Spies Wearing Purple Hats: The use of social computing to improve information sharing inside the Intelligence Community of the United States
暂无分享,去创建一个
[1] Nikhil Swamy,et al. Language-based Enforcement of User-defined Security Policies (As Applied to Multi-tier Web Programs) , 2008 .
[2] Gregory J. L. Tourte,et al. Twitter, information sharing and the London riots? , 2012 .
[3] Michael E. Raynor,et al. The Innovator's Solution: Creating and Sustaining Successful Growth , 2003 .
[4] Clayton M. Christensen. The Innovator's Dilemma: When New Technologies Cause Great Firms to Fail , 2013 .
[5] Joseph R. Cerami,et al. Rethinking Leadership and Whole of Government National Security Reform: Problems, Progress, and Prospects , 2010 .
[6] Andrew McAfee,et al. Enterprise 2.0: the dawn of emergent collaboration , 2006, IEEE Engineering Management Review.
[7] Tim O'Reilly,et al. What is Web 2.0: Design Patterns and Business Models for the Next Generation of Software , 2007 .
[8] Stansfield Turner. Intelligence for a New World Order , 1991 .
[9] David Osimo. Web 2.0 in Government: Why and How? , 2008 .
[10] John Hale,et al. Toward sensitive information redaction in a collaborative, multilevel security environment , 2010, Int. Sym. Wikis.
[11] Thomas Fingar,et al. Reducing Uncertainty: Intelligence Analysis and National Security , 2011 .
[12] Andrew McAfee,et al. Enterprise 2.0: New Collaborative Tools for Your Organization's Toughest Challenges , 2009 .
[13] Mark M. Lowenthal,et al. Intelligence: From Secrets to Policy , 2005 .
[14] JEFFREY R. COOPER. Curing Analytic Pathologies: Pathways to Improved Intelligence Analysis , 2005 .
[15] Amy Zegart. September 11 and the Adaptation Failure of U.S. Intelligence Agencies , 2005, International Security.
[16] Jae-Hyeon Ahn,et al. Reward systems for intra-organizational knowledge sharing , 2007, Eur. J. Oper. Res..
[17] James Surowiecki. The wisdom of crowds: Why the many are smarter than the few and how collective wisdom shapes business, economies, societies, and nations Doubleday Books. , 2004 .
[18] M. Lowenthal. Towards a Reasonable Standard for Analysis: How Right, How Often on Which Issues? , 2008 .
[19] G. Hickman. Leading Change in Multiple Contexts: Concepts and Practices in Organizational, Community, Political, Social, and Global Change Settings , 2009 .
[20] R. Kostoff,et al. Disruptive technology roadmaps , 2004 .
[21] A. Chomik. Making Friends in Dark Shadows: An Examination of the Use of Social Computing Strategy Within the United States Intelligence Community Since 9/11 , 2011 .
[22] S. Buckley,et al. The Prime Minister and Cabinet , 2006 .
[23] Diana Gosálvez Prados,et al. Six ways to make Web 2.0 work , 2009 .
[24] A. Kaplan,et al. Users of the world, unite! The challenges and opportunities of Social Media , 2010 .
[25] Richard J. Harknett,et al. The Struggle to Reform Intelligence after 9/11 , 2011 .