:::

詳目顯示

回上一頁
題名:情報決策象限理論之建構與個案分析-孫子兵法情報概念的反思
作者:紀光陽 引用關係
作者(外文):Chi,Kuang Yang
校院名稱:國立政治大學
系所名稱:國家發展研究所
指導教授:李英明
宋筱元
學位類別:博士
出版日期:2009
主題關鍵詞:孫子兵法情報信息認知決策象限理論決策方程式美伊戰爭The Art of War by Sun-tzuintelligenceinformationcognitiondecision-makingQuadrant theoryEquation of decisionSecond Gulf War
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:567
「情報」與「決策」存在著高度的密切關係,「情報」正確而及時則相對提高「決策」的正確性;反之,則降低「決策」的正確性。但同一個「情報」對不同的個人而言,會產出不同的「決策」結果,此即是「決策」不僅與「情報」有關,亦與個人的「認知」條件有著密切的關係。
  因此,本文透過孫子兵法「情報」與「決策」的關係,架構出孫子的決策邏輯與位階性,再以此建構出情報決策「象限理論」,企圖系統性地解釋「情報」條件與決策者「認知」條件的複雜關係,並藉由第二次美伊戰爭的決策過程作為例證,說明導致決策錯誤的重要因素。並由「象限理論」中第一象限區域,及美伊戰爭決策缺失中,檢討並演繹出「國家安全決策新思維」,文中指出一個專業且中立的情報機關,除了要提升情報信息的客觀性外,更要避免、改變決策者先入為主的錯誤認知。經由本文所提出的「象限理論」、「決策方程式」、「個案分析」、「國家安全決策新思維」,將有助於瞭解並加速決策產出的質量與效能,進而有利於優質決策的產出。
There is highly relationship between intelligence and decision-making. The correct and on time intelligence will make a good policy; but the wrong or slow intelligence will make a bad policy, on the contrary. The same intelligence for different individuals will result in different decision-making, which means decision-making has high relationship with intelligence and personal cognition.
For this reason, this article constructs The Quadrangular Theory of Intelligence and Decision-making based on The Art of Sun-tzu theory, to explain the complicated relation between intelligence and personal cognition, as well as to state the important factor which leads to the wrong decision-making in the Second Gulf War.
This article also point out an important concept: the professional and intelligence agencies will not only improve the objectively intelligence, but also will avoid policymaker's prejudiced cognition. The Quadrangular Theory of Intelligence and Decision-making will help to understand the whole situation and accelerate the high quality and high efficiency decision-making process.
中文參考文獻
書籍
于長海(1994),《軍事系統決策研究》,北京:軍事科學出版社。
孔令晟(1995),《大戰略通論》,臺北:好聯出版社。
毛治國(2003),《決策》,臺北:天下雜誌出版社。
王 沖、沙雪良(2002),《致勝奇招兵聖孫子》,臺北:希代書版股份有
限公司。
王永生(1999),《決策方略論》,北京:人民出版社。
王雨田(1987),《控制論、信息論、系統科學與哲學》,北京:中國人民大學出版社。
王逸舟(1998),《西方國際政治學:歷史與理論》,上海:上海人民出版
社。
包昌火(1991),《情報研究方法論》,北京:科學技術文獻出版社。
安 平(2000),《活用孫子兵法與經商》,臺北:正展出版社。
呂亞力(1984),《政治學方法論》,臺北:三民出版社。new window
呂理州(1994),《明治維新:日本邁向現代化的歷程》,臺北:遠流出版
社。
宋筱元(1999),《國家情報問題之研究:情報與國家關係之分析》,桃園:
中央警察大學。
巫和懋、夏 珍(2002),《賽局高手》,臺北:時報出版社。
李世俊、楊世舉、蕈家瑞(1995),《活用孫子兵法. 經營篇, 經營者的決
策/管理/行銷/領導寶典》,臺北:遠流出版社。
李耐國(2001),《軍事情報研究》,北京:軍事科學出版社。
李 靜(1994),《科學思維的推理藝術》,臺北:淑馨出版社。
李啟明(1996),《不戰而屈人之兵》,臺北:臺灣中華書局出版社。
杜 陵(1978),《情報學》,桃園:中央警官學校。
杜 陵(1988),《情報寫作藝術》,桃園:中央警官學校。
岳劍波(1975),《信息環境論》,北京:書目文獻出版社。
易克信、趙國琦(1992),《社會科學情報理論與方法》,北京:社會科學文
獻出版社。
易君博(1993),《政治理論與研究方法》,臺北:三民書局。new window
林碧炤(1987),《論國際政治的持續與轉變》,臺北:桂冠出版社。
邱子豪(1995),《孫子兵法企業管理學》,臺北:漢宇出版社。
胡文彬(1999),《情報學》,臺北:政治作戰學校。
胡建恆(1968),《謀略戰研究》,臺北:政工幹部學校。
席汝楫(1997),《社會與行為科學研究方法》,臺北:五南出版社。
徐立新(2004),《兵聖孫子》,臺北:宜高文化出版社。
桂京山(1977),《反情報工作概論》,桃園:中央警官學校。
國家安全局(1963),《情報學》,臺北:國家安全局。
張中勇(1993),《後冷戰時期國家安全情報組織及其任務之研究》,臺北:
國科會研究報告。
張中勇(1993),《情報研究-從情報活動的實際實踐與理論解析觀點探
討》,桃園:中央警官學校。
張中勇(1993),《情報與國家安全之研究》,臺北:三鋒出版社。
張中勇(1994),《情報研究-從情報活動的實際實踐與理論解析觀點探
討》,臺北:行政院國家科學委員會科資中心。
張式琦(1971),《作戰情報》,臺北:情報學校。
張式琦(1983),《國家情報》,臺北:中華戰略學會大陸研究會。
張春興(1975),《心理學》,臺北:東華書局。
張殿清(1997),《特殊的較量:情報與反情報》,北京:世界知識出版社。
張殿清(2001),《情報與反情報》,臺北:時英出版社。
張曉軍(2001),《武經七書:軍事情報思想研究》,北京:軍事科學出版
社。
許芳銘(1999),《一個決策過程的系統式思考型構》,新竹:交通大學經營
管理研究所博士論文。
陳一明(1992),《孫子兵法與決策》,河北:中州古籍出版社。
陳海鳴(1990),《一個決策過程概念及架構的討論-從認知的觀點》,新new window
竹:國立交通大學管理科學研究所博士論文。
陳湛勻(1999),《現代決策應用與方法分析》,臺北:五南出版社。
陸忠偉(2003),《非傳統安全論》,北京:時事出版社。
彭懷恩(1982),《決策論奇才:賽蒙》,臺北:允晨文化出版。
游伯龍(1985),《行為與決策-知己知彼的基礎與應用》,臺北:中央研究
院。
湯炎光(1963),《情報戰》,臺北:建華出版社。
程方平(1988),《教育情報學簡論》,四川:四川教育出版社。
鈕先鍾(1997),《孫子三論:從古兵法到新戰略》,臺北:麥田出版社。
馮恩樁、謝仁興(1994),《情報研究學基礎》,北京:科學技術文藝出版
社。
楊士毅(1991),《邏輯、民主、科學-方法論導讀》,臺北:書林出版社。
楊少俊(1992),《孫子兵法的電腦研究》,北京:解放軍出版社。
楊善群(1999),《孫子》,永和:貿騰發賣出版社。
葉文倩(1988),《決策、目標與經營理念》,臺北:書泉出版社。
鄒志仁(1991),《情報學基礎》,南京:南京大學出版社。
褚良才(2002),《孫子兵法研究與應用》,浙江:浙江大學出版社。
趙保佑、李正平、李允豹(1992),《情報社會學》,北京:東方出版社。
劉愷之(2002),《孫子兵法的智慧法則》,臺北:臺灣廣廈有聲圖書。
蔡志忠(2004),《孫子兵法》,臺北:時報出版社。
蔡萬助(2000),《21世紀軍事管理知識體系之研究》,臺北:華泰文化出
版社。
鄭克禮(1996),《孫子兵法在當今世界的妙用》,臺北:方智出版社。
閻晉中(1999),《軍事情報學》,北京:時事出版社。
謝清佳(1989),《資訊概念架構的芻議及其應用》,新竹:交通大學管理科new window
學研究所博士論文。
謝清佳(1996),《資訊管理:理論與實務》,臺北:智勝文化。
魏 鏞(2001),《中華民國行政資訊體系之建立與展望》,臺北: 行政院
研究發展考核委員會編印。
魏宏森(1988),《系統理論及其哲學思考》,北京:清華大學出版社。
嚴定暹(2003),《孫子兵法活學活用》,臺北:凱信出版社。
蘇韶懿(1998),《孫子兵法論述-結構及其現代管理意涵之研究》,新竹:
交通大學經營管理研究所博士論文。
專書篇章
宋學文(2000),〈全球化與非政府組織對國家關係的影響〉,收錄於吳英
明、林德昌編,《非政府組織》,臺北:商鼎文化出版社,頁67-91。
林正義(1996),〈臺灣安全戰略〉,收錄於謝淑媛編,《台海安全情報》,
臺北:玉山出版社,頁45-70。
羅森勃呂特、維納、別格羅(1969),〈行為、目的和目的論〉,《控制論哲
學問題譯文集》,北京:商務印書館出版社,頁1-17。
佛.尼.洛博夫(1995),〈戰爭中的謀略〉,《當代國外軍事名著精選》,
北京:軍事誼文出版社,頁550-572。
翻譯書籍
Bossidy, Larry and Ram Charan着 李 明譯(2003),《執行力》,
臺北:天下文化出版社。
Farago, Ladislas著 法務部調查局譯(1955),《智慧之戰》,臺北:內
政部調查局。
Hirshleifer, Jack著 劉廣靈、李紹榮譯(2000),《不確定性或信息分
析》,北京:中國社會科學出版社。
Hulnick, Arthur S.著,國防部譯(2006),《情報與國土安全》,臺
北:國防部譯印,頁18。
Odom, William E.著,國防部譯(2005),《情報改革》,臺北:國防部
譯印。
Peters, B. Guy著,陳永芳譯(2003),《比較政治的理論與方法》,臺
北:韋伯出版社。
Robbinns, Stephen P.著,林思伶、李炳林譯(2005),《決策DNA》,
臺北:培生教育出版社。
Schramm, Wilbur L.著,余也魯譯(1990),《傳學概論:傳媒‧信息與
人》,香港:海天出版社。
K. B. 塔拉卡諾夫著,何士彬譯(1993),《情報學》,北京:書目文獻出
版社。
列爾涅爾(1980),《控制論基礎》,北京:科學出版社,頁85-86。
期刊及學術會議文章
老 參(1975),〈泛論軍事情報-情報是現代國防的第一線〉,《三軍聯合
月刊》,第13卷3期,頁95-106。
李英明、賴皆興(2005),〈從理性博奕向結構博奕轉移:兼論兩岸結構博
奕〉,《遠景基金會季刊》,第6卷4期,頁1-29。
汪毓瑋(2002),〈資訊時代之情報在危機決策中之作用與面臨之問題〉,new window
《中華戰略學刊》,秋季刊,頁127-166。
宋筱元(1998),〈從臺商間諜案論獨裁政權之情報機構〉,《理論與政new window
策》,第47期,頁48-59。
宋筱元(1998),〈情報研究-一門新興的學科〉,《警政學報》,第33new window
期,頁459-479。
宋筱元、紀光陽(2007),〈論孫子兵法中的情報決策觀〉,《中央警察大學new window
警學叢刊》,第37卷第4期,頁43-68。
林吉郎(2002),〈我國國家安全與危機管理:整合性緊急管理政策與機new window
制〉,《國防雜誌》,第17卷9期,頁87-105。
紀光陽(2007),〈論孫子兵法的决策思維-情報觀點的反思〉,《北臺灣科new window
技學院通識學報》,第3期,頁245-263。
孫伯先(1971),〈論戰爭原則-安全與情報〉,《情報學術研究》,第7
期,頁24-39。
馬費成(2002),〈論情報學的基本原理〉,《資訊傳播與圖書館學》,第8new window
卷3期,頁35-44。
高希均(2003),〈領導智慧與執行能力〉,《遠見雜誌》,第204期,頁
30-31。
許志強(2002),〈情報學多元進化理論研究〉,《資訊傳播與圖書館學》,new window
第8卷4期,頁55-66。
章一平(1997),〈冷戰後世界的新安全觀〉,《現代國際關係》,第2期,
頁38-41。
鈕先鍾(1973),〈國家安全政策,一個隱晦的領域〉,《軍事譯粹》,第
22卷7期,頁3-21。
黃秋龍(2004),〈非傳統安全的理論與實踐〉,《展望與探索》,第2卷4
期,頁11-22。
劉慶元(2002),〈國家安全戰略理論探析〉,《中華戰略學刊》,冬季刊,new window
頁23-54。
瑩 蒼(1969),〈研讀總統政治作戰情報戰訓示之心得〉,《情報學術研
究》,第2期,頁1-20。
蔡政修(2004),〈911事件後的美國國家安全戰略:以波灣戰爭與北韓核子
危機為例〉,《問題與研究》,第43卷6期,頁129-165。
繆 園(2002),〈20世紀90年代以來日本情報科學與圖書館情報學的發
展〉,《資訊傳播與圖書館學,第8卷3期,頁85-92。
謝志淵(2003),〈從情報學發展趨勢探討國軍戰場情報準備工作之發展〉,
《陸軍學術月刊》,第39卷458期,頁59-69。
嚴怡民(1992),〈情報學研究現狀與展望〉,《情報學報》,第13卷1期,
頁1-12。
嚴怡民(1996),〈走向21世紀的情報學〉,《圖書情報知識》,第2期,頁
5-12。
蘇進強(2003),〈國家安全與危機管理機制〉,《新世紀智庫論壇》,第
21期,頁4-25。
沈玄池(2003),〈美伊戰爭與全球外交動向〉,中興大學全球和平戰略研究
中心,2003年4月11日。
<http://cgpss. nchu.edu.tw /modules/ wfsection/
article.php? articleid=78>

西文參考文獻
Books
Adler, Mortimer J. (1963), Philosophy, Chicago:Encyclopedia
Britannica.
Alexander, Milton J. (1974), Information Systems Analysis: Theory and Applications, Chicago: Science Research
Associates.
Ameringer, Charles D. (1990), U.S. Foreign Intelligence:
The Secret Side of American Society, Le×ington: Lexington
Books.
Andrews, Linda W. (2003), Intelligence, New York: Franklin
Watts.
Babbie, Earl R. (1989), The Practice of Social Research,
California: Wadsworth Publishing.
Ball, Desmond (2003), China's Signals Intelligence
(SIGINT): Satellite Programs,Canberra: Strategic and
Defence Studies Centre.
Bamford, James (2005), A Pretext for War: 9/11, Iraq, and
the Abuse of America's intelligence Agencies, New York:
Anchor Books.
World Bank Staff Author (1997), World Development Report,
Washington D. C..: World Bank Publications.
Bar-Joseph, Uri (1995), Intelligence Intervention in the
Politics of Democratic States: The United States, Israel,
and Britain, University Park, Pennsylvania: The
Pennsylvania State University Press.
Barrett, David M. (2005), The CIA & Congress: The Untold
Story from Truman to Kennedy, Lawrence, Kan.: University
Press of Kansas.
Baylis, John and Steve Smith (1997), The Globalization of
World Politics: An Introduction to International
Relations, New York: Oxford University Press.
Berg, Bruce (1995), Qualitative Research Methods for the
Social Sciences, Boston: Allyn & Bacon.
Berkowitz, Bruce D. and Allan E. Goodman (1989), Strategic
Intelligence for American National Security, Princeton,
New Jersey: Princeton University Press.
Berkowitz, Bruce D. and Allan E. Goodman (2000), Best
Truth: Intelligence in the Information Age, New Haven:
Yale University Press.
Berkwitz, Morton and Peter G. Bock (eds.) (1965), American
National Security, New York: Free Press.
Berlinski, David (1979), 0n Systems Analysis: An Essay
Concerning the Limitations on Some Mathematical Methods
in the Social, Political and Biological Science, Mass:
MIT Press.
Best, Richard A. (2005), Intelligence Reorganization
Proposals, 1949-2004, New York: Novinka.
Blumenthal Sherman C. (1969), MIS-A Framework for Planning
and Development, New Jersey: Prentice-Hall.
Bochenski, Joseph M. (1972), Philosophy: An Introduction,
New York: Harper & Row.
Bohman, James (2000), New Philosophy of Social Science,
Cambridge: MIT Press.
Born, Hans (2005), Who's Watching the Spies: Establishing
Intelligence Service Accountability, Dulles, Va.: Potomac
Books.
Boulding, Kenneth E. (1953), The Image: Knowledge in Life
and Society, Ann Arbor:University of Michigan Press.
Brashaw, Nicholas C. (2001), Signals Intelligence, the
British and the War in Yugoslavia 1941-1944, Southampton:
University of Southampton, Dept. of History.
Braybrooke, David and Charles Lindblom (1963), A Strategy
of Decision: Policy Evaluation as a Social Process, New
York: Free Press of Glencoe.
Breckinridge, Scott D. (1986), The CIA and the U. S.
Intelligence System, Boulder:Westview Press.
Burch, John G. (1979), Information Systems: Theory and
Practice, New York: Wiley.
Bush, George W. (2002), Nation Strategy to Combat Weapons
of Mass Destruction, Washington, D. C.: The White House.
Buzan, Barry (1997), Security: A New Framework for
Analysis, Boulder, Colo.: Lynne Rienner Publishing.
Bynner, John (1979), Social Research: Princip1es and
Procedures, New York: The Open University Press.
Charters, David A. (1996), Intelligence Analysis and
Assessment, London; Portland, Or.: Frank Cass.
Chatterjee, Kalyan and William Samuelson (2001), Game
Theory and Business Applications, Boston, Mass.: Kluwer
Academic Publishing.
Cianciolo, Anna T. (2004), Intelligence : A Brief History,
Malden, MA: Blackwell Publishing.
Cimbala, Stephen J. (ed. ) (1987), Intelligence and
Intelligence Policy in a Democratic Society, New York:
Transnational Publishing.
Clark, Robert M. (2004), Intelligence Analysis: A Target-
Centric Approach, Washington, D. C.: CQ Press.
Clavell, James (ed.) (1983), The Art of War: Sun Tzu, New
York: Delacorte Press.
Clausewitz, Carl V. (1976), On War, Translated by Louise
and Aylmermaude, Oxford, N. Y.; Oxford University Press.
Cole, Stephen (1992), Making Science: Between Nature and
Society, Cambridge, Mass.:Harvard University.
Commission on CIA Activites Within the United States
(1975), Report to the President,Washington, D. C.: U. S.
Government Printing Office.
Cooper, Joseph D. (1961), The Art of Decision-Making, New
York: Doubleday.
Cordesman, Anthony H. (2003), The Iraq War: Strategy,
Tactics, and Military Lessons , Washington, D. C.: Center
for Strategic and International Studies Press.
Cordesman, Anthony H. and Arleigh A. Burke (2003),
Intelligence Failures in the Iraq War, Center for
Strategic and International, Washington, D. C.: Center
for Strategic and International Studies Press.
Cordesman, Anthony H. and Arleigh A. Burke (2003), The
Lessons of the Iraq War: Issues Relating to Grand
Strategy, Washington, D. C.: Center for Strategic and
International Studies Press.
Daalder, Ivo H. and James M. Lindsay (2003), America
Unbound: The Bush Revolution in Foreign Policy/Ivo H.
Daalder, James M. Lindsay, Washington, D. C.: Brookings
Institution.
Davenport, Thomas H. (2007), Competing on Analytics: The
New Science of Winning, Boston, Mass.: Harvard Business
School Press.
Doane, James P. (2005), Dynamics of Homeland Security and
National Defense, New York: McGraw-Hill.
Doyal, Len (1986), Empiricism Explanation, and Rationality:
An Introduction to the Philosophy of the Social Sciences,
New York: Routledge & K. Paul.
Drea, Edward J. (1992), MacArthur's ULTRA: Codebreaking and
the War Against Japan, Lawrence, Kansas: University Press
of Kansas.
Easton, David (1953), The Political System: An Inquiry into
the State of Political Science,New York: Knopf.
Easton, David (1965), A Systems Analysis of Politics Life,
New York: John Wiley & Sons.
Easton, David (1966), A Framework for Political Analysis,
Macmallan: Free Press.
Ferris, John R. (2005), Intelligence and Strategy: Selected
Essays, New York, NY: F. Cass.
Foo, Check T. and Peter H. Grinyer (1995), Sun Tzu on
Management: The Art of War in Contemporary Business
Strategy, Singapore: Butterworth-Heineman Asia.
Fukuyama, Francis (2006), America at the Crossroads,
Democracy, Power, and the Neoconservative Legacy, New
Haven: Yale University Press.
Fuller, Steve (1997), Science, Buckingham: Open University
Press.
Gabrys, Bogdan (2005), Do Smart Adaptive Systems Exist?:
Best Practice for Selection and Combination of
Intelligent Methods, Berlin: Springer.
Gilligan, Tom (2003), CIA Life: 10,000 days with the
Agency, Boston: Intelligence Book Division.
Godson, Roy (1981), Intelligence Requirements for the
1980's: Covert Action. Washington, D. C.: National
Strategy Information Center.
Godson, Roy (1995), Dirty Tricks or Trump Cards: U.S.
Covert Action and Counterintelligence, Washington, D. C.:
Brassey's.
Godson, Roy (ed.) (1980), Intelligence Requirements for the
1980's Counterintelligence, Washington, D. C.: National
Strategy Information Center.
Godson, Roy and Ernest R. May (eds) (1995), U. S.
Intelligence at the Crossroads: Agendas for Reform,
Washington, D. C.: Brassey's.
Graham, Bob (2004), Intelligence Matters: The CIA, The FBI,
Saudi Arabia, and the Failure of America's War on Terror,
New York: Random House.
Griffin, David R. (2005), The 9/11 Commission Report:
Omissions and Distortions Northampton, Mass.: Olive
Branch Press.
Griffith, Samuel B. (1963), Sun Tzu: The Art of War, New
York: Oxford University.
Gutjahr, Melanie (2005), The Intelligence Archipelago,
Washington, D. C.: Joint Military Intelligence College.
Halibozek, Edward P. (2005), Mergers and Acquisitions
Security: Corporate Reorganizations and Security
Management, Amsterdam; Boston: Elsever Butterworth
Heinemann.
Handel, Michael I. (1996), Masters of War: Classical
Strategic Thought, London: Frank Cass.
Harmon, Paul (1985), Expert System: Artificial Intelligence
in Business, New York: John Willey.
Hawkings, David E. and Shan Rajagopal (2005), Sun Tzu and
the Project Battleground: Creating ProjectStrategy
from“The Art of War”, New York: Palgrave Macmillan.
Hedges, Larry V. (1985), Statistical Methods for Meta-
Analysis, Orlando: Academic Press.
Held, David, Anthony McGRew, David Goldblatt and Jonathan
Perraton (eds.) (1999), Global Transformations: Politics,
Economics and Culture, Oxford: Polity Press.
Heywood, Andrew (2002), Politics, New York: Palgrave
Foundations.
Himanen, Mervi (2003), The Intelligence of Intelligent
Buildings: The Feasibility of the Intelligent Building
Concept in Office Buildings, Espoo: Technical Research
Centre of Finland.
Hirst, Rodney J. (1968), Philosophy: An Outline for the
Intending Student, London: Routledge & K. Paul.
Hoffmann, Paul and Terplan Kornel (2005), Intelligence
Support Systems: Technologies for Lawful Intercepts, Boca
Raton: Auerbach Publications.
Hogarth, Robin M. (1979), Judgement and Choice: The
Psychology of Decision, New York: John Wiley & Sons.
Hollingsworth, Mark and Fielding Nick (2003), Defending the
Realm: Inside MI5 and the War on Terrorism, London: Andr
Deutsch.
Holt, Pat M. (1995), Secret Intelligence and Public Policy:
A Dilemma of Democracy, Washington D. C.: CQ Press.
Holtzman, Samuel (1989), Intelligent Decision Systems,
Reading, Mass.: Addison- Wesley.
Hooker, Gregory (2005), Shaping the Plan for Operation
Iraqi Freedom: The Role of Military Intelligence
Assessments, Washington, D. C.: Washington Institute for
Near East Policy.
Hoover, Kenneth R. (1992), The Element of Social Scientific
Thinking, New York: St. Martin's.
Huntington, Samuel P. (1991), The Third Wave:
Democratization in the Late Twentieth Century, Okla:
University of Oklahoma Press.
Huntington, Samuel P. (1996), The Clash of Civilizations
and the Remaking of Word Order, New York, N. K.: Simon &
Schuster.
Jackson, Peter and Siegel Jennifer (2005), Intelligence and
Statecraft: The Use and Limits of Intelligence in
International Society, Westport, Conn.: Praeger.
Jervis, Robert (1976), Perception and Misperception in
International Politics, Princeton,
Johnson, Loch K. (1989), America's Secret Power: The CIA in
a Democratic Society, New York: Oxford University Press.
Jomini, Antoine H. (1995), The Art of War, Novato, Calif.:
Presidio Press.
Jordan, Amos A. and William J. Taylor (eds.) (1984),
American National Security: Policy and Process,
Baltimore: The Johns Hopkins University.
Kam, Ephraim (1988), Surprise Attack, Cambridge, Mass.:
Harvard University Press.
Keegan, John (2003 ), Intelligence in War: Knowledge of the
Enemy from Napoleon to Al-Qaeda, London: Hutchinson.
Keegan, John (2004), Intelligence in War: The Value--and
Limitations--of What the Military Can Learn about the
Enemy, New York: Vintage Books.
Keeney, Ralph L. and Howard Raiffa (1993), Decision with
Multiple Objective: Preferences and Value Tradeoffs, New
York: Cambridge University Press.
Kegley, Charles W. and Eugene R. Wittkopf (1981), World
Politics: Trend and Transformation, New York: St.
Martin's Press.
Kent, Sherman (1949), Strategic Intelligence for American
World Policy, New Jersey: Princeton University Press.
Kent, Sherman (1966), Strategic Intelligence for American
World Policy, New Jersey: Princeton University Press .
Kickert, Walter J. M. (1980), Organization of Decision-
Making: A Systems-Theoretical Approach, Amsterdam: North-
Holland Publishing Company.
Kirk, Geoffrey S. (1970), Myth: Its Meaning and Functions
in Ancient and Other Culture, Cambridge: University Press.
Kuper, Adam and Jessica Kuper (1985), The Social Science
Encyclopedia, London Boston and Henley: Routledge & Kegan
Paul.
Ladner, Roy and Petry Frederick E. (2005), Net-Centric
Approaches to Intelligence and National Security, New
York: Springer.
Lewin, Ronald (1978), ULTRA Goes to War, London:
Hutchinson. New Jersey: Princeton University Press.
Lindblom, Charles E. (1968), The Policy Making Process, New
York: Prentice-Hall.
Lindley, Dennis V. (1971 ), Making Decision, New York:
Wiley-Interscience.
Lowenthal, Mark M. (2000 ), Intelligence: From Secrets to
Policy, Washington, D. C.: CQ Press.
Lowenthal, Mark M. (2005), Intelligence: From Secrets to
Policy, Washington, D.C.: CQ Press.
Luger, George F. (2005), Artificial Intelligence:
Structures and Strategies for Complex Problem Solving,
New York: Addison-Wesley.
Macksey, Kenneth (2004), The Searchers: Radio Intercept in
Two World Wars, London: Cassell.
Mann, James (2004), Rise of the Vulcans: The History of
Bush's War Cabinet, New York: Penguin Books.
Markle, Donald E. (2004), Spies and Spymasters of the Civil
War, New York: Hippocrene Books.
Marshall, Kneale T. (1995), Decision Making and
Forecasting: With Emphasis on Model Building and Policy
Analysis, New York: McGraw-Hill.
Mcneilly, M. (1996), Sun Tzu and the Art of Business: Six
Strategic Principles for Managers, New York: Oxford
University.
McNeilly, Mark (2001), Sun Tzu and the Art of Modern
Warfare, New York: Oxford University.
Minford, John (2002), The Art of War: Sun Tzu, New York:
Viking.
Moens, Alexander (2004), The Foreign Policy of George W.
Bush: Values, Strategy, and Loyalty, Burlington VT:
Ashgate Publishing.
Morse, Edward L. (1976), Modernization and the
Transformation of International Relation,New York: The
Free Press.
Nath, Dilip C. (2004), Intelligence Imperatives for India,
New Delhi: India First Foundation.
National, Defense University (1996), Strategic Assessment,
Washington, D. C.: Government Printing Office.
National Security Strategy of the United States (2002),
Washington, D. C.: U. S. Government Printing Office.
Neilson, Robert E. (1997), Sun Tzu and Information Warfare,
Washington, D. C.: National Defense University.
Nguyen, Hung T. and Berlin Wu (2006), Fundamentals of
Statistics with Fuzzy Data , New York: Springer.
Nye, Joseph S. (1990), The Changing Nature of American
Power, New York: Basic Books.
Oseth, John M. (1985), Regulating U. S. Intelligence
Operations: A Study in Definition of the National
Interest, Lexington, Kentucky: The University Press of
Kentucky.
Padelford, Norman J. and George A. Lincoln (1954),
International Politics: Foundations of International
Relations, New York: Macmillan.
Perner, Petra (2002), Advance s in Data Mining:
Applications in E- Commerce, Medicine, and Knowledge
Management, Berlin: New York: Springer.
Platt, Washington (1957), Strategic Intelligence
Production: Basic Principles, New York:Frederick A.
Praeger.
Popper, Karl R. (1972), Objective Knowledge: An
Evolutionary Approach, Oxford: Clarendon Press. Press of
America.
Powers, Thomas (2004), Intelligence Wars: American Secret
History from Hitler to Al-Qaeda, New York: New York
Review Books.
Ragin, Charles C. (2000), Fuzzy Set Social Science,
Chicago: The University of Chicago.
Ranney, Austin (1996), Governing: An Introduction to
Political Science, Upper Saddle River, New Jersey:
Prentice-Hall.
Ransom, Harry H. (1970), The Intelligence Establishment,
Cambridge, Mass.: Harvard University Press.
Rappaport, Alfred (1975), Information for Decision Making:
Quantitative and Behavioral Dimensions, Englewood Cliffs,
NEW JERSEY: Prentice-Hall.
Richelson, Jeffrey (1995), The U. S. Intelligence
Community, Boulder, Colo.: Westview Press.
Ricks, Thomas E. (2006), Fiasco: The American Military
Adventure in Iraq, New York: The Penguin Press.
Roberts, Jonathan M. (1988), Decision-Making During
International Crisis, New York: St. Martin Press.
Rumbaugh, Duane M. (2003), Intelligence of Apes and Other
Rational Beings, New Heaven: Yale University Press.
Ryan, Frank X. (2002), Science, Humanism and the Scopes
Trial, Bristol, England: Thoemmes Press.
Sawyer, Ralph D. (1993), The Seven Military Classics of
Ancient China , Boulder: Westview Press.
Scanlan, Burt K. (1973), Principles of Management and
Organizational Behavior, New York: John Wiley and Sons.
Schmitt, Samuel A. (1969), Measuring Uncertainty: An
Elementary Introduction to Bayesian Statistics, Mass.:
Addison-Wesley.
Schulhofer, Stephen J. (2005), Rethinking the Patriot Act :
Keeping America Safe and Free, New York: Century
Foundation Press.
Schwarz, Brita (ed.) (1985),“Guidance for
Decision,”Handbook of System Analysis, New York: Oxford.
Shannon, Claude E. (1949), The Mathematical Theory of
Communication, Urbana: University of Illinois Press.
Shapere, Dudley (1984), Galileo: A Philosophical Study,
Chicago: University of Chicago Press.
Shulsky, Abram N. (1993), Silent Warfare: Understanding the
World of Intelligence, Washington, D. C.: Brassey's(US).
Silbert, Leslie (2004), The Intelligencer, New York: Atria
Books.
Silverman, David (1993), Interpreting Qualitative Data,
Newbury Park, CA: Sage.
Simon, Herbert A. (1957), Administrative Behavior, New
York: Macmillian.
Simon, Herbert A. (1960), The New Science of Management
Decision, New York: Harper Row.
Simon, Herbert A. (1976), Administrative Behavior, New
York: The Free Press.
Simon, Herbert A. and Allen Newell (1972), Human Problem
Solving, Englewood Cliffs, NEW JERSEY: Prentice Hall.
Simon, Herbert A. and James G. March (1958), Organization,
New York: John Wiley & Sons. Inc..
Solso, Robert L. (1988), Cognitive Psychology, Boston:
Allyn and Bacon.
Steinbruner, John D. (1974), The Cybernetic Theory of
Decision: New Dimensions of Political Analysis,
Princeton, NEW JERSEY: Princeton University Press.
Sternberg, Robert J. (1985), Beyond IQ: A Triachic Theory
of Human Intelligence, New York: Cambridge University
Press.
Symeonidis, Andreas L. and Pericles A. Mitkas (2004),
Intelligent Agents for Data Mining and Information
Retrieval, Hershey, Pa.: Idea Group Publishing.
Symeonidis, Andreas L. and Pericles A. Mitkas (2005), Agent
intelligence Through Data Mining, New York: Springer.
The Commission on the Roles and Capabilities of the United
States Intelligence Community (1996), Preparing for the
21st Century: An Appraisal of U. S. Intelligence,
Washington, D. C.: Government Printing Office.
Thomas, Gordon (2005), Gideon's Spies: The Secret History
of the Mossad, New York: Thomas Dunne Books.
Thomas, Troy S. (2004), Beneath the Surface: Intelligence
Preparation of the Battlespace for Counterterrorism,
Washington, D.C.: Joint Military Intelligence College.
Thompson, James D. (1967), Organization in Action, New
York: McGraw-Hill Book Company.
Tolstoy, Leo (1983), War and Peace, Translated by Louise
and Aylmermaude, Oxford,N. Y.; Oxford University Press.
Tuomela, Raimo (1985), Science, Action, and Reality,
Boston: Sold and Distributed in the U. S. A. and Canada
by Kluwer Academic Publishing.
Turban, Efraim (1998), Decision Support System and
Intelligent Systems, Upper Saddle River, NEW JERSEY:
Prentice Hall.
Turner, Stansfield (1985), Secrecy and Democracy: The CIA
in Transition, Boston: Houghton Mifflin Company.
Turner, Stansfield (2005), Burn before Reading: Presidents,
CIA Directors, and Secret Intelligence, New York:
Hyperion.
U. S. Government Printing Office (1975), Rockefeller
Commission Report to the President on CIA Activities with
the United States: Washington, D. C.: U. S. Government
Printing Office.
Usama, Fayyad (1996), Mining Database: Toward Algorithms
for Knowledge Discovery. Bulletin of the Technical
Committee on Data Engineering, Menlo Park, Calif.: AAAI
Press: MIT Press.
Viotti, Paul R. and Mark V. Kauppi (1993), International
Relations Theory: Realism, Pluralism, Globalism, New
York: Macmillan Publishing.
Watson, Brue W., Susan M. Watson, and Gerald W. Hoople
(1990), United States Intelligence: An Encyclopedia, New
York: Garland Publishing.
Weber, Werner (2005), Ambient Intelligence, New York:
Springer.
Weldon, Curt (2005), Countdown to Terror: The Top- Secret
Information that Could Prevent the Next Terrorist Attack
on America-and How the CIA Has Ignored it, Washington, D.
C.: Regnery Publishing.
Wiener, Norbert (1962), Cybernetics, New York: MIT Press.
Zegart, Amy (1999), Flawed by Design: The Evolution of the
CIA, JCS, and NSC, Stanford, Calif.: Stanford University
Press.
Zey, Mary (1992), Decision Making: Alternatives to Rational
Choice Mode, Newbury Park: Sage.Article in Specific Book
Boorman, Scott A. (1972 ),“Deception in Chinese
Strategy,”in William W. Whitson (ed.), The Military and
Political Power in China in the 1970's, New York:
Praeger, pp. 313-337.
Boot, Max (2004),“Myths about Neoconservatism,”in Irwin
Stelzer (ed.), Neoconservatism, London: Atlantic Books,
p. 39-55.
Daniel, Donald C. and Katherine L. Herbig
(1982),“Propositions on Military Deception,”in Donald
C. Daniel (ed.), Strategic Military Deception, New York:
Pergamon Press, pp. 3-30.
Fairbank, John K. (1974),“Introduction: Varieties of the
Chinese Military Experience,”in Edward L. Dreyer, Frank
A. Kierman and John K. Fairbank (eds.), Chinese Way in
Warfare, Cambridge Mass: Harvard University Press, pp. 2-
26.
Frei, Daniel (1978),“Introduction: The Rationales and
Implication of Crisis Research,”in Danied Frei (ed.),
International Crises and Crisis Management: An East-West
Symposium, New York: Praeger Publishing, pp. 1-3.
Hastedt, Glenn (1991),“Controlling Intelligence: Defining
the Problem,”in Glenn Hastedt (ed.), Controlling
Intelligence, London: Frank Cass & Co.Ltd., pp. 3-23.
Heyman, Hans (1985),“Intelligence/Policy
Relationships,”in Alfred C. Maurer, Marion D. Tunstall,
and James M. Keagle (eds.), Intelligence: Policy and
Process , Boulder: Westview Press, pp. 57-66.
Kast, Fremont E. and James E. Rosenzweig (1972), “The
Modern View: A Systems Approach,”in John B. Ronald
(ed.), Systems Behavior, New York: Harper, pp. 14-28.
Patrick, Watson (1995),“The FBI's Changing Mission”in Roy
Godson, Ernest R. May and Gary Schmitt (eds.), U.S.
Intelligence at the Crossroads: Agendas for Reform,
Washington, D.C: Brassey's, pp. 145-162.
Ransom, Harry Howe (1987),“The Politicization of
Intelligence,”in Stephen J. Cimbala (ed.), Intelligence
and Intelligence Policy in a Democratic Society , New
York: Dobbes Ferry, Transnational Publishing, p. 55-72.
Reitman, Walter R. (1964), “Heuristic Decision Procedures,
Open Constraints, and the Structure of Ill-Defined
Problems ,” in Maynard Shelley and Glenn L. Bryan
(eds.), Human Judgments and Optimality, New York: Wiley &
Sons, pp. 282-315.
Shulsky, Abram N. (1995),“What is Intelligence? Secrets
and Competition Among State,”in Roy Godson, Ernest R.
May, and Gary Schmitt (eds.), U. S. Intelligence at the
Crossroad: Agendas for Reform, Washington D. C.:
Brassey's, pp. 22-45.
Simon, Herbert A. (1978),“Information-Processing of Human
Problem Solving,”In William K. Estes (ed.) , Handbook of
Learning and Cognitive Processes, New York: Distributed
by the Halsted Press Division of Wiley, pp. 271-295.
Thomas, Stafford T. (1985),“Intelligence Production and
Consumption: A Framework of Analysis,”in Alfred C.
Maurer, Marion D. Tunstall, and James M. Keagle
(eds.),Intelligence: Policy and Process, Boulder,
Co1o.: Westview Press, pp. 125-139.
Sullivan, David S. (1980),“Evaluation U.S. Intelligence
Estimates,”in Roy Godson (ed.) , Intelligence
Requirements for the 1980s: Analysis and Estimate, New
Brunswick: Transaction Books, pp. 49-73.
Tipson, Frederick S. (1990),“National Security and the
Role of Law,”in John N. Moore (ed.), National Security
Law, Durham, N. C.: Carolina Academic Press, pp. 3-29.
Yovits, Marshall C. (1974),“A Generalized Concept for
Analysis of Information,” in Anthony Debons (ed.),
Information Science: Search for Identity, New York:
Marcel Dekker, pp. 25-47.
Articles
Abenheim, Donald (2003),“Germany and the United States in
the Age of Terror Ideas, Domestic, and the International
System of States,”Naval War College Review, No. 4, pp.
62-82.
Amos, Kovacs (1997),“Using Intelligence,”Intelligence and
National Security, Vol. 12, No. 4, pp. 145-164.
Arquilla, John (1994),“The Strategic Implications of
Information Dominance,”Strategic Review, Summer. May,
pp. 24-30.
Betts, Richard K. (1978),“Analysis, Wars, and Decision:
Why Intelligence Failures are Inevitable,”World
Politics, Vol. 31, No. 1, pp. 61-89.
Binnendijk, Hans (1997),“Tin Cup Diplomacy,”The National
Interest, No. 49, pp. 88-91.
Brecher, Michael (1973),“Image, Process and Feedback in
Foreign Policy,”American Political Science Review, Vol.
67, No. 1, pp. 74-97.
Brookes, Bertram C. (1980),“The Foundation of Information
Science. Part I. Philosophical Aspects,”Journal of
Information Science, Vol. 2, No. 3, pp. 126-142.
Cartwright, Dorwing (1949),“Some Principles of Mass
Persuasion: Selected Findings of Research on the Sale of
U. S. War Bonds,”Human Relation, N0. 2, pp. 253-268.
Cimbala Stephen J. (1988),“What Kind of War
Plan?”Airpower Journal, No. Summer.
<Http://www.airpower.maxwell.af.mil/
airchronicles/apj/apj88/sum88/cimbala.html>
Cishan, Ruan (2003),“11.‘Soft Hegemony’Hurts Sino-
U.S.Relation,”Chinese Education and Society, Vol. 36 ,
No. 1, pp. 79-81.
Cooper, Eunica and Marie Jahoda (1947),“The Evasion of
Propaganda: How Prejudiced Peopler Respond to Anti-
Propaganda Propaganda,”Journal of Psychology, No. 23,
pp. 11-26.
Dehghanpisheh, Babak (2007),“Apocalypse Now; Iraqi Forces
Struggle in the Battle Against a Shadowy Shiite Death
Cult. And that's Only a Small Part of the Problems
They're facing in Iraq's south,”Newsweek , Vol. 149 ,
No. 6, p.36.
Deng, Ju-Long (1982),“Control Problems of Grey Systems,”
System and Control Letters, Vol. 1, No. 5, pp. 288-294.
Desouza, Kevin C. (2001),“Intelligence Agents for
Competitive Intelligence:Survey of
Application,”Competitive Intelligence Review, Vol. 12,
No. 4, pp. 57-63.
Doran, Michael S. (2003),“Palestine, Iraq, and American
Strategy,”Foreign Affairs, Vol. 82, No.1, pp. 19-24.
Edwards, Ward (1954),“The Theory of Decision
Making,”Psychological Bulletin, Vol. 51, No. 4, pp. 380-
417.
Farradane, Jason (1980),“Knowledge, Information, and
Information science,”Journal of Information Science,
Vol. 2, No. 2, pp. 70-88.
Frigo, Mark L. (2003),“Strategy or Execution,”Strategic
Finance, Vol. 84, No. 9, pp.9-11.
Goodman, Allan (1984),“Dateline Langley: Fixing the
Intelligence Mess,”Foreign Policy, No. 57, pp. 161-179.
Haddock, Seigfried C. (2006),“The Dangers of
Unilateralism,”NWSA Journal, Vol. 18,No. 3, pp. 23-33.
Hall, Stuart (1980),“Culture Studies: Two
Paradigms,”Media Culture and Society, No. 2, pp. 57-72.
Hammarstrom Mats (1995),“Theory-Building in the Study of
Crises,”Journal of Peace Research, Vol. 32, No. 2, pp.
233-251.
Hermann, Margaret G. and Thomas Preston (eds.) (2001),“Who
Leads Matters The Effects of Powerful
Individual,”International Studies Review, Vol. 3, No. 2,
pp.83-131.
Holzman, Franklyn D. (1989),“Politics and Guesswork: CIA
and DIA Estimates of Soviet Military depending,”
International Security, Vol. 14, No. 2, pp. 101-131.
Jabar, Faleh A. (2003), “Opposing War Is Good, but Not
Good Enough,” The Progressive, Vol. 67, No. 1, pp. 20-23.
Jervis, Robert (2003),“Understanding the Bush Doctrine,”
Political Science Quarterly,Vol. 118, No. 3, pp. 365-388.
Kassop, Nancy (2003),“The War Power and Its Limits ,”
Presidential Studies Quarterly,Vol. 33, No. 3, pp. 509-
520.
Kennan, George (1947),“The Sources of Soviet Conduct,”
Foreign Affair, Vol. 25, No. 4,pp. 566-582.
Knorr, Klaus (1964),“Failures in Nation Intelligence
Estimate: The Case of the Cuba Missiles,”World Politics,
No. 16, April, pp. 455-475.
Kovacs, Amos (1997),“Using Intelligence,”Intelligence and
National Security, Vol. 12, No. 4, p. 145-164.
Kuncken, Jennifer (2006),“A Brief Guide to Islam,”Library
Journal, Vol. 131, No. 6, p.99.
Lebow, Richard N. (1987),“Is Crisis Management Always
Possible?”Political Science Quarterly, Vol. 102, No. 2,
pp. 181-192.
Lijphart, Arend (1971),“Comparative Politics and the
Comparative Method,”American Political Science Review,
No. 3, pp. 682-693.
Lyles, Marjorie A. and Ian I. Mitroff (1980),“
Organizational Problem Formulation: An Empirical
Study,”Administrative Science Quarterly, Vol. 25, No. 1,
pp. 102-119.
Miller, George A. (1956),“The Magical Number Seven, Plus
or Minus Two: Some Limits on Our Capacity for Processing
Information,”The Psychological Review, No. 63, pp. 81-97.
Nordland, Rod and Babak Dehghanpisheh (2007 ),“Surge of
Suicide Bombers; The Iraq War Has Turned into A
Veritable 'Martyr' Factory, Unlike Any Seen in Previous
Conflicts ,”Newsweek, Vol. 150, No. 7, pp. 30-33.
Philip, Gordon (2002),“NATO After 11 September,”Surival,
Vol. 43, No. 4, pp. 89-106.
Prescott, John E. and Craig Fleisher (1991),“SCIP: Who We
Are and What We Do,”Competitive Intelligence Review,
Vol. 2, No. 1, pp. 22-26.
Rice, Condoleezza (2000),“Promoting the National
Interest,”Foreign Affairs, Vol. 79,No. 1, pp. 45-62.
Rothschild, Emma (1995),“What is Security,”Daedalus, Vol.
124, N0. 3, pp. 53-99.
Rumsfeld, Donald H. (2002 ),“Transforming the Military,”
Foreign Affair, Vol. 81, No.3, pp. 20-32.
Saaty, Thomas L. (1986),“Axiomatic Foundation of Analytic
Hierarchy Process,” Management Science, Vol. 32, No. 7,
pp. 778-790.
Sapir, Edward (1935),“Communication, ”Encyclopedia of
Social Sciences, Vol. 1, No. 4, pp. 75- 80.
Schrodt, Philip A., Shannon G. David and Judith L. Weddle
(1994),“Political Science: KED-A Program for the Maching
Coding of Event Data,”Social Science Computer Review,
Vol. 12, No. 3, pp. 561-588.
Schwenk, Charles R. (1984),“Cognitive Simplification
Processes in Strategic Decision-Making,”Strategic
Management Journal, Vol. 5, No. 2, pp. 111-128.
Smith, Gerald F. (1989),“Managerial Problem
Identification,”OMEGA, Vol. 17, No. 1, pp. 27-36.
Sproles, Claudene (2007),“Muslim Sects and Militant
Groups,”Choice, Vol. 45, No. 1, pp. 43-55.
Stephen, Soto (2001),“Competitive Intelligence Methods for
System and Cultural Analysis,”Competitive Intelligence
Review, Vol. 12, No. 3, pp. 31-34.
Stuckey, Mary E. and Joshua R. Ritter (2007),“George Bush,
, and American Democracy,”Presidential
Studies Quarterly , Vol. 37, No. 4, pp. 646-667.
Talbott, Strobe (1996 ),“Democracy and the National
Interest,”Foreign Affairs, Vol. 75, No. 6, pp. 47-64.
Taylor, Ronald N. (1975),“Perception of Problem
Constraints ,”Management Science,Vol. 22, No. 1, pp. 22-
29.
Theil, Stefan and Christopher Dickey (2003),“Saddam's
Bunkers,”Newsweek ,Vol. 141,No. 14, pp. 48- 49.
Thomas, Stafford T. (1988),“Assesing Current Intelligence
Studies,”International Journal of Intelligence and
Counterintelligence, Vol. 2, No. 2, pp. 217-244.
Troy, Thomas F. (1991),“The‘Correct’Definition of
Intelligence,”International Journal of Intelligence and
Counterintelligence, Vol. 5, No. 4, pp. 433-454.
Ungson, Gerardo R. and Daniel N. Braunstein (eds.)
(1981),“Managerial Information processing: A Research
Review,”Administrative Science Quarterly, Vol. 26, No.
1,pp. 116-138.
Wolffe, Richard and Michael Hirsh (2003),“ War and
Consequences,”Newsweek, Vol. 141, No. 5, pp. 22-29.
Yusin, Maksim (2003),“Donald Rumsfeld's Three
Fronts, ”The Current Digest of the Post-Soviet Press,
Vol. 54, No. 52, pp. 3-13.
Zadeh, Lisa A. (1965),“Fuzzy Set,” Information Control,
No. 8, pp. 338-353.
Zagotta, Robert and Don Robbinson (2002),“Key to
Successful Strategy Execution,”Journal of Business
Strategy, Vol. 23, No. 1, pp. 30-34.
Zunde, Pranas (1981),“Information Theory and Information
Science,”Information Processing and Management, Vol. 17,
No. 6, pp. 341-347.
Newspaper & Magazine
Albright, Madeleine E. (2002),“Where Iraq Fits in the War
on Terror,”The New York Times, September 20.
<http://query.nytimes.com/gst/fullpage.html>
Ali, Ahmed (2007),“IRAQ: Death Threats and Attacks Force
Familes to Flee,”Global Information Network, November
6.
<http://www.globalinfo.org/default.asp>
Andrew, Buncombe (2003),“Cheney Under Pressure to Quit
Over False War Evidence,”The INDEPENDENT, July 16.
<http://news.independent.co.uk/world/politics/
article96352.ece>
Borger, Julian (2003),“Iraq: After the War: France Will
Pay for Opposition Says Powell: Administration's Dove
Suggests Trouble Ahead as new UN Confrontation Looms
Over Sanctions ,”Guardian Unlimited, April 24.
<http://www.guardian.co.uk/frontpages/story/o,,1928039,
oo.html>.
Bowers, Faye,“Driving Forces in War-Wary Nations: The
Stances of France, Germany,Russia and China Are Colored
by Economic and National Interests,”Christian Science
Monitor, February 25.
<http://www.mondotimes.com/2/topics/5/news/1/2802>.
Bumiller, Elisabeth and David E. Sanger (2006),“Traces of
Terror: The President; Bush, as Terror Inquiry Swirls,
Seeks Cabinet Post on Security,”The New York Times, June
7.
<http://query.nytimes.com/gst/fullpage.html>
Calabresi, Massimo andTimothy J. Burger (2003),“Who Lost
the WMD,”Time, June 29.
<http://www.time.com/time/magazine/article/0,9171,
1101030707-461781,00.html>
Colachal, Abdul R. (2007),“Dynamism in Russia-China
Relations: A study,”What Really Happened. Com, October
14.
<http://www.whatreallyhappened.com/>
Dan, Balz and Abramowitz Michael (2006),“President Tries
to Win Over a War-Weary Nation,”The Washington Post,
September 12.
<http://www.washingtonpost.com/>
Depalma, Anthony (2003),“Threats and Responses: An
Overview: March 19-20, 2003; Starting a War, Appealing
for Surrender and Pulling Out the Networks,”The New
York Times, March 20.
<http: //query.nytimes.com/gst/fullpage.html>
Diamond, John and Susan Page (2003),“Bush Signals He May
Skip U. N.; Plan: Issue Iraq an Ultimatum Instead,”USA
TODAY, Mar 14.
<http://wap.usatoday.com/>
Elliott, Michael (2002),“The Selling of the President's
War,”Time, November 11.
<http://www.time.com/time/columnist/elliott/
article/0,9565,389085,00.html>
Ewen, MacAskill and Borge Julian (2006),“Iraq Mayhem
Triggers Hunt for Exit Strategy in US and UK,”Guardian
Unlimited, October 21.
<http://www. guardian.co.uk/frontpages/story/o,,
1928039,oo.html>
FitzGerald, Frances (2002),“Threat of War: How Hawks
Captured the White House: When the Soviet Threat
Vanished, the Purpose of American Foreign Policy Seemed
to Go with It-Until September 11 and Iraq's Regime,”
Guardian Unlimited,September 24.
<http://www.guardian. co.uk/ frontpages/
story/o,,,oo.html>
Lemann, Nicholas (2002),“The Next World Order: The Bush
Administration May Have a Brand New Doctrine of
Power,”The New Yorker, February 1.
<http://www.newyorker.com/fact/content/?02401fa_FACT1>
Lemann, Nicholas (2003),“After Iraq: The Plan to Remake
the Middle East,”The New Yorker, February 17.
<http://www.newyorker.com/fact/content/?02401fa_FACT1>
Ignatieff, Michael (2003),“Mission: Rebuild Iraq, Looking
for Leader Amid the Ashes,”The New York Times Magazine,
January 5.
<http://www.nytimes.com/pages/magazine/>
Mark, Mazzetti (2006),“Spy Agencies Say Iraq War Worsens
Terrorism Threat,”The New York Times, September 24.
<http://www.nytimes.com/page/todayspaper/index.html>
Melloan, George (2004),“Why No WMDs? Saddam Was Playing a
Shell Game,”The Wall Street Journal, February 3.
<http://online.wsj.com/article/
SB118289311361649057.html>
Miller, Greg (2003),“Showdown with Iraq; Democracy Domino
Theory 'Not Credible'; A State Department Report Disputes
Bush's Claim that Ousting Hussein Will Spur Reforms in
The Mideast, Intelligence Officials Say,”Los Angeles
Times, March 14.
<http://www.latimes.com/>
Mulrine, Anna (2006),“'Civil War' or Not?; While U. S.
Pols and Pundits Debate Labels, Iraqis Fear Their Country
is Sliding Deeper into The Abyss,”U. S. News & World
Report, December 11.
<http://www.britannica. com/eb/article-9074508/US-News-
World-Report>
Neary, Lynn (2003),“Analysis: Intelligence Analysts React
to Colin Powell's Speech,”All Things
Considered ,February 6.
<http://www.npr.org/templates/rundowns/rundown.php?
prgId=2>
O'brien, Timothy L. (2003),“Threats and Responses:
Monitoring; U. N. Group Finds No Hussein-Al Qaeda
link,”The New York Times, June 27.
<http://www.nytimes. com/ page/todayspaper/index.html>
Page, Susan (2005),“Bush Poll Ratings Slide to New
Low,”USA Today, November 15.
<http:// wap.usatoday.com/>
Pincus, Walter and Dana Priest (2003),“Analysts Cite
Pressure on Iraq Judgement,”The Washington Post, June 5.
<http://www.washingtonpost.com/>.
Ponnuru, Ramesh (2003),“Getting to The Bottom of
This 'Neo' Nonsense: Before you Talk about Conservatives,
Know What You're Doing,”National Review, June 16.
<http://www. sourcewatch.org /index.php?
title=National_Review>
Ponnuru, Ramesh (2003),“Getting to the Bottom of This Neo,
Nonsense: Before you Talk about Conservatives, Know What
You're Doing,”Nation Review, June 16.
<http:// www. sourcewatch. org/index.php?
title=National_Review>
Spratt, John (2007),“Monitoring War Costs,”Knight Ridder
Tribune Business News. January 22.
<http://www.dialogselect.com/business/forms/
BusIndustryFinancialAll.html>
(2002), The White House,“President Bush Delivers
Graduation Speech at West Point,” June 1.
<http://www.whitehouse.gov/news/releases/
2002/06/20020601-3.html>.
(2002),“Fact Sheet:Redesigning DOJ to Prevent Future Acts
of Terrorism,”U. S. Department of State, May 29.
<http://www.state.gov/>
(2002),“Mueller Cites Changes in FBI to Enhance Fight on
Terrorism Director Testifies before Joint House-Senate
Intelligence Panel,”U. S. Department of State, October
17.
<http://www.state.gov/>
(2002),“Report: U. N. Working on Secret Contingency Plans
for War; Iraq: CIA Allowed to Direct Inspectors,”Al
Bawaba , December 23.
<http://www.albawaba.com/en/news/>.
(2002), The White House,“President Delivers State of the
Union Address,”January 29.
<http://www.whitehouse.gov/news/releases/
2002/01/20020129-11.html>
(2003), The White House,“President Discuss The Future of
Iraq,”February 23.
<http://www.whitehouse.gov/news/releases/
2003/02/20030226-11.html>
(2003),“Was the Intelligence Cooked?”The New York Times,
Jun 8.
<http:// www. nytimes. com/page/todayspaper/index.html>
(2003),“Newspapers Across Europe Look Nervously on as a US-
led War Against Iraq Seems Increasingly Inevitable,”BBC,
March 18.
<http://news.bbc.co.uk/2/hi/europe/2859359.stm>
(2003), The White House,“Remarks by The Vice President to
The American Society of News Editors,”April 9.
<http://www.whitehouse.gov/news/releases/
2002/04/20020411-7.html>.
(2004),“Judging Intelligence; The Senators' Views and
Excerpts from the Report on Iraq Assessments,”The New
York Times, July 10.
<http://www.nytimes. com/page/ todayspaper/ index. html
>.
(2006),“Reply Letters and Emails: US Elections: The New
Republic,”Guardian Unlimited, October13.
<http://www.guardian.co.uk/frontpages/story/
o,,1928039,oo.html>
(2007),“American Casualties and 'Bravery' Plummet Iraqi
Civilian Casualties and Resistance Rise,”Free Iraq,
October 26.
<http://abutamam.blogspot.com/>
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
:::
無相關著作
 
QR Code
QRCODE