555
Views
1
CrossRef citations to date
0
Altmetric
Research Article

Feminist philosophy and the problem of intelligence analysis: standpoint, measurement, and motivation

Bibliography

  • Anderson, E. “Feminist Epistemology and Philosophy of Science.”The Stanford Encyclopedia of Philosophy E. N. Zalta. ed. 2002. Accessed October 1, 2021. https://plato.stanford.edu/archives/fall2020/entries/epistemology/>
  • Annan, K. “Towards a Culture of Peace.” New York: United Nations. http://www.unesco.org/upi2/;ettres/TextAnglais/AnnanE.html August 27, 2001.
  • Bean, H. “Rhetorical and Critical/Cultural Intelligence Studies.” Intelligence and National Security 28, no. 4 (2013): 495–519.
  • Bean, H. “Intelligence Theory from the Margins: Questions Ignored and Debates Not Had.” Intelligence and National Security 33, no. 4 (2018): 527–540. doi:10.1080/02684527.2018.1452544.
  • Blade, W. “State Department Human Rights Commission Report Largely Omits LGBTQ Issues.” July 17, 2020. <https://www.washingtonblade.com/2020/07/17/state-department-human-rights-commission-report-largely-omits-lgbtq-issues/≥
  • Criado Perez, C. Invisible Women: Data Bias in a World Designed for Men. New York: Abrams Press, 2021.
  • Daggett, C. “Drone Disorientations: How ‘Unmanned’ Weapons Queer the Experience of Killing in War.” International Feminist Journal of Politics 17, no. 3 (2015): 361–379. doi:10.1080/14616742.2015.1075317.
  • Dingli, S. “We Need to Talk about Silence: Re-examining Silence in International Relations Theory.” European Journal of International Relations 2, no. 14 (2015): 721–742. doi:10.1177/1354066114568033.
  • Elshtain, J. B. Women and War. Chicago: University of Chicago Press, 1995.
  • Enloe, C. The Curious Feminist: Searching for Women in the New Age of Empire. Berkeley, CA: University of California Press, 2004.
  • Felthaus, A., S. Samantarai, and A. Muktar. “Gender Differences in Combined Homicide-suicide with Consideration of Female Terrorist Bombers.” Behavioral Sciences & the Law 37, no. 5 (2019): 614–631.
  • Finlayson, L. “How to Screw Things with Words.” Hypatia 29, no. 4 (2014): 774–789. doi:10.1111/hypa.12109.
  • Foucault, M. The Archeology of Knowledge and the Discourse on Language. New York: Routledge, 2002.
  • Gentry, C., and L. Sjoberg. Beyond Mothers, Monsters and Horros: Thinking about Women’s Violence in Global Politics. London: Zed Books, 2015.
  • Gow, G. “How AI Can Go Terribly Wrong: 5 Biases that Create Failure.“ Glenngow.com. How AI Can Go Wrong: 5 Biases That Create Failure - Glenn Gow, November 11, 2020. Accessed May 10, 2022.
  • Harding, S. G. Sciences from Below: Feminisms, Postcolonialities, and Modernities. Durham, NC: Duke University Press, 2008.
  • Inglehart, R., and P. Norris. “The Four Horseman of the Apocalypse: Understanding Human Security.” Scandinavian Political Studies 35, no. 1 (2012): 71–96. doi:10.1111/j.1467-9477.2011.00281.x.
  • Jones, N. “Critical Epistemology for Analysis of Competing Hypotheses.” Intelligence and National Security 33, no. 2 (2018): 273–289. doi:10.1080/02684527.2017.1395948.
  • Kwan, M. “Feminist Visualization: Re-envisioning GIS as a Method in Feminist Geographic Research.” Annals of the Association of American Geographers 92, no. 4 (2002): 645–661. doi:10.1111/1467-8306.00309.
  • Longino, H. “Chapter 14: Feminist Epistemology.” In The Blackwell Guide to Epistemology, edited by J. Greco and E. Sosa. Oxford, UK: Blackwell, 1999. pp 325-353.
  • Manjikian, M. “Positivism, Post-positivism and Intelligence Analysis.” International Journal of Intelligence and Counterintelligence 26, no. 3 (2013): 563–582. doi:10.1080/08850607.2013.758002.
  • Manjikian, M. “But My Hands are Clean: The Ethics of Intelligence Sharing and the Problem of Complicity.” International Journal of Intelligence and Counterintelligence 28, no. 4 (2015a): 692–709. doi:10.1080/08850607.2015.1051411.
  • Manjikian, M. “Reading Lolita in Langley: The Unreliable Narrator as a Device for considering the Reliability of Intelligence Collection.” Intelligence and National Security 30, no. 5 (2015b): 704–722. doi:10.1080/02684527.2014.890466.
  • Manjikian, M. Gender, Sexuality, and Intelligence Studies: The Spy in the Closet. London: Palgrave Macmillan, 2020.
  • Manjikian, M., A. R. Felthous, S. Samantarai, and A. Mukhtar. “Becoming Unmanned: The Gendering of Lethal Autonomous Warfare Technology.” International Feminist Journal of Politics 16, no. 1 (2014): 48–65. doi:10.1080/14616742.2012.746429.
  • Marrin, S., and J. Clemente. “Improving Intelligence Analysis by Looking to the Medical Profession.” International Journal of Intelligence and Counterintelligence 18, no. 4 (20052006): 707–729. doi:10.1080/08850600590945434.
  • Marway, H. “Women and Sublime Superwomen: Exploring Portrayals of Female Suicide Bomber’s Agency.” Journal of Global Ethics 7, no. 3 (2011): 221–240. doi:10.1080/17449626.2011.635677.
  • Mawati, M. “The Meaning and Measurement of Poverty: A Look into the Global Debate” Unpublished Manuscript, Philadelphia. The University of Pennsylvania: dg_paper.doc (upenn.edu).
  • McCue, C. Data Mining and Predictive Analytics: Intelligence Gathering and Crime Analysis. Second edition. ed. New York: Butterworth-Heinemann, 2006.
  • Mibenge, C. S. Sex and International Tribunals: The Erasure of Gender from the War Narrative. University of Pennsylvania Press, 2013. Accessed March 24, 2021. http://www.jstor.org/stable/j.ctt3fj2p2.
  • National Commission on Terrorist Attacks Upon the United States. Final Report of the National Commission on Terrorist Attacks Upon the United States. Washington, DC: Norton, 2004.
  • Norris, P. “Young People & Political Activism.” Unpublished Manuscript. Download Citation of Young People & Political Activism (Researchgate.net) (2004).
  • Pape, R. Dying to Win: The Strategic Logic of Suicide Terrorism. New York: Random House, 2006.
  • Ragan, V. G. J. Women Suicide Bombers: Narratives of Violence. New York: Routledge, 2011.
  • Rolin, K. “The Bias Paradox in Feminist Standpoint Epistemology.” Episteme 3, no. 1 (2006): 125–136. doi:10.3366/epi.2006.3.1-2.125.
  • Schweitzer, Y. “Palestinian Female Suicide Bombers: Virtuous Heroines or Damaged Goods?” In Militancy: Agency, Utility, and Organization, edited by N. Cindy. New York: Routledge, 2008. pp. 130-145.
  • Simoni, T. “Machines Taught by Photos Learn a Sexist View of Women” Wired August 21, 2017 Machines Learn a Biased View of Women WIRED
  • Speckhard, A. “The Emergence of Female Suicide Terrorists.” Studies in Conflict and Terrorism 31, no. 11 (2008): 995–1023. doi:10.1080/10576100802408121.
  • Steup, M., and R. Neta. “Epistemology.”The Stanford Encyclopedia of Philosophy E. Zalta. ed. 2020. Accessed October 1, 2021. https://plato.stanford.edu/archives/fall2020/entries/epistemology/.
  • Tessler, M., and M. D. H. Robbins. “What Lead Some Ordinary Arab Men and Women to Approve of Terrorist Acts against the United States?” The Journal of Conflict Resolution 51, no. 2 (2007): 305–328. doi:10.1177/0022002706298135.
  • Todosijevic, B. “Failed Promises of Modernization: Religion, Postmaterialism and Ethno-nationalist Attitudes in the Netherlands.” Unpublished Conference Paper. ECPR Workshop “Moral values, cultural change and post-materialism in Europe and North America”, Lisbon, 14-19 April 2009.
  • Treverton, G. Intelligence for an Age of Terror. New York: Cambridge University Press, 2011.
  • Weber, C. Queer International Relations: Sovereignty, Sexuality, and the Will to Knowledge. New York, NY: Oxford University Press, 2011.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.