Bibliography
- Ackerman, R. K. “Seeing Is Believing for Artificial Intelligence.” Signal, August 21, 2017. https://www.afcea.org/content/seeing-believing-artificial-intelligence.
- Aiello, J. R., and K. J. Kolb. “Electronic Performance Monitoring and Social Context: Impact on Productivity and Stress.” Journal of Applied Psychology 80 (1995): 339–353. doi:https://doi.org/10.1037/0021-9010.80.3.339.
- Allen, G. C. “Project Maven Brings AI to the Fight against ISIS.” Bulletin of the Atomic Scientists (December 21, 2017): 1–7. https://thebulletin.org/2017/12/project-maven-brings-ai-to-the-fight-against-isis/
- Amick, B. C., and M. J. Smith. “Stress, Computer-Based Work Monitoring and Measurement Systems: A Conceptual Overview.” Applied Ergonomics 23 (1992): 6–16. doi:https://doi.org/10.1016/0003-6870(92)90005-G.
- Andrejevic, M., and K. Gates. “Big Data Surveillance: Introduction.” Surveillance and Society 12, no. 2 (2014): 185–196. doi:https://doi.org/10.24908/ss.v12i2.5242.
- Aradau, C., and T. Blanke. “The (Big) Data-Security Assemblage: Knowledge and Critique.” Big Data and Society 2, no. 2 (2015): 1–12. doi:https://doi.org/10.1177/2053951715609066.
- Bernstein, E. “The Transparency Paradox: A Role for Privacy in Organizational Learning and Operational Control.” Administrative Science Quarterly 57, no. 2 (2012): 181–216. doi:https://doi.org/10.1177/0001839212453028.
- Bijker, W. E., T. P. Hughes, and T. Pinch, eds. The Social Construction of Technological Systems. Cambridge, MA: MIT Press, 1987.
- Bowen, G. A. “Naturalistic Inquiry and the Saturation Concept: A Research Note.” Qualitative Research 8, no. 1 (2008): 137–152. doi:https://doi.org/10.1177/1468794107085301.
- Bowker, G. C., and S. L. Star. Sorting Things Out: Classification and Its Consequences. Cambridge, MA: MIT Press, 1999.
- Boyd, D., and K. Crawford. “Critical Questions for Big Data: Provocations for a Cultural, Technological, and Scholarly Phenomenon.” Information, Communication, & Society 15, no. 5 (2012): 662–679. doi:https://doi.org/10.1080/1369118X.2012.678878.
- Brantley, A. F. “When Everything Becomes Intelligence: Machine Learning and the Connected World.” Intelligence and National Security 33, no. 4 (2018): 562–573. doi:https://doi.org/10.1080/02684527.2018.1452555.
- Buchalter, E. “Ideas in Science: An Ethnographic Study.” PhD diss., University College London, 2014.
- Caplan, R., J. Donovan, L. Hanson, and J. Matthews. “Algorithmic Accountability: A Primer.” April 18, 2018. https://datasociety.net/library/algorithmic-accountability-a-primer/
- Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction. Report to the President. Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction (unt.edu). March 31, 2005.
- Cooper, J. R. Curing Analytic Pathologies. Washington, DC: Center for the Study of Intelligence/Central Intelligence Agency, December, 2005. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/curing-analytic-pathologies-pathways-to-improved-intelligence-analysis-1/analytic_pathologies_report.pdf
- Cortada, J. The Digital Flood. Oxford: Oxford University Press, 2012.
- Crawford, K., and R. Calo. “There Is a Blind Spot in AI Research.” Nature 538 (13 October 2016): 7625. doi:https://doi.org/10.1038/538311a
- Crow, G., and R. Wiles. 2008. “Managing Anonymity and Confidentiality in Social Research: The Case of Visual Data in Community Research.” ESRC National Centre for Research Methods, NCRM Working Paper Series, August 8. http://eprints.ncrm.ac.uk/459/1/0808_managing%2520anonymity%2520and%2520confidentiality.pdf
- Davis, J. “Why Bad Things Happen to Good Analysts.” In Analyzing Intelligence: National Security Practitioners’ Perspectives, edited by R. Z. George and J. B. Bruce, 121–134. 2nd ed. Washington, DC: Georgetown University Press, 2014.
- Dibley, L. “Analyzing Narrative Data Using McCormack’s Lenses.” Nurse Researcher 18, no. 3 (2011): 13–19. doi:https://doi.org/10.7748/nr2011.04.18.3.13.c8458.
- Dourish, P. “Developing a Reflective Model of Collaborative Systems.” ACM Transactions on Computer-Human Interaction 2, no. 1, March (1995): 41. doi:https://doi.org/10.1145/200968.200970.
- Drupal. “Government Warning.” October 31. Accessed December 2, 2014. https://www.drupal.org/project/government_warning
- Duelfer, C. Comprehensive Report of the Special Advisor to the DCI on Iraq’s WMD. Comprehensive Report of the Special Advisor to the DCI on Iraq’s WMD — Central Intelligence Agency, September 30, 2004.
- Eriksson, G. Swedish Military Intelligence: Producing Knowledge. Edinburgh: Edinburgh University Press, 2016.
- Ferneley, E., P. Sobreperez, and J. Stevens. “Management Information or Trompe L’Oeil? Resistance to Workplace Surveillance.” PACIS 2004 Proceedings, Paper 78, 2004. http://aisel.aisnet.org/pacis2004/78.
- Fingar, T. “Building a Community of Analysts.” In Analyzing Intelligence: National Security Practitioners’ Perspectives, edited by R. Z. George and J. B. Bruce, 287–302. 2nd ed. Washington, DC: Georgetown University Press, 2014.
- Fiore-Gartland, B., and G. Neff. “Communication, Mediation, and the Expectations of Data: Data Valences across Health and Wellness Communities.” International Journal of Communication 9 (2015): 1466–1484.
- Friedman, B., and H. Nissenbaum. “Bias in Computer Systems.” ACM Transactions on Information Systems 14, no. 3 (1996): 330–347. doi:https://doi.org/10.1145/230538.230561.
- Fusch, P. I., and L. R. Ness. “Are We There Yet? Data Saturation in Qualitative Research.” The Qualitative Report 20, no. 9 (2015): 1408–1416. http://www.nova.edu/ssss/QR/QR20/9/fusch1.pdf.
- Galison, P. “Removing Knowledge.” Critical Inquiry 31 (2004): 229–243. doi:https://doi.org/10.1086/427309.
- Gannon, J. C. “Managing Analysis in the Information Age.” In Analyzing Intelligence: Origins, Obstacles, and Innovation, edited by R. Z. George and J. B. Bruce, 213–225. Washington: Georgetown University Press, 2008.
- Gentry, J. A. “Managers of Analysts: The Other Half of Intelligence Analysis.” Intelligence and National Security 31, no. 2 (2016): 154–177. doi:https://doi.org/10.1080/02684527.2014.961244.
- Gentry, J. A. “Intelligence Analyst/Manager Relations at the CIA.” Intelligence and National Security 10, no. 4 (1995): 133–145. doi:https://doi.org/10.1080/02684529508432329.
- Gillespie, T. “The Platform Metaphor, Revisited.” Digital Society Blog, August 24, 2017. https://www.hiig.de/en/the-platform-metaphor-revisited/
- Gosler, J. R. “The Digital Dimension.” In Transforming U.S. Intelligence, edited by J. E. Sims and B. Gerber, 96–114. Washington, DC: Georgetown University Press, 2005.
- Greenwald, G. No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State. New York: Metropolitan Books, 2014.
- Guest, G., A. Bunce, and L. Johnson. “How Many Interviews are Enough? An Experiment with Data Saturation and Variability.” Field Methods 18, no. 1 (2006): 59–82. doi:https://doi.org/10.1177/1525822X05279903.
- Hackman, R. J. Collaborative Intelligence: Using Teams to Solve Hard Problems. San Francisco: Barrett-Koehler, 2011.
- Hare, N., and P. Coghill. “The Future of the Intelligence Analysis Task.” Intelligence and National Security 31, no. 6 (2016): 858–870. doi:https://doi.org/10.1080/02684527.2015.1115238.
- Hedley, J. H. “Learning from Intelligence Failures.” International Journal of Intelligence and Counterintelligence 18, no. 3 (2005): 435–450. doi:https://doi.org/10.1080/08850600590945416.
- Heuer, R. J., Jr. The Psychology of Intelligence Analysis. Washington, DC: Center for the Study of Intelligence, CIA, 1999. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/psychology-of-intelligence-analysis/index.html.
- Introna, L. D. “Workplace Surveillance, Privacy, and Distributive Justice.” ACM SIGCAS Computers and Society 30, no. 4, December (2000): 33–39. doi:https://doi.org/10.1145/572260.572267.
- Jameson, J., B. Tyler, K. M. Vogel, and S. Joines, eds. Facilitating Interdisciplinary Collaboration among the Intelligence Community, Academy, and Industry. Newcastle upon Tyne, UK: Cambridge Scholars Publishing, 2020.
- Jervis, R. Why Intelligence Fails: Lessons from the Iranian Revolution and the Iraq War. Ithaca, NY: Cornell University Press, 2010.
- Johnston, C., E. C. Wright Jr., J. Bice, J. Almendarez, and L. Creekmore. “Transforming Defense Analysis.” Joint Force Quarterly 79, no. 1 October (2015). https://ndupress.ndu.edu/JFQ/Joint-Force-Quarterly-79/Article/621117/transforming-defense-analysis/.
- Johnston, R. Analytic Culture in the U.S. Intelligence Community: An Ethnographic Study. Washington, DC: Center for the Study of Intelligence, Central Intelligence Agency, 2005. https://www.cia.gov/library/center-forthe-study-of-intelligence/csi-publications/books-andmonographs/analytic-culture-in-the-u-s-intelligencecommunity/analytic_culture_report.pdf.
- Kerr, R., T. Wolfe, R. Donegan, and A. Pappas. “Issues for the U.S. Intelligence Community: Collection and Analysis on Iraq.” Studies in Intelligence 49, no. 3 (2005). https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol49no3/html_files/Collection_Analysis_Iraq_5.htm.
- Laboratory for Analytic Sciences. “2018 LAS Research Symposium.” Poster presented at the annual symposium of the Laboratory for Analytic Sciences, December 12, 2018. https://ncsu-las.org/wp-content/uploads/2019/01/2018-LAS-Symposium-Abstract-Book-and-Posters.pdf
- Laboratory for Analytic Sciences. “2019 LAS Collaborators Day.” Presentation, June 12, 2019. https://ncsu-las.org/2019-las-collaborators-day/
- Lawrence, P. R., and J. W. Lorsch. “Differentiation and Integration in Complex Organizations.” Administrative Science Quarterly 12, no. 1 (1967): 1–47. doi:https://doi.org/10.2307/2391211.
- Lee, M. K. “Understanding Perception of Algorithmic Decisions: Fairness, Trust, and Emotion in Response to Algorithmic Management.” Big Data & Society 5, no. 1 (2018): 1–16. doi:https://doi.org/10.1177/2053951718756684.
- Levy, K. E. C. “The Contexts of Control: Information, Power, and Truck-Driving Work.” The Information Society 31, no. 2 (2015): 160–174. doi:https://doi.org/10.1080/01972243.2015.998105.
- Lyons, D. Surveillance after Snowden. Cambridge: Polity, 2015.
- Masco, J. “Boundless Informant: Insecurity in the Age of Ubiquitous Surveillance.” Anthropological Theory 17, no. 3 (2017): 382–403. doi:https://doi.org/10.1177/1463499617731178.
- Mateescu, A., and A. Nguyen. “Algorithmic Management in the Workplace.” February, 2019. https://datasociety.net/wp-content/uploads/2019/02/DS_Algorithmic_Management_Explainer.pdf
- Medsker, L. “AI Transparency and Accountability.” AI Matters, June 1, 2017. https://sigai.acm.org/aimatters/blog/2017/06/01/algorithmic-transparency-and-accountability/
- Moore, P., and L. Piwek. “Regulating Wellbeing in the Brave New Quantified Workplace.” Employee Relations 39, no. 3 (2017): 308–316. doi:https://doi.org/10.1108/ER-06-2016-0126.
- Moore, P. V. The Quantified Self in Precarity: Work, Technology and What Counts. Abingdon, UK: Routledge, 2018.
- Morris, N., and B. Balmer. “Volunteer Human Subjects’ Understandings of Their Participation in a Biomedical Research Experiment.” Social Science & Medicine 62, no. 4, February (2006): 998–1008. doi:https://doi.org/10.1016/j.socscimed.2005.06.044.
- The National Commission. The 9/11 Commission Report. National Commission on Terrorist Attacks Upon the United States (unt.edu), 2004.
- Neff, G., A. Tanweer, B. Fiore-Gartland, and L. Osburn. “Critique and Contribute: A Practice-Based Framework for Improving Critical Data Studies and Data Science.” Big Data 5, no. 2 (2017): 85–97. doi:https://doi.org/10.1089/big.2016.0050.
- Nissenbaum, H. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford, CA: Stanford University Press, 2009.
- Nolan, B. “Information Sharing and Collaboration in the United States Intelligence Community: An Ethnographic Study of the National Counterterrorism Center.” Unpublished diss., 2013.
- Nolan, B. “Ethnographic Research in the U.S. Intelligence Community: Opportunities and Challenges.” Secrecy and Society 2, no. 1 (2018): 1–31. doi:https://doi.org/10.31979/2377-6188.2018.020105.
- Office of the Director of National Intelligence. “Performance Management Requirements for the Intelligence Community Civilian Workforce.” Intelligence Community Directive Number 651, November 28, 2007. https://www.dni.gov/files/ODNI/joint_duty/policies_and_forms/ICD_651_PerformanceManagementSystemReqfortheICCivWorkforce_Amnd_4Apr12_Cmbd.pdf
- Office of the Director of National Intelligence. “Performance Management Requirements for the Intelligence Community Senior Civilian Officers.” Intelligence Community Directive 656, April 28, 2008. https://www.dni.gov/files/documents/ICD/ICD_656.pdf
- Office of the Director of National Intelligence. “Vision 2015: A Globally Networked and Integrated Intelligence Enterprise.” July 30, 2008. https://www.hsdl.org/?abstract&did=487577
- Office of the Director of National Intelligence. “IARPA Launches ‘MOSAIC’ Program to Better Assess the Intelligence Community Workforce.” IARPA Launches “MOSAIC” Program to Better Assess the Intelligence Community Workforce (dni.gov), September 11, 2017.
- Office of the Director of National Intelligence. “The AIM Initiative: A Strategy for Augmenting Intelligence Using Machines.” January 16, 2019. https://www.dni.gov/index.php/newsroom/reports-publications/item/1940-the-aim-initiative-a-strategy-for-augmenting-intelligence-using-machines
- Pellerin, C. “Project Maven to Deploy Computer Algorithms to War Zone by Year’s End.” DoD News, July 21, 2017. https://www.defense.gov/Explore/News/Article/Article/1254719/project-maven-to-deploy-computer-algorithms-to-war-zone-by-years-end/
- Pherson, R. H., and M. Joan. “The Essence of Collaboration: The IC Experience.” Pherson Associates, LLC, 2009. http://www.pherson.org/wp-content/uploads/2013/11/06.The-Essence-of-Collaboration.-The-IC-Experience_FINAL.pdf
- The President. “Executive Order 13526—Classified National Security Information Memorandum of December 29, 2009—Implementation of the Executive Order ‘Classified National Security Information’ Order of December 29, 2009—Original Classification Authority.” Presidential Documents. Federal Register, January 5, 2010. https://www.archives.gov/files/isoo/policy-documents/cnsi-eo.pdf
- Priest, D., and W. Arkin. Top Secret America: The Rise of the New American Security State. New York: Little, Brown and Company, 2012.
- Räsänen, M., and J. M. Nyce. “The Raw Is Cooked: Data in Intelligence Practice.” Science, Technology, & Human Values 38, no. 5 (2013): 655–677. doi:https://doi.org/10.1177/0162243913480049.
- Regens, J. L. “Augmenting Human Cognition to Enhance Strategic, Operational, and Tactical Intelligence.” Intelligence and National Security 34, no. 5 (2019): 673–687. doi:https://doi.org/10.1080/02684527.2019.1579410.
- Schildt, H. “Big Data and Organizational Design – The Brave New World of Algorithmic Management and Computer Augmented Transparency.” Innovation: Organization & Management 19, no. 1 (2017): 23–30. doi:https://doi.org/10.1080/14479338.2016.1252043.
- Shultz, R. “Post-9/11 Wartime Intelligence Analysis.” Intelligence and National Security 33, no. 7 (2018): 974–998. doi:https://doi.org/10.1080/02684527.2018.1489998.
- Sinclair, R. S. “Thinking and Writing: Cognitive Science and Intelligence Analysis.” Center for the Study of Intelligence, Washington, DC, February, 2010. originally published January 1984. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/Thinking-and-Writing-Feb2010-web.pdf
- Stimson, C., and M. Habeck. “Reforming Intelligence: A Proposal for Reorganizing the Intelligence Community and Improving Analysis.” Heritage Foundation Backgrounder, August 29, 2016. https://www.heritage.org/defense/report/reforming-intelligence-proposal-reorganizing-the-intelligence-community-and#_ftn8
- Symon, P. B., and A. Tarapore. “Defense Intelligence Analysis in the Age of Big Data.” JFQ 79 ( 4th Quarter 2015): 1–8. https://ndupress.ndu.edu/Portals/68/Documents/jfq/jfq-79/jfq-79_4-11_Symon-Tarapore.pdf
- Taylor, J. R., and E. J. Van Every. The Emergent Organization: Communication as Its Site and Surface. Mahwah, NJ: Lawrence Erlbaum, 2000.
- Thorne, B. “‘You Still Takin’ Notes?’ Fieldwork and Problems of Informed Consent.” Social Problems 27 (1980): 284–297. doi:https://doi.org/10.2307/800247.
- Toulmin, S. E. Human Understanding, Vol. 1: The Collective Use and Evolution of Concepts. Oxford: Oxford University Press, 1972.
- Travers, R. “The Coming Intelligence Failure: A Blueprint for Survival.” Studies in Intelligence no. 1. (1997). Accessed June 27, 2008. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/97unclass/failure.html
- Treverton, G. F. New Tools for Collaboration: The Experience of the U.S. Intelligence Community. Lanham, MD: Center for Strategic and International Studies, 2016. https://csis-prod.s3.amazonaws.com/s3fs-public/legacy_files/files/publication/160111_Treverton_NewTools_Web.pdf.
- Turek, M. “Explainable Artificial Intelligence (XAI).” DARPA, Our Research, 2018. https://www.darpa.mil/program/explainable-artificial-intelligence
- Turnley, J. G., L. A. McNamara, and Laura. “An Ethnographic Study of Culture and Collaborative Technology in the Intelligence Community.” Sandia Technical Report, SAND 2007-2593-J, January, 2016.
- Van Puyvelde, D., S. Coulthart, and S. Hossain. “Beyond the Buzzword: Big Data in National Security Decision-Making.” International Affairs 93, no. 6 (2017): 1397–1416. doi:https://doi.org/10.1093/ia/iix184.
- Vogel, K. M. Phantom Menace or Looming Danger?: A New Framework for Assessing Bioweapons Threats. Baltimore: The Johns Hopkins University Press, 2013.
- Vogel, K. M. “Expert Knowledge in Intelligence Assessments: Bird Flu and Bioterrorism.” International Security 38, no. 3 (2013/14): 39–71. doi:https://doi.org/10.1162/ISEC_a_00150. Winter.
- Vogel, K. M., and M. A. Dennis. “Tacit Knowledge, Secrecy, and Intelligence Assessments: STS Interventions by Two Participant-Observers.” Science, Technology, and Human Values 45, no. 5, February (2018): 834–863. doi:https://doi.org/10.1177/0162243918754673.
- Vogel, K. M., and C. M. Knight. “Analytic Outreach for Intelligence: Insights from a Workshop on Emerging Biotechnology Threats.” Intelligence and National Security 30, no. 5 (2015): 686–703. doi:https://doi.org/10.1080/02684527.2014.887633.
- Vogel, K. M., and M. Schmidt, “Algorithms that Empower? Platformization in U.S. Intelligence Analysis.” forthcoming in IEEE ISTAS 20, 2021.
- Vogel, K. M., and B. B. Tyler. “Interdisciplinary, Cross-sector Collaboration in the US Intelligence Community: Lessons Learned from past and Present Efforts.” Intelligence and National Security 34, no. 6, June (2019): 851–880. doi:https://doi.org/10.1080/02684527.2019.1620545.
- Wakabayashi, D., and S. Shane. 2018. “Google Will Not Renew Pentagon Contract That Upset Employees.” New York Times, June 1. https://www.nytimes.com/2018/06/01/technology/google-pentagon-project-maven.html
- Westin, A. F. “Two Key Factors that Belong in a Macroergonomic Analysis of Electronic Monitoring: Employee Perceptions of Fairness and the Climate of Organizational Trust or Distrust.” Applied Ergonomics 23 (1992): 35–42. doi:https://doi.org/10.1016/0003-6870(92)90008-J.
- Wiles, R., G. Crow, S. Heath, and V. Charles. “The Management of Confidentiality and Anonymity in Social Research.” International Journal of Social Research Methodology 11, no. 5, December (2008): 417–428. doi:https://doi.org/10.1080/13645570701622231.
- Yeh, P. F. “The Case for Using Robots in Intelligence Analysis.” Studies in Intelligence 59, no. 4 ( Extracts December, 2015): 1–8. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol-59-no-4/pdfs/Yeh-Automated-Analysis.pdf
- Zuboff, S. In the Age of the Smart Machine: The Future of Work and Power. Basic Books: New York, 1989.