Search Results - "research"

Refine Results
  1. 1

    National Intelligence University's role in interagency research : recommendations from the intelligence community / by Johnston, Judith A., Lander, Natasha, McInnis, Brian

    Imprint 2013
    Table of Contents: “…Introduction -- Data collected: interviews and literature -- Findings -- Recommendations -- Appendix A: Interview instrument -- Appendix B: Research entities in the intelligence community.…”
    Access full-text online via JSTOR
    Electronic
  2. 2
  3. 3
  4. 4

    Using social media to gauge Iranian public opinion and mood after the 2009 election

    Imprint 2012
    Table of Contents: “…Introduction -- Methodology -- Background on social media use in Iran and events surrounding the 2009 election -- Overall trends in public mood in Iran after the 2009 presidential election -- Iranian public opinion about specific topics in the aftermath of the 2009 election -- Methodological considerations -- Next steps: a design for a second phase of the this program of research -- Appendix: Additional details regarding methodology: data collection and analysis.…”
    Access full-text online via JSTOR
    Electronic
  5. 5
  6. 6

    Venture capital and strategic investment for developing government mission capabilities by Webb, Timothy, 1936-

    Imprint 2014
    “…Research report (Rand Corporation)…”
    Access full-text online via JSTOR
    Electronic
  7. 7
  8. 8
  9. 9

    Libya's post-Qaddafi transition : the nation-building challenge

    Imprint 2012
    “…RAND Corporation research report series ;…”
    Access full-text online via JSTOR
    Electronic
  10. 10

    Iran after the bomb : how would a nuclear-armed Tehran behave? by Nader, Alireza

    Imprint 2013
    “…Research reports…”
    Access full-text online via JSTOR
    Electronic
  11. 11
  12. 12
  13. 13
  14. 14

    Markets for cybercrime tools and stolen data : hackers' bazaar by Ablon, Lillian, Libicki, Martin C., Abler, Andrea M.

    Imprint 2014
    Table of Contents: “…Introduction and research methodology -- Characteristics of the black market -- The black market and botnets -- Zero-day vulnerabilities in the black and gray markets -- Are hacker black markets mature? …”
    Access full-text online via JSTOR
    Electronic
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19

    The lessons of Mumbai

    Imprint 2009
    Access full-text online via JSTOR
    Electronic
  20. 20