메뉴 건너뛰기




Volumn 18, Issue 4, 2006, Pages 283-296

Psychological support to defense counterintelligence operations

Author keywords

[No Author keywords available]

Indexed keywords


EID: 33847004042     PISSN: 08995605     EISSN: None     Source Type: Journal    
DOI: 10.1207/s15327876mp1804_3     Document Type: Article
Times cited : (18)

References (32)
  • 2
    • 32044449980 scopus 로고    scopus 로고
    • Tampa: University of South Florida
    • Borum, R. (2004). Psychology of terrorism. Tampa: University of South Florida.
    • (2004) Psychology of terrorism
    • Borum, R.1
  • 5
    • 23844512243 scopus 로고    scopus 로고
    • The operational and organizational evolution of Al-Qaeda: A behavioral perspective
    • Borum, R., & Gelles, M. (2005). The operational and organizational evolution of Al-Qaeda: A behavioral perspective. Behavioral Sciences & the Law, 23, 467-483.
    • (2005) Behavioral Sciences & the Law , vol.23 , pp. 467-483
    • Borum, R.1    Gelles, M.2
  • 6
    • 33846961661 scopus 로고    scopus 로고
    • Borum, R., Super, J., & Rand, M. (2003). Forensic assessment for high risk occupations. In A. Goldstein (Ed.), Comprehensive handbook of psychology: 11. Forensic psychology (pp. 133-148). New York: Wiley.
    • Borum, R., Super, J., & Rand, M. (2003). Forensic assessment for high risk occupations. In A. Goldstein (Ed.), Comprehensive handbook of psychology: Vol. 11. Forensic psychology (pp. 133-148). New York: Wiley.
  • 8
    • 33846965090 scopus 로고    scopus 로고
    • Cronin, C, Ed, Needham Heights, MA: Simon & Schuster
    • Cronin, C. (Ed.). (1998). Military psychology: An introduction. Needham Heights, MA: Simon & Schuster.
    • (1998) Military psychology: An introduction
  • 9
    • 33846997403 scopus 로고    scopus 로고
    • DoD Directive 5105.67. (2002, February 19). Department of Defense Counterintelligence Field Activity (DoD CIFA). Washington, DC: Department of Defense.
    • DoD Directive 5105.67. (2002, February 19). Department of Defense Counterintelligence Field Activity (DoD CIFA). Washington, DC: Department of Defense.
  • 10
    • 84905130762 scopus 로고    scopus 로고
    • Ethical concerns in forensic consultation regarding national safety and security
    • Ewing, C., & Gelles, M. (2004). Ethical concerns in forensic consultation regarding national safety and security. Journal of Threat Assessment, 2, 95-107.
    • (2004) Journal of Threat Assessment , vol.2 , pp. 95-107
    • Ewing, C.1    Gelles, M.2
  • 11
    • 33846943194 scopus 로고
    • United States Intelligence Activities, Section 3.4(a)
    • Executive Order 12333, December 4
    • Executive Order 12333. (1981, December 4). United States Intelligence Activities, Section 3.4(a). EO provisions found in 46 FR 59941, 3 CFR, 1981 Comp., p. 200.
    • (1981) EO provisions found in 46 FR 59941, 3 CFR, 1981 Comp , pp. 200
  • 14
    • 33846946352 scopus 로고    scopus 로고
    • Gelles, M., McFadden, R., Borum, R., & Vossekuil, B. (2006). An approach to the interrogation of subjects of al Qa'ida-related investigations: A perspective for law enforcement personnel. In T. Williamson (Ed.), Investigative interviewing: Developments in research, rights and regulation (pp. 23-41). Cullomtpon, England: Willan.
    • Gelles, M., McFadden, R., Borum, R., & Vossekuil, B. (2006). An approach to the interrogation of subjects of al Qa'ida-related investigations: A perspective for law enforcement personnel. In T. Williamson (Ed.), Investigative interviewing: Developments in research, rights and regulation (pp. 23-41). Cullomtpon, England: Willan.
  • 18
    • 0029311345 scopus 로고
    • Perennial ethical quandaries in military psychology: Toward American Psychological Association-Department of Defense collaboration
    • Johnson, B. (1995). Perennial ethical quandaries in military psychology: Toward American Psychological Association-Department of Defense collaboration. Professional Psychology: Research and Practice, 26, 281-287.
    • (1995) Professional Psychology: Research and Practice , vol.26 , pp. 281-287
    • Johnson, B.1
  • 19
    • 13844249330 scopus 로고    scopus 로고
    • Consulting in the military context: Implications of the revised training principles
    • Johnson, B. (2002). Consulting in the military context: Implications of the revised training principles. Consulting Psychology Journal: Practice and Research, 54, 233-241.
    • (2002) Consulting Psychology Journal: Practice and Research , vol.54 , pp. 233-241
    • Johnson, B.1
  • 23
    • 0001950737 scopus 로고    scopus 로고
    • Matsumoto, D, Ed, New York: Oxford University Press
    • Matsumoto, D. (Ed.). (2001). The handbook of culture and psychology. New York: Oxford University Press.
    • (2001) The handbook of culture and psychology
  • 24
    • 33847001848 scopus 로고    scopus 로고
    • National Security Agency, Washington, DC: Author
    • National Security Agency. (2001). Espionage: The threat is real. Washington, DC: Author.
    • (2001) Espionage: The threat is real
  • 25
    • 22544479825 scopus 로고    scopus 로고
    • Office of the National Counterintelligence Executive, Washington, DC: Author
    • Office of the National Counterintelligence Executive. (2005). National Counterintelligence strategy of the United States. Washington, DC: Author.
    • (2005) National Counterintelligence strategy of the United States
  • 26
    • 33846997404 scopus 로고    scopus 로고
    • The ten commandments of Counterintelligence
    • Olson, J. (2001). The ten commandments of Counterintelligence. Studies on Intelligence, 11, 81-87.
    • (2001) Studies on Intelligence , vol.11 , pp. 81-87
    • Olson, J.1
  • 27
    • 0029820911 scopus 로고    scopus 로고
    • Clinical psychology in the military: Developments and issues
    • Page, G. (1996). Clinical psychology in the military: Developments and issues. Clinical Psychology Review, 16, 383-396.
    • (1996) Clinical Psychology Review , vol.16 , pp. 383-396
    • Page, G.1
  • 29
    • 0010886652 scopus 로고    scopus 로고
    • The insider threat to information systems
    • Washington, DC: Department of Defense Security Institute
    • Shaw, E. D., Ruby, K. G., & Post, J. M. (1998). The insider threat to information systems (Security Awareness Bulletin No. 2-98). Washington, DC: Department of Defense Security Institute.
    • (1998) Security Awareness Bulletin , vol.2-98
    • Shaw, E.D.1    Ruby, K.G.2    Post, J.M.3
  • 30
    • 33846991479 scopus 로고
    • The spies among us: Trends in military espionage
    • Smith, E. (1990). The spies among us: Trends in military espionage. American Intelligence Journal, 11, 1-3.
    • (1990) American Intelligence Journal , vol.11 , pp. 1-3
    • Smith, E.1
  • 31
    • 33847002541 scopus 로고    scopus 로고
    • Security and motivational factors in espionage
    • Thompson, T. (2001). Security and motivational factors in espionage. American Intelligence Journal 20, 47-56.
    • (2001) American Intelligence Journal , vol.20 , pp. 47-56
    • Thompson, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.