Skip to content
You are not logged in |Login  
     
Limit search to available items
Record 10 of 15
Record:   Prev Next
Resources
More Information
Bestseller
BestsellerE-book

Title Intelligence analysis : unclassified area and point estimates (and other intelligence related topics) / John Michael Weaver and Jennifer Pomeroy, editors.

Publication Info. New York : Nova Publishers, 2016.

Item Status

Description 1 online resource.
text file
Series Intelligence and counterintelligence studies
Intelligence and counterintelligence studies series.
Note Includes index.
Contents Preface; Chapter 1; Introduction to the Prevailing National Security Issues Confronting the United States; Introduction; Methodology; References; Chapter 2; Threats to the National Security of the United States' Homeland: A Qualitative Assessment; Abstract; Literature Review; Research Questions; Methodology; Limitations; Analysis; Trend of National Security Threats; Geographic Analysis; TSA as the First National Security Defense Warriors; Immigration and Organized Crime; Conclusion; Appendix A: List of All Data Sources and Thematic Coding Scheme; References; Chapter 3
Russia's Threat to the National Security of the United States:A Qualitative Assessment; Abstract; Literature Review; Research Questions; Methodology; Limitations; Analysis; Geographical Analysis of Crimea; Russia's National Power Building Through M.I.E. Instrument; Findings and Conclusion; Appendix A: List of Data Souces and Thematic Coding Matrix; References; Chapter 4; Overview of China's Threat to the National Security of the United States: A Qualitative Assessment; Abstract; Literature Review; China's Recent Economic Juggernaut; China's Military Development Landscape
China's Technological Advances and Cyber IntelligenceResearch Questions; The D.I.M.E. Logic and YIRTM Model; Methodology; Limitations; Analysis; China's Growing Economic Clout as Top National; Security Threat; China's Military Maneuvers to the National Security; China's Information Technology and Cyber Threats to the National Security; Conclusion; China's Economic Growth and Diplomacy; China's Military Threat; Information Technology and Cyber Threat; Appendix A: List of Data Sources and Thematic Coding Matrix; References; Chapter 5
North Korea and Its Threats to U.S. National Security: A Qualitative AssessmentAbstract; Literature Review; Research Questions; The D.I.M.E. Logic Model; Methodology; Limitations; Analysis; Geographic Analysis; North Korea as a Regional and Global Destabilizer; Findings and Conclusion; Appendix A: List of All Data Sources and Thematic Coding Matrix; References; Chapter 6; Asia-Pacific Threats to the National Security of the United States: A Qualitative Assessment; Abstract; Literature Review; Research Questions; The YIRTM Logic Model; Methodology; Limitations; Analysis
Findings and ConclusionAppendix A. List of All Data Sources and Thematic Coding Matrix; References; Chapter 7; African Security Threats and the Connection to the United States National Security: A Qualitative Assessment; Abstract; Literature Review; Research Questions; The D. I. M. E. Logic Model; Methodology; Analysis; Findings and Conclusion; Appendix A. List of Data Sources and Thematic Coding Matrix; References; Chapter 8; Central Command Threats to the National Security of the United States: A Qualitative Assessment; Abstract; Literature Review; Research Questions; The Logic Model
Local Note eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - North America
Subject National security -- United States.
National security.
United States.
Strategic culture -- United States.
Strategic culture.
World politics -- 21st century.
World politics.
Chronological Term 21st century
2000-2099
Genre/Form Electronic books.
Added Author Weaver, John Michael, editor.
Pomeroy, Jennifer, editor.
ISBN 9781536101065 (electronic book)
1536101060 (electronic book)
9781536100921