The GISES Model for Counteracting Organized Crime and International Terrorism
暂无分享,去创建一个
[1] R. Orr. Governing when chaos rules: Enhancing governance and participation , 2002 .
[2] Kimberley L. Thachuk. Terrorism's Financial Lifeline: Can It Be Severed? Strategic Forum. Number 191, May 2002 , 2002 .
[3] Patrice M. Franko. Toward a New Security Architecture in the Americas: The Strategic Implications of the FTAA , 2000 .
[4] Peter R.J. Trim,et al. An integrative approach to disaster management and planning , 2004 .
[5] John Arquilla,et al. Networks, netwar, and information-age terrorism , 1999 .
[6] Susan L. Hodgett,et al. Conceptualising community: policy implications for Atlantic Canada , 2003 .
[7] Stéphane Lefebvre,et al. The Difficulties and Dilemmas of International Intelligence Cooperation , 2003 .
[8] William J. Lahneman. Knowledge-Sharing in the Intelligence Community After 9/11 , 2004 .
[9] Thomas M. Sanderson,et al. Transnational Terror and Organized Crime: Blurring the Lines , 2004 .
[10] Malcolm Higgs. Building an effective team , 1996 .
[11] Jason D. Ellis. The best defense: Counterproliferation and U.S. national security , 2003 .
[12] Dan Verton,et al. Black Ice: The Invisible Threat of Cyber-Terrorism , 2003 .
[13] R. Pech. Developing a leadership knowledge architecture: a cognitive approach , 2003 .
[14] Jean‐François Rischard,et al. Global issues networks: Desperate times deserve innovative measures , 2002 .
[15] B. Boxer. Providing basic human security , 2003 .
[16] Michael A. Turner. A Distinctive U.S. Intelligence Identity , 2004 .
[17] Vana Prewitt,et al. Leadership development for learning organizations , 2003 .
[18] William J. Lahneman. Outsourcing the IC's Stovepipes? , 2003 .
[19] Anthony H. Cordesman,et al. Cyber-Threats, Information Warfare, and Critical Infrastructure Protection: Defending the U.S. Homeland , 2001 .
[20] Ray Takeyh,et al. Do terrorist networks need a home? , 2002 .
[21] Maria L. Banda,et al. Congruence, Conflict, and Continental Governance: Canada's and Mexico's Responses to Paradigm Shift in the United States , 2004 .
[22] R. McMahon. Changing the organization but maintaining the culture: The centrality of organizational mission to the reform process. An overview of the United States Environmental Protection Agency and the Environment Agency for England and Wales , 2004 .
[23] Roy Rempel. Canada's Parliamentary Oversight of Security and Intelligence , 2004 .
[24] Ronald J. Deibert. Deep Probe: The Evolution of Network Intelligence , 2003 .
[25] John J. Maresca. A new concept of business , 2000 .
[26] Peter R.J. Trim,et al. Disaster management and the role of the intelligence and security services , 2003 .
[27] Kostas S. Metaxiotis,et al. Knowledge and information management in e-learning environments; the user agent architecture , 2002, Inf. Manag. Comput. Secur..
[28] Stéphane Lefebvre,et al. A Look at Intelligence Analysis , 2004 .
[29] Peter R. J. Trim. Public and Private Sector Cooperation in Counteracting Cyberterrorism , 2003 .
[30] John Sterling,et al. Translating strategy into effective implementation: dispelling the myths and highlighting what works , 2003 .
[31] M. Moore. Creating public value : strategic management in government , 1995 .
[32] Stephen Marrin. Preventing Intelligence Failures by Learning from the Past , 2004 .
[33] Kurt M. Campbell. Nuclear proliferation beyond rogues , 2002 .
[34] P. J. Kennedy,et al. Scenario planning after 9/11: managing the impact of a catastrophic event , 2003 .
[35] Nick Bontis,et al. Transformational leadership : an examination of cross-national differences and similarities , 2003 .
[36] S. Borins,et al. Leadership and innovation in the public sector , 2002 .
[37] S. Weintraub. Disrupting the financing of terrorism , 2001 .
[38] J. H. Hansen. U.S. Intelligence Confronts the Future , 2004 .
[39] F. P. Hitz,et al. Helping the CIA and FBI Connect the Dots in the War on Terror , 2004 .
[40] David H. Mason,et al. Scenarios and strategies: making the scenario about the business , 2003 .
[41] P. Strachan. Managing transformational change: the learning organization and teamworking , 1996 .
[42] Philip B. Heymann,et al. Terrorism, Freedom, and Security: Winning Without War , 2003 .
[43] The use and limits of U.S. intelligence , 2001 .
[44] Jerry Yoram Wind,et al. Driving Change: How the Best Companies Are Preparing for the 21st Century , 1998 .