Information Challenges in Federated Analysis

August 2008 No Comments

Overcoming Information Challenge in Federated Analysis: From Concepts to Practice. Author | Editor: Canna, S. (NSI, Inc). The Overcoming Information Challenge in Federated Analysis: from Concepts to Practice workshop, held on 27-28 August 2008, was convened in response to requests from US Special Operations Command and US Strategic Command, Lieutenant General Carter F. Ham, Director […]

Continue Reading

Unconventional Challenges in the Human Domain

April 2008 No Comments

The Human Domain: The Unconventional Collection and Analysis Challenge Workshop. Author | Editor: Canna, S. & Popp, R. (NSI, Inc). One of the major challenges the US has faced during the opening decades of the 21st Century is the growth in the number and international reach of insurgents, terrorists, WMD proliferators and other sorts of […]

Continue Reading

Social Science Modeling and Visualization

February 2008 No Comments

Social Science Modeling and Information Visualization Workshop. Author | Editor: Canna, S. & Popp, R. (NSI, Inc). The Social Science Modeling and Information Visualization Workshop provided a unique forum for bringing together leading social scientists, researchers, modelers, and government stakeholders in one room to discuss the state-of-the-art and the future of quantitative/computational social science (Q/CSS) […]

Continue Reading

Deterrence in the 21st Century: Volume III

October 2007 No Comments

Deterrence in the 21st Century: An Effects-Based Approach in an Interconnected World Volume III. Author | Editor: Chesser, N. (DTI). Supporting material for Volume II — Deterrence Typology, which was created to assist in the development of deterrence options and plans for State and Non-State Actors.   Download Publication

Continue Reading

Deterrence in the 21st Century: Volume II

October 2007 No Comments

Deterrence in the 21st Century: An Effects-Based Approach in an Interconnected World Volume II – Typologies. Author | Editor: Chesser, N. (DTI). This Deterrence Typology was created to assist in the development of deterrence options and plans for State and Non-State Actors. It can be used as a stand alone document for identifying important information […]

Continue Reading

Deterrence in the 21st Century: Volume I

October 2007 No Comments

Deterrence in the 21st Century: An Effects-Based Approach in an Interconnected World Volume I. Author | Editor: Chesser, N. (DTI). This report summarizes the results from a 120-day effort that was undertaken to meet these challenges. A scope of the effort is provided by Lt Col Shannahan in section 1; namely, decision makers, policy makers […]

Continue Reading

Moral Emotions – Predicting Political Attitudes

January 2007 No Comments

The role of moral emotions in predicting political attitudes about post-war Iraq. Author: Polansky (Pagano), S. & Huo, Y. J. Abstract A web-based study of 393 undergraduates at a public university in the United States was conducted to examine the relationship between moral emotions (i.e., emotions that motivate prosocial tendencies) and support for political actions […]

Continue Reading

Counter Terrorism Through Information Technology

December 2006 No Comments

Countering Terrorism Through Information Technology Author: Popp, R. et al. September 11, 2001 might have been just another day if the U.S. intelligence agencies had been better equipped with information technology, according to the report of Congress’s Joint Inquiry into the events leading up to the Sept. 11 attacks. The report claims that enough relevant […]

Continue Reading

Countering Terrorism with IT and Privacy Protection

November 2006 No Comments

Countering Terrorism through Information and Privacy Protection Technologies Author: Popp, R. & Poindexter, J. Abstract Security and privacy aren’t dichotomous or conflicting concerns—the solution lies in developing and integrating advanced information technologies for counterterrorism along with privacy-protection technologies to safeguard civil liberties. Coordinated policies can help bind the two to their intended use. The terrorist […]

Continue Reading

Information Technologies for Countering Terrorism

January 2006 No Comments

Emergent Information Technologies and Enabling Policies for Counter-Terrorism. Editors: Popp, R. & Yen, J. This book explores both counter-terrorism and enabling policy dimensions of emerging information technologies in national security. After the September 11th attacks, “connecting the dots” has become the watchword for using information and intelligence to protect the United States from future terrorist […]

Continue Reading