Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
Few professions have experienced change to the same extent as has intelligence. Since the 9/11 attacks, the role of intelligence has continued to grow, and its mission remains complex. Government and private security agencies are recruiting intelligence analysts in ever higher numbers to process what has become a voluminous amount of raw information and data. Methods of Inquiry for Intelligence Analysis offers students the means of gaining the analytic skills essential to undertake intelligence work, and the understanding of how intelligence fits into the larger research framework. It covers…mehr
Few professions have experienced change to the same extent as has intelligence. Since the 9/11 attacks, the role of intelligence has continued to grow, and its mission remains complex. Government and private security agencies are recruiting intelligence analysts in ever higher numbers to process what has become a voluminous amount of raw information and data. Methods of Inquiry for Intelligence Analysis offers students the means of gaining the analytic skills essential to undertake intelligence work, and the understanding of how intelligence fits into the larger research framework. It covers not only the essentials of applied research, but also the function, structure, and operational methods specifically involved in intelligence work.
Die Herstellerinformationen sind derzeit nicht verfügbar.
Autorenporträt
Hank Prunckun is an adjunct associate research professor with the Australian Graduate School of Policing and Security, Charles Sturt University, Sydney. He is the author of Counterintelligence Theory and Practice and Methods of Inquiry for Intelligence Analysis.
Inhaltsangabe
Chapter 1 Intelligence Theory Chapter 2 Intelligence Organizational Structures Chapter 3 The Intelligence Research Process Chapter 4 Clandestine and Covert Sources of Information Chapter 5 Open Sources of Information Chapter 6 Qualitative Analytics Chapter 7 Quantitative Analytics Chapter 8 Geointelligence Chapter 9 Target Profiles Chapter 10 Operational Assessments Chapter 11 Vehicle Route Security Report Chapter 12 Threat Assessments Chapter 13 Vulnerability Assessments Chapter 14 Risk Assessments Chapter 15 National Security Policy Assessments Chapter 16 Appendix-Critical Values of Chi-Square Distribution Chapter 17 About the Author Chapter 18 Index