• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 3
  • 1
  • 1
  • 1
  • Tagged with
  • 6
  • 6
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Assessment Of The Contribution Of Game-based Simulation In The Advancement Of Individual Soldier Intelligence Gathering Skills

Wiley, Carlos 01 January 2007 (has links)
Self-directed Learning Internet Modules based on gaming technology are making tremendous strides as tools to current training system for our military services. Currently, the US Army is testing the Every Soldier is a Sensor Simulation software (ES3) as part of the Every Soldiers a Sensor program that focuses on intelligence gathering and maintaining situational awareness. The primary training goal of this simulation is the training of individual soldiers on conducting "Active Surveillance" and "Threat Indicator Identification" where the soldier is an active participant in the process. Traditional training in intelligence gathering is based largely on cold war models. As a direct result of post 9 -11 activities and the Global War on Terrorism, changes to our process for intelligence gathering are continuing to be made to meet the challenges of the asymmetrical battlefield. This thesis assesses the contribution of game-based simulation in the advancement of individual soldier intelligence gathering skills by investigating performance as it relates to information processing, self-directed learning, and transfer. Specifically, this research will examine whether various combinations of directed and self-directed learning modules enhance soldier performance during intelligence gathering operations by determining the time, proportion of correct detections, weighted significance of detections, and accuracy of detections while participating in a live threat indicator lane as part of an experiment. The assessment is from a user and expert evaluator perspective and may be used to improve current and future gaming applications associated with individual training and intelligence gathering.
2

Makeshift Information Constructions: Information Flow and Undercover Police

Aksakal, Baris 08 1900 (has links)
This dissertation presents the social virtual interface (SVI) model, which was born out of a need to develop a viable model of the complex interactions, information flow and information seeking behaviors among undercover officers. The SVI model was created from a combination of various philosophies and models in the literature of information seeking, communication and philosophy. The questions this research paper answers are as follows: 1. Can we make use of models and concepts familiar to or drawn from Information Science to construct a model of undercover police work that effectively represents the large number of entities and relationships? and 2. Will undercover police officers recognize this model as realistic? This study used a descriptive qualitative research method to examine the research questions. An online survey and hard copy survey were distributed to police officers who had worked in an undercover capacity. In addition groups of officers were interviewed about their opinion of the SVI model. The data gathered was analyzed and the model was validated by the results of the survey and interviews.
3

Finland som underrättelsemål eller vän : C-byråns underrättelseverksamhet i Finland under andra världskriget

Boman, Lukas January 2024 (has links)
Intelligence organizations and their operations are by their nature secretive and want to continue as such. This problematizes research around them and especially intelligence cooperation with other countries can be considered among the most secret parts of an intelligence organization. This is put in the context of the essay where Sweden and Finland have a long and extensive historical relationship. That relationship also includes military aspects with volunteer soldiers and even today with the joint decision to apply to NATO. Previous research on Swedish intelligence gathering and intelligence cooperation in Finland has been sparse and scattered in larger works that have focused largely on the Swedish intelligence organization and its operations. The purpose of the essay is twofold. One is to map the Swedish intelligence gathering in Finland by C-byrån and see how it changed during the course of the war. The second is to highlight and discuss the intelligence cooperation between the Swedish and Finnish intelligence services. Since the purpose is twofold, two different theoretical frameworks and researchers' thoughts will be used. The first is Agrell's thoughts on different types of intelligence, which will be used to analyze what is obtained in Finland. The second is Michael Herman's thoughts on intelligence cooperation, which will be used to explain and discuss the Swedish-Finnish intelligence cooperation. The method chosen for this essay is a qualitative text analysis with a close reading of reports carried out. The essay will also contain elements of quantitative methods in the form of a table and figures to more easily visualize some of the results. The end result of this essay is that the C-byråns intelligence gathering in Finland changed in volume and type of intelligence during the course of the war. Within the intelligence cooperation, it is established that the cooperation was at its greatest and in clarity during the Finnish Winter War. After the Finnish Winter War cooperation decreased and became discreet, then returned during the Lapland War in clarity. Intelligence cooperation with the Finnish intelligence service became a method of approach and a professional exchange for the C-byrån to obtain intelligence on active war experience of how Soviet troops fight and their tactics.
4

Renseignement public et sécurité nationale / Public intelligence and national security

Deprau, Alexis 29 November 2017 (has links)
Si les activités de renseignement public n’étaient pas encadrées, la loi du 24 juillet 2015 relative au renseignement a permis de créer un cadre juridique du renseignement, tout en mettant en avant la communauté du renseignement. Cet encadrement juridique des activités de renseignement s’exerce dans le but de faire face aux menaces à la sécurité nationale. Cet encadrement juridique est aussi une avancée qui a permis d’ériger le renseignement public comme une politique publique, nécessaire pour protéger les intérêts fondamentaux de la Nation, et a été complété par un contrôle concret de ces activités de renseignement. / As the activities of public intelligence services were not regulated before, the law on intelligence dated July 24th, 2015 allowed to create a legal framework of intelligence, while showcasing the intelligence community. This legal framework of intelligence activities is meant to deal with the threats to national security. This legal framework is also a breakthrough allowing to turn public intelligence into public policy, which is required to protect the fundamental interests of the Nation, and it has been completed by an effective control of these intelligence activities.
5

An analysis of information in South African electronic newspaper articles on cash-in-transit robberies as a source of intelligence

Nemutshili, Tshianzi 01 1900 (has links)
The escalating number of cash-in-transit robberies in South Africa is of major concern and this requires information in South African electronic newspaper articles as a source of intelligence. The aim of this study is to determine if newspaper articles on Cash-in-transit robbery can be a source of intelligence. The researcher identified sources which can be used for data collection that could be turned into intelligence. Electronic newspaper articles were explored and turned into informative documents in terms of information that can be gathered about cash-in-transit robberies. The researcher discussed the available sources of intelligence and intelligence that can be gathered through newspaper articles. The researcher conducted the study with the purpose of exploring, describing, and empowering. Exploring existing method used to gather intelligence on crime and CIT robberies, exploring and the topic under investigation the by consulting national and international sources and local newspaper articles, in order to obtain new knowledge on the problem, exploring if newspaper articles could provide intelligence on CIT robberies, by examining existing literature to gather information about the sources of intelligence. Furthermore, the researcher also wanted to describe how newspaper articles can be used in the investigation of CIT robberies. Lastly, to ensure that this research is made available to other researchers who have an interest in exploring the sources of information and the crime intelligence-gathering process. To accomplish this, the researcher examined national and international literature found in textbooks, research articles; master’s dissertations and PhD theses; newspaper articles (online); and searched the internet with the intention of finding data that could answer the research questions. / Police Practice / M.A. (Criminal Justice)
6

Mezinárodněprávní aspekty získávání informací zpravodajskými službami / International legal aspects of obtaining information by intelligence service

Hanžl, Pavel January 2015 (has links)
This diploma thesis deals with intelligence gathering and its international law aspects. The main research question of this diploma thesis is as follows: is the intelligence gathering legal from the point of view of international law? In light of recent scandals and accusations of secret services of illegal espionage, it is very important to find an answer to this question. There are almost no relevant Czech academic sources about this issue and foreign sources are rather contradictory. Included in the main research question are number of additional issues, such as: are there differences in legality between intelligence gathering during peacetime or wartime? What are the international law sources regarding espionage? Is the work of secret services affected by international law? Is international law relevant to espionage? As part of the introduction the diploma thesis outlines various intelligence gathering methods and defines relevant terms. The diploma thesis also addresses the issue of compatibility of espionage with the international law principle of non-intervention and state sovereignty. Next, three current approaches to the question of legality of espionage are presented to the reader and one new approach is introduced. Furthermore, the international implications of the unlawful behavior of...

Page generated in 0.141 seconds