메뉴 건너뛰기




Volumn , Issue , 2005, Pages 189-196

Simulating the knowledge transfer dilemma: Lessons for security and counter-terrorism

Author keywords

Counter terrorism; Knowledge management; Security

Indexed keywords

COUNTER TERRORISM; GRAPHICAL SIMULATION; INTELLIGENCE AGENCIES; KNOWLEDGE TRANSFER; POTENTIAL APPLICATIONS; RAPID DIFFUSION; SECURITY; TERRORIST THREATS;

EID: 84871790659     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (3)

References (25)
  • 1
    • 84962698725 scopus 로고
    • The economic implications of learning by doing
    • Arrow, K. J. 1962. "The Economic Implications of Learning by Doing,": Review of Economic Studies, 29, pp. 155-173
    • (1962) Review of Economic Studies , vol.29 , pp. 155-173
    • Arrow, K.J.1
  • 5
    • 84934562195 scopus 로고
    • The iron law of fiefs: Bureaucratic failure and the problem of governance in the Chinese economic reforms
    • Boisot, M., and J. Child. 1988. "The Iron Law of Fiefs: Bureaucratic Failure and the Problem of Governance in the Chinese Economic Reforms,", Administrative Science Quarterly, 33: 507-27.
    • (1988) Administrative Science Quarterly , vol.33 , pp. 507-527
    • Boisot, M.1    Child, J.2
  • 6
    • 10444273263 scopus 로고    scopus 로고
    • Crossing epistemological boundaries: Managerial and entrepreneurial approaches to knowledge management
    • Boisot, M., and I. Macmillan. 2004a. "Crossing Epistemological Boundaries: Managerial and Entrepreneurial Approaches to Knowledge Management.," Long Range Planning, 37(6).
    • (2004) Long Range Planning , vol.37 , Issue.6
    • Boisot, M.1    Macmillan, I.2
  • 7
    • 84871805305 scopus 로고    scopus 로고
    • Counter-terrorism as neighborhood watch: A socio/ computational approach for getting patterns from dots
    • Draft 20, December 18, 2004. Available from author at: boisot@attglobal.net
    • Boisot, M. and B. McKelvey. 2004b. "Counter-Terrorism As Neighborhood Watch: A Socio/ Computational Approach for Getting Patterns from Dots,", Working Paper, Draft 20, December 18, 2004. Available from author at: boisot@attglobal.net
    • (2004) Working Paper
    • Boisot, M.1    McKelvey, B.2
  • 8
    • 84870019024 scopus 로고    scopus 로고
    • Sim I-space: An agent-based modelling approach to knowledge management processes
    • Kimbrough S.O. and Wu D.J. (eds) International Handbooks on Information Systems. Springer-Verlag Berlin Heidelberg
    • Boisot M., MacMillan I., Han K.S., Tan C., and S.H. Eun. 2005. "Sim I-Space: An Agent-Based Modelling Approach to Knowledge Management Processes,". In Kimbrough S.O. and Wu D.J. (eds). Formal Modelling in Electronic Commerce. International Handbooks on Information Systems. Springer-Verlag Berlin Heidelberg. pp. 247-294.
    • (2005) Formal Modelling in Electronic Commerce , pp. 247-294
    • Boisot, M.1    MacMillan, I.2    Han, K.S.3    Tan, C.4    Eun, S.H.5
  • 9
    • 84871730376 scopus 로고    scopus 로고
    • Logistic, safety and security and safety
    • April 2005
    • Bruzzone, A. G. 2005. "Logistic, Safety and Security and Safety,", CEILI, April 2005. Available at URL: http://st.itim.unige.it/ cieli-lss/
    • (2005) CEILI
    • Bruzzone, A.G.1
  • 12
    • 0346149867 scopus 로고    scopus 로고
    • Process security assessment: Operational space classification and process security index
    • September 2003
    • Lou, H., Muthusamy, R. and Y. Huang. 2003. "Process Security Assessment: Operational Space Classification and Process Security Index,", Trans IChemE, Vol 81, Part B, September 2003.
    • (2003) Trans IChemE , vol.81 , Issue.PART B
    • Lou, H.1    Muthusamy, R.2    Huang, Y.3
  • 13
    • 0036055049 scopus 로고    scopus 로고
    • The institutionalization of identity: Micro adaptation, macro effects, and collective consequences
    • Lustick, I., and D. Miodownik. 2002. "The Institutionalization of Identity: Micro Adaptation, Macro Effects, and Collective Consequences,". Studies in Comparative International Development 37(2): 24-53.
    • (2002) Studies in Comparative International Development , vol.37 , Issue.2 , pp. 24-53
    • Lustick, I.1    Miodownik, D.2
  • 15
    • 3042546359 scopus 로고    scopus 로고
    • Simulation of the dynamic interactions between terror and anti-terror organizational structures
    • March 2004
    • Raczynski, S. 2004. "Simulation of the Dynamic Interactions Between Terror and Anti-Terror Organizational Structures,", The Journal of Artificial Societies and Social Simulation, Vol.7, issue 2, March 2004.
    • (2004) The Journal of Artificial Societies and Social Simulation , vol.7 , Issue.2
    • Raczynski, S.1
  • 20
    • 33744718666 scopus 로고    scopus 로고
    • Human behavior models for game theoretic agents
    • Silverman, B.G., et al. 2002. Human Behavior Models for Game Theoretic Agents. Cognitive Science Quarterly, 2 (3/4), 273-301.
    • (2002) Cognitive Science Quarterly , vol.2 , Issue.3-4 , pp. 273-301
    • Silverman, B.G.1
  • 21
    • 33744719940 scopus 로고    scopus 로고
    • Modeling cognition and personality in leaders
    • 2005 BRIMS05, (May 16-20) Los Angelis, CA
    • Silverman, B. and G. Bharathy. 2005. "Modeling Cognition and Personality in Leaders,", 2005 Conf. On Behavior Representation & Simulation, BRIMS05, (May 16-20) Los Angelis, CA.
    • (2005) Conf. on Behavior Representation & Simulation
    • Silverman, B.1    Bharathy, G.2
  • 24
    • 4243198223 scopus 로고    scopus 로고
    • Fast process security assessment theory
    • 2004
    • Uygun, K., Huang, Y., H. Lou. 2004. "Fast Process Security Assessment Theory,". AIChE J, 50: 2187-2202, 2004.
    • (2004) AIChE J , vol.50 , pp. 2187-2202
    • Uygun, K.1    Huang, Y.2    Lou, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.