3,780
Views
3
CrossRef citations to date
0
Altmetric
Articles

Cyber Intelligence Networks: A Typology

Redes de ciberinteligencia: una tipología

&
Pages 4-24 | Received 27 Jul 2018, Accepted 09 Feb 2019, Published online: 17 Apr 2019

References

  • Allison, G. T. (1971). Essence of decision: Explaining the Cuban missile crisis. New York, NY: HarperCollins Publishers.
  • Carr, M. (2016). Public–Private partnerships in national cyber-security strategies. International Affairs, 92(1), 43–62. doi:10.1111/inta.2016.92.issue-1
  • Claver, A. (2018). Governance of cyber warfare in the Netherlands: An exploratory investigation. The International Journal of Intelligence, Security, and Public Affairs, 20(2), 155–180. doi:10.1080/23800992.2018.1484235
  • Clough, C. (2004). Quid pro quo: The challenges of international strategic intelligence cooperation. International Journal of Intelligence and CounterIntelligence, 17(4), 601–613. doi:10.1080/08850600490446736
  • Cozine, K. (2016). Fragmentation and interdependency: Border security intelligence in North America and Europe. The International Journal of Intelligence, Security, and Public Affairs, 18(3), 175–197. doi:10.1080/23800992.2016.1242268
  • U. S. DoD (2016). Joint publication 1-02: Department of defense dictionary of military and associated terms. Washington, D.C: Joint Staff.
  • Gill, P., & Phythian, M. (2006). Intelligence in an insecure world. Cambridge, MA: Polity Press.
  • Gill, P., & Phythian, M. (2016). What is intelligence studies? The International Journal of Intelligence, Security, and Public Affairs, 18(1), 5–19. doi:10.1080/23800992.2016.1150679
  • Harknett, R. J., & Stever, J. A. (2009). The cybersecurity triad: Government, private sector partners, and the engaged cybersecurity citizen. Journal of Homeland Security and Emergency Management, 6(1), article 79.
  • James, A., Phythian, M., Wadie, F., & Richards, J. (2017). The road not taken: Understanding barriers to the development of police intelligence practice. The International Journal of Intelligence, Security, and Public Affairs, 19(2), 77–91. doi:10.1080/23800992.2017.1336395
  • Jasper, S. E. (2017). U.S. cyber threat intelligence sharing frameworks. International Journal of Intelligence and CounterIntelligence, 30(1), 53–65. doi:10.1080/08850607.2016.1230701
  • Kalkman, J. P., & De Waard, E. J. (2017). Inter-organizational disaster management projects: Finding the middle way between trust and control. International Journal of Project Management, 35(5), 889–899. doi:10.1016/j.ijproman.2016.09.013
  • Kalkman, J. P., & Groenewegen, P. (2018). On frontline workers as bureau-political actors: The case of civil–military crisis management. Administration & Society, Online first doi:10.1177/0095399718780581.
  • Kalkman, J. P., Kerstholt, J. H., & Roelofs, M. (2018). Crisis response team decision‐making as a bureau‐political process. Journal of Contingencies and Crisis Management, 26(4), 480–490. doi:10.1111/jccm.2018.26.issue-4
  • Ketokivi, M., & Mantere, S. (2010). Two strategies for inductive reasoning in organizational research. The Academy of Management Review, 35, 315–333.
  • Lasoen, K. L. (2017). For Belgian eyes only: Intelligence cooperation in Belgium. International Journal of Intelligence and CounterIntelligence, 30(3), 464–490. doi:10.1080/08850607.2017.1297110
  • Lefebvre, S. (2003). The difficulties and dilemmas of international intelligence cooperation. International Journal of Intelligence and CounterIntelligence, 16(4), 527–542. doi:10.1080/716100467
  • Libicki, M. C. (2009). Cyberdeterrence and cyberwar. Santa Monica, CA: RAND Corporation.
  • Manjikian, M. (2015). But my hands are clean: The ethics of intelligence sharing and the problem of complicity. International Journal of Intelligence and CounterIntelligence, 28(4), 692–709. doi:10.1080/08850607.2015.1051411
  • Mattern, T., Felker, J., Borum, R., & Bamford, G. (2014). Operational levels of cyber intelligence. International Journal of Intelligence and CounterIntelligence, 27(4), 702–719. doi:10.1080/08850607.2014.924811
  • Meakins, J. I. (2018). Squabbling Siloviki: Factionalism within Russia’s security services. International Journal of Intelligence and CounterIntelligence, 31(2), 235–270. doi:10.1080/08850607.2018.1417525
  • NCTV. (2017). Cybersecuritybeeld Nederland CSBN2017. Den Haag, The Netherlands: Author.
  • Parkes, A. (2017). Lessons through reform: Australia’s security intelligence. The International Journal of Intelligence, Security, and Public Affairs, 19(3), 157–170. doi:10.1080/23800992.2017.1384675
  • Pascovich, E. (2017). Security and intelligence studies in Israel. The International Journal of Intelligence, Security, and Public Affairs, 19(2), 134–148. doi:10.1080/23800992.2017.1336402
  • Rudner, M. (2013). Cyber-threats to critical national infrastructure: An intelligence challenge. International Journal of Intelligence and CounterIntelligence, 26(3), 453–481. doi:10.1080/08850607.2013.780552
  • Seagle, A. N. (2015). Intelligence sharing practices within NATO: An english school perspective. International Journal of Intelligence and CounterIntelligence, 28(3), 557–577. doi:10.1080/08850607.2015.1022468
  • Shore, J. J. M. (2015). An obligation to act: Holding government accountable for critical infrastructure cyber security. International Journal of Intelligence and CounterIntelligence, 28(2), 236–251. doi:10.1080/08850607.2014.962356
  • Sloan, S. (2006). The new terrorist threat environment. Continuity and change in counter-terrorism intelligence. In P. Katona, M. D. Intriligator & J. P. Sullivan (Eds.), Countering terrorism and WMD: Creating a global counter-terrorism network (pp. 199–211). New York, NY: Routledge.
  • Stouder, M. D., & Gallagher, S. (2013). Crafting operational counterintelligence strategy: A guide for managers. International Journal of Intelligence and CounterIntelligence, 26(3), 583–596. doi:10.1080/08850607.2013.780560
  • Strachan-Morris, D. (2009). The future of civil–military intelligence cooperation based on lessons learned in Iraq. Intelligence and National Security, 24(2), 257–274. doi:10.1080/02684520902819669
  • Tikk, E. (2011). Ten rules for cyber security. Survival, 53(3), 119–132. doi:10.1080/00396338.2011.571016
  • Trim, P. R. J. (2001). Public–Private partnerships in the defence industry and the extended corporate intelligence and national security model. Strategic Change, 10, 49–58. doi:10.1002/(ISSN)1099-1697
  • Trim, P. R. J. (2003). Public and private sector cooperation in counteracting cyberterrorism. International Journal of Intelligence and CounterIntelligence, 16(4), 594–608. doi:10.1080/716100471
  • Velasco, F. (2016). Editorial. The International Journal of Intelligence, Security, and Public Affairs, 18(1), 1–4. doi:10.1080/23800992.2016.1150681
  • Velasco, F. (2017). Intelligence as a bet. The International Journal of Intelligence, Security, and Public Affairs, 19(1), 1. doi:10.1080/23800992.2017.1290372
  • Vestermark, T. (2017). International intelligence Liaison in the Afghan theatre of war: Strategic interests and hierarchical relations. The International Journal of Intelligence, Security, and Public Affairs, 19(2), 112–133. doi:10.1080/23800992.2017.1336400
  • Vogel, K. M., Jameson, J. K., Tyler, B. B., Joines, S., Evans, B. M., & Rendon, H. (2017). The importance of organizational innovation and adaptation in building academic–industry–intelligence collaboration: Observations from the laboratory for analytic sciences. The International Journal of Intelligence, Security, and Public Affairs, 19(3), 171–196. doi:10.1080/23800992.2017.1384676