netcentric Warfare, C4ISR and Information Operations: Towards a Revolution in Military Intelligence? , 2004 .
[48] Stephen D. Biddle. Speed kills? Reassessing the role of speed, precision, and situation awareness in the Fall of Saddam , 2007 .
[49] Peter Galison. Secrecy in Three Acts , 2014 .
[50] Linda Robinson,et al. Masters of Chaos: The Secret History of the Special Forces , 2004 .
[51] Bill Owens,et al. Lifting the Fog of War , 2000 .
[52] Hugh Gusterson,et al. Drone: Remote Control Warfare , 2016 .
[53] Lucy Suchman,et al. Human-Machine Reconfigurations: Plans and Situated Actions , 2006 .
[54] T. Pinch,et al. Users as Agents of Technological Change: The Social Construction of the Automobile in the Rural United States , 1996, Technology and Culture.
[55] Scott Snook,et al. Friendly Fire: The Accidental Shootdown of U.S. Black Hawks over Northern Iraq , 2002 .
[56] S. Jasanoff. Contested Boundaries in Policy-Relevant Science , 1987 .
[57] Ray J. Paul,et al. The Labyrinths of Information: Challenging the Wisdom of Systems , 2005, Eur. J. Inf. Syst..
[58] Dunlap,et al. Lawfare Today: A Perspective , 2008 .
[59] Washington D C,et al. Central Intelligence Agency , 2019, The SAGE Encyclopedia of Criminal Psychology.
[60] Anna Simons. The Company they Keep : Life Inside the U.S. Army Special Forces , 1998 .
[61] Scott A. Snook,et al. Friendly Fire: The Accidental Shootdown of U.S. Black Hawks over Northern Iraq , 2001 .
[62] Jamie C. Allinson,et al. The Necropolitics of Drones , 2015 .
[63] K. Weick. FROM SENSEMAKING IN ORGANIZATIONS , 2021, The New Economic Sociology.
[64] D. Ihde. Technology and the lifeworld : from garden to earth , 1991 .
[65] K. Weick,et al. Collective mind in organizations: Heedful interrelating on flight decks. , 1993 .
[66] M. Boyle. The costs and consequences of drone warfare , 2013 .
[67] W. Orlikowski. Using Technology and Constituting Structures: A Practice Lens for Studying Technology in Organizations , 2000 .
[68] Christine Reid,et al. The Myth of the Paperless Office , 2003, J. Documentation.
[69] James A. Russell,et al. Relentless strike: the secret history of Joint Special Operations Command , 2017 .
[70] Patrick B. Johnston,et al. Foundations of the Islamic State: Management, Money, and Terror in Iraq, 2005-2010 , 2016 .
[71] Minna Räsänen,et al. The Raw is Cooked , 2013 .
[72] Richard J. Harknett. The risks of a networked military , 2000 .
[73] Andrea J. Dew,et al. Insurgents, Terrorists, and Militias: The Warriors of Contemporary Combat , 2006 .
[74] Wanda J. Orlikowski,et al. Using Technology and Constituting Structures: A Practice Lens for Studying Technology in Organizations , 2000, Theory in CSCW.
[75] A. Long. The Anbar Awakening , 2008 .
[76] Jacob N. Shapiro,et al. Testing the Surge: Why Did Violence Decline in Iraq in 2007? , 2012, International Security.
[77] C. Wilke. Seeing and Unmaking Civilians in Afghanistan , 2017 .
[78] J. Lloyd,et al. A Theory of the Drone , 2015 .
[79] Charles E. Costanzo. Whole World on Fire: Organizations, Knowledge, and Nuclear Weapons Devastation , 2004 .
[80] John M. Silvester,et al. The Social Life of Information: Brown, J.S., & Duguid, P. (2000). Cambridge, MA: Harvard Business School Publishing. ISBN 0-87584-762-5. 320 pages , 2000, Internet High. Educ..
[81] K. Menninger. On war. , 1973, Bulletin of the Menninger Clinic.
[82] Audrey Kurth Cronin. Chapter 7. The Strategic Implications of Targeted Drone Strikes for US Global Counterterrorism (Audrey Kurth Cronin) , 2015 .
[83] W. Andrew Terrill,et al. Innovation, Transformation, and War: Counterinsurgency Operations in Anbar and Ninewa Provinces, Iraq, 2005-2007 , 2011 .
[84] J. Krige. How Users Matter: The Co-Construction of Users and Technology , 2006 .
[85] A. Beyerchen. Clausewitz, Nonlinearity, and the Unpredictability of War , 1992 .
[86] Bradley Jay Strawser,et al. Killing by remote control : the ethics of an unmanned military , 2013 .
[87] Patrick B. Johnston,et al. The Impact of US Drone Strikes on Terrorism in Pakistan and Afghanistan , 2016 .
[88] B. Strawser. Moral Predators: The Duty to Employ Uninhabited Aerial Vehicles , 2010 .
[89] G. Hodge. The American Way of Bombing: Changing Ethical and Legal Norms, from Flying Fortresses to Drones , 2015 .
[90] Timothy S. Wolters. Information at Sea: Shipboard Command and Control in the U.S. Navy, from Mobile Bay to Okinawa , 2013 .
[91] Stuart A. Herrington. The Great Game: The Myth and Reality of Espionage , 2005 .
[92] Stephanie Carvin,et al. The Trouble with Targeted Killing , 2012 .
[93] F. X. Bergmeister. The Marines Take Anbar: The Four-Year Fight Against al Qaeda, by Richard H. Shultz Jr. , 2013 .
[94] Jessika Schulze,et al. Between Human And Machine Feedback Control And Computing Before Cybernetics , 2016 .
[95] Julian Kiverstein,et al. Out of our Heads: Why You Are Not Your Brain, and Other Lessons from the Biology of Consciousness , 2010 .
[96] Thomas E. Griffith,et al. Winning with Allies: The Strategic Value of the Afghan Model , 2005, International Security.
[97] D. Jacobson,et al. Studying Those Who Study Us: An Anthropologist in the World of Artificial Intelligence , 2003 .
[98] A. Long. Whack-a-Mole or Coup de Grace? Institutionalization and Leadership Targeting in Iraq and Afghanistan , 2014 .
[99] Christopher J. Lamb,et al. Secret Weapon: High-value Target Teams as an Organizational Innovation , 2011 .
[100] J. Lindsay,et al. Varieties of Insurgency and Counterinsurgency in Iraq, 2003-2009 , 2012 .
[101] Timothy M Cullen,et al. The MQ-9 Reaper remotely piloted aircraft : humans and machines in action , 2011 .
[102] Paul Virilio. War and cinema : the logistics of perception , 1991 .
[103] Ulrike Schultze,et al. A Confessional Account of an Ethnography About Knowledge Work , 2000, MIS Q..
[104] Jessica L. Hart. A Chance in Hell: The Men Who Triumphed Over Iraq's Deadliest City and Turned the Tide of War Surging South of Baghdad: the 3D Infantry Division and Task Force Marne in Iraq 2007-2008 The Good Soldiers , 2012 .
[105] David Tucker,et al. United States Special Operations Forces , 2007 .
[106] Morris Janowitz,et al. Changing Patterns of Organizational Authority: The Military Establishment , 1959 .
[107] John McCary,et al. The Anbar Awakening: An Alliance of Incentives , 2009 .
[108] Daniel Byman,et al. Do Targeted Killings Work , 2006 .
[109] Maik Moeller,et al. Spec Ops Case Studies In Special Operations Warfare Theory And Practice , 2016 .
[110] Robert Bitmead,et al. Our Robots, Ourselves: Robotics and the Myths of Autonomy [Bookshelf] , 2016, IEEE Control Systems.
[111] Sean Naylor,et al. Not a Good Day to Die: The Untold Story of Operation Anaconda , 2005 .
[112] Robert A. Fein,et al. Educing Information: Interrogation: Science and Art, Foundations for the Future, Intelligence Science Board, Phase 1 Report , 2006 .
[113] Rob Johnston. Analytic Culture in the U.S. Intelligence Community: An Ethnographic Study , 2012 .
[114] A. Long,et al. Innovation, Transformation, and War: Counterinsurgency Operations in Anbar and Ninewa Provinces, 2005-2007 (review) , 2011 .
[115] Patrick B. Johnston. Does Decapitation Work? Assessing the Effectiveness of Leadership Targeting in Counterinsurgency Campaigns , 2012, International Security.