Spies Wearing Purple Hats: The use of social computing to improve information sharing inside the Intelligence Community of the United States

[1]  Nikhil Swamy,et al.  Language-based Enforcement of User-defined Security Policies (As Applied to Multi-tier Web Programs) , 2008 .

[2]  Gregory J. L. Tourte,et al.  Twitter, information sharing and the London riots? , 2012 .

[3]  Michael E. Raynor,et al.  The Innovator's Solution: Creating and Sustaining Successful Growth , 2003 .

[4]  Clayton M. Christensen The Innovator's Dilemma: When New Technologies Cause Great Firms to Fail , 2013 .

[5]  Joseph R. Cerami,et al.  Rethinking Leadership and Whole of Government National Security Reform: Problems, Progress, and Prospects , 2010 .

[6]  Andrew McAfee,et al.  Enterprise 2.0: the dawn of emergent collaboration , 2006, IEEE Engineering Management Review.

[7]  Tim O'Reilly,et al.  What is Web 2.0: Design Patterns and Business Models for the Next Generation of Software , 2007 .

[8]  Stansfield Turner Intelligence for a New World Order , 1991 .

[9]  David Osimo Web 2.0 in Government: Why and How? , 2008 .

[10]  John Hale,et al.  Toward sensitive information redaction in a collaborative, multilevel security environment , 2010, Int. Sym. Wikis.

[11]  Thomas Fingar,et al.  Reducing Uncertainty: Intelligence Analysis and National Security , 2011 .

[12]  Andrew McAfee,et al.  Enterprise 2.0: New Collaborative Tools for Your Organization's Toughest Challenges , 2009 .

[13]  Mark M. Lowenthal,et al.  Intelligence: From Secrets to Policy , 2005 .

[14]  JEFFREY R. COOPER Curing Analytic Pathologies: Pathways to Improved Intelligence Analysis , 2005 .

[15]  Amy Zegart September 11 and the Adaptation Failure of U.S. Intelligence Agencies , 2005, International Security.

[16]  Jae-Hyeon Ahn,et al.  Reward systems for intra-organizational knowledge sharing , 2007, Eur. J. Oper. Res..

[17]  James Surowiecki The wisdom of crowds: Why the many are smarter than the few and how collective wisdom shapes business, economies, societies, and nations Doubleday Books. , 2004 .

[18]  M. Lowenthal Towards a Reasonable Standard for Analysis: How Right, How Often on Which Issues? , 2008 .

[19]  G. Hickman Leading Change in Multiple Contexts: Concepts and Practices in Organizational, Community, Political, Social, and Global Change Settings , 2009 .

[20]  R. Kostoff,et al.  Disruptive technology roadmaps , 2004 .

[21]  A. Chomik Making Friends in Dark Shadows: An Examination of the Use of Social Computing Strategy Within the United States Intelligence Community Since 9/11 , 2011 .

[22]  S. Buckley,et al.  The Prime Minister and Cabinet , 2006 .

[23]  Diana Gosálvez Prados,et al.  Six ways to make Web 2.0 work , 2009 .

[24]  A. Kaplan,et al.  Users of the world, unite! The challenges and opportunities of Social Media , 2010 .

[25]  Richard J. Harknett,et al.  The Struggle to Reform Intelligence after 9/11 , 2011 .