- DocumentoSocial Media Exploitation for a Combatant Commanderenviado porangryTX
- DocumentoCrowdsourced Decision Support for Emergency Respondersenviado porangryTX
- DocumentoCreating Sof Networksenviado porangryTX
- DocumentoNew Media and the USAFenviado porangryTX
- DocumentoPredicting the Structure of Covert Networks Using Genetic Programming, Cognitive Work Analysis and Social Network Analysis1enviado porangryTX
- DocumentoReal Time News Analysis for Improved Social Relationship Discoveryenviado porangryTX
- DocumentoSocial Media Exploitation for a Combatant Commanderenviado porangryTX
- DocumentoSocial Network Analysis for Homeland Securityenviado porangryTX
- DocumentoThe Influence of Social Media on Crowd Behavior and the Operational Environmentenviado porangryTX
- DocumentoThe Integration of Virtual Public-private Partnerships Into Local Law Enforcement to Achieve Enhanced Intelligence-led Policingenviado porangryTX
- DocumentoThe Struggle for Information Dominance to Reduce Gang Violenceenviado porangryTX
- DocumentoTowards Building Trusted Multinational Civil-Military Relationships Using Social Networksenviado porangryTX
- DocumentoTrust, Opinion Diffusion, And Radicalization in Social Networksenviado porangryTX
- DocumentoUnderstanding and Harnessing the Power of Ideasenviado porangryTX
- DocumentoUnobtrusive Social Network Data Through Emailenviado porangryTX
- DocumentoUtilizing Social Media to Further the Nationwide Suspicious Activity Reporting Initiativeenviado porangryTX
- DocumentoUtilizing Social Network Analysis in Support of Nationbuildingenviado porangryTX
- DocumentoVisual Analysis of Social Networks in Counter-Insurgencyenviado porangryTX
- DocumentoUtilizing Social Media to Further the Nationwide Suspicious Activity Reporting Initiativeenviado porangryTX
- DocumentoA Social Network Analysis of the Iranian Governmentenviado porangryTX
- DocumentoA Qualitative Methodology for Vetting Dark Network Sources for Intelligence Analysisenviado porangryTX
- DocumentoA Dynamic Network Analysis Approach to the Resilience of Terrorist Organizationsenviado porangryTX
- DocumentoA Critical Review of the Implications of Social Networking Sitesenviado porangryTX
- DocumentoFusion Process Program Overview 12-19-12_compliantenviado porangryTX
- DocumentoHSPI Counterterrorism Intelligence - Fusion Center Perspectives 6-26-12enviado porangryTX
- DocumentoFusionenviado porangryTX
- DocumentoBaseline Capabilities for State and Major Urban Area Fusion Centersenviado porangryTX
- DocumentoBoston PD Guidance on Gathering Intelligence via Social Mediaenviado porangryTX
- DocumentoCriminal Intelligence for Front Line Law Enforcementenviado porangryTX
- DocumentoSocial Intelligence to Support Four Core Customer Scenariosenviado porangryTX
- DocumentoSocial Media Intelligence_Taking Monitoring to Taskenviado porangryTX
- DocumentoUnlock the Value of Social Media Data for Business Intelligenceenviado porangryTX
- DocumentoTweeting Crimeenviado porangryTX
- DocumentoCreating Usable Customer Intelligence From Social Mediaenviado porangryTX
- DocumentoUSAF Drone Demand Forecast 2015-2035enviado porangryTX
- DocumentoHarnessing a Network of Experts for Competitive Advantageenviado porangryTX
- DocumentoTerrorist Islamists on the internet highway.pdfenviado porangryTX
- DocumentoAn arab open government maturity model for social media engagement.pdfenviado porangryTX
- DocumentoThe Political effects of rumors and rebuttal in an authoritarian country.pdfenviado porangryTX
- DocumentoUsing Persuasion Factors in Ballot Propositions.pdfenviado porangryTX
- DocumentoUsing The Right to Food as a weapon against climate change.pdfenviado porangryTX
- DocumentoWhy States Need an International Law for Information Operations.pdfenviado porangryTX
- DocumentoLegal issues surrounding transmission of digital assets after death.pdfenviado porangryTX
- DocumentoRegulating antiterror warfare.pdfenviado porangryTX
- DocumentoThe plank in the eye.pdfenviado porangryTX
- DocumentoUnderstanding the dearth of online conservative infrastructure.pdfenviado porangryTX
- DocumentoAccess to information and fragmentation of society.pdfenviado porangryTX
- DocumentoDesigner satellite collisions froma covert cyber war.pdfenviado porangryTX
- Documentoagenda chasing and contests among news providers.pdfenviado porangryTX