945
Views
6
CrossRef citations to date
0
Altmetric
Article

Information sharing in multinational security and military operations. Why and why not? With whom and with whom not?

&
Pages 37-48 | Received 28 Aug 2018, Accepted 07 Dec 2018, Published online: 07 Jan 2019

References

  • Argyres, N.S., 1999. The impact of information technology on coordination: evidence from the B-2 “Stealth” bomber. Organization science, 10 (2), 162–180. doi:10.1287/orsc.10.2.162
  • Beck, U., 2006. Living in the world risk society. Economy and society, 35 (3), 329–345. doi:10.1080/03085140600844902
  • Burt, R.S., 1995. The social structure of competition. In. In: N. Nohria and R.G. Eccles, eds. Networks and organizations: structure, form and action. Cambridge, MA: Harvard University Press, 57–91.
  • Byrne, D.E., 1971. The attraction paradigm. New York: Academic Press.
  • Chandrasekaran, R., 2012. Little America: the war within the war for Afghanistan. Bloomsbury: London.
  • Chayes, S., 2006. The punishment of virtue: inside Afghanistan after the Taliban. London: Penguin Books.
  • Clough, C., 2004. Quid pro quo: the challenges of international strategic intelligence cooperation. International journal of intelligence and counterintelligence, 17 (4), 601–613. doi:10.1080/08850600490446736
  • Cohen, W.M. and Levinthal, D.A., 1990. Absorptive capacity: a new perspective on learning and innovation. Administrative science quarterly, 35 (1), 128–152. doi:10.2307/2393553
  • Dufresne, R.L. and Offstein, E.H., 2008. On the virtues of secrecy in organizations. Journal of management inquiry, 17 (2), 102–106. doi:10.1177/1056492607313082
  • Giegerich, B., 2012. NATO’s smart defence: who’s buying? Survival, 54 (3), 69–77. doi:10.1080/00396338.2012.690982
  • Goldenberg, I. and Dean, W., 2017. Enablers and barriers to information sharing in military and security operations: lessons learned. In: I. Goldenberg, J. Soeters, and W. Dean, eds. Information sharing in military operations. Cham, Switzerland: Springer International Publishing Switzerland, 251–267.
  • Goldenberg, I., Soeters, J., and Dean, W., eds., 2017. Information sharing in military operations. Cham, Switzerland: Springer International Publishing Switzerland.
  • Granovetter, M., 1973. The strength of weak ties. American journal of sociology, 78 (6), 1360–1380. doi:10.1086/225469
  • Horn, B., 2004. When cultures collide: the conventional military/SOF chasm. Canadian military journal, Autumn, 5, 3–16.
  • Latour, B., 1987. Science in action: how to follow scientists and engineers through society. Cambridge, MA: Harvard University Press.
  • Lumineau, F. and Oliveira, N., 2018. A pluralistic perspective to overcome major blind spots in research on interorganizational relationships. Academy of management annals, 12 (1), 1–25. doi:10.5465/annals.2016.0033
  • Moore, W.E. and Tumin, M.M., 1949. Some social functions of ignorance. American sociological review, 14 (6), 787–795. doi:10.2307/2086681
  • Orlikowski, W., 2010. The sociomateriality of organizational life: considering technology in management research. Cambridge journal of economics, 34 (1), 125–141. doi:10.1093/cje/bep058
  • Resteigne, D. and van den Bogaert, S., 2017. Information sharing in contemporary operations: the strength of SOF ties. In: I. Goldenberg, J. Soeters, and W. Dean, eds. Information sharing in military operations. Cham, Switzerland: Springer International Publishing Switzerland, 51–66.
  • Rietjens, S. and Baudet, F., 2017. Stovepiping within multinational military operations: the case of Mali. In: I. Goldenberg, J. Soeters, and W. Dean, eds. Information sharing in military operations. Cham, Switzerland: Springer International Publishing Switzerland, 201–219.
  • Sheptycki, J., 2004. Organizational pathologies in police intelligence systems: some contributions to the lexicon of intelligence-led policing. European journal of criminology, 1(3), 307-332. doi:101177/1477370804044005
  • Simmel, G., 1906. The sociology of secrecy and secret societies. American journal of sociology, 11, 441–498. doi:10.1086/211418
  • Soeters, J., 2008. Ambidextrous military: coping with contradictions of new security policies. In: M. den Boer and J. de Wilde, eds. The viability of human security. Amsterdam: Amsterdam University Press, 109–124.
  • Soeters, J., 2018. Sociology and military studies: classical and current foundations. New York, USA: Routledge.
  • Soeters, J., in press. Multinational military cooperation: an overview of the current state of affairs. In: M. Elbe, H. Biehl, and M. Steinbrecher, eds. Empirische sozialforschung in den streitkräfte/social research in the armed forces: positions, experiences, controversies.
  • Soeters, J. and Tresch, T. S., 2010. Towards cultural integration in multinational peace operations. Defence studies, 10 (1–2), 272–287. doi:10.1080/14702430903155175
  • Turner, M., 2006. Why secret intelligence fails (rev.ed.). Washington DC: Potomac Books.
  • van den Heuvel, G., 2017. Information sharing in military organizations: a sociomaterial perspective. In: I. Goldenberg, J. Soeters, and W. Dean, eds. Information sharing in military operations. Cham, Switzerland: Springer International Publishing Switzerland, 165–182.
  • Yang, T.-M. and Maxwell, T.A., 2011. Information-sharing in public organizations: a literature review of inter-personal, intra-organizational and inter-organizational success factors. Government information quarterly, 28 (2), 164–175. doi:10.1016/j.giq.2010.06.008
  • Zajac, E.J. and Olsen, C.P., 1993. From transaction cost to transactional value analysis: implications for the study of interorganizational strategies. Journal of management studies, 30 (1), 133–145. doi:10.1111/j.1467-6486.1993.tb00298.x
  • Zerubavel, E., 1997. Social mindscapes: an invitation to cognitive sociology. Cambridge, MA: Harvard University Press.
  • Zerubavel, E., 2018. Taken for granted: the remarkable power of the unremarkable. Princeton and Oxford: Princeton University Press.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.