Search Results

You are looking at 1 - 10 of 13 items for :

  • social network analysis x
  • Military Policy x
Clear All
Open access

Hakan Güreşci and Recep Sait Arpat

page, http://www.merriamwebster.com/dictionary/crisis, Accessed on: 18.08.2014. Metropolitan Police Service - Homepage". Met.police.uk, Accessed on: 16.04.2015. Karaman M., Çatalkaya H., Institutional Cybersecurity: A Case Study of Open Source Intelligence and Social Networks, ICMMSS, 2014, s. Reports of an incident at Liverpool Street Station, 7 Temmuz 2005, Accessed on: 16.04.2015. ‘Queens of the Stone Age’. The Guardian (London), 26 Ağustos 2005, Accessed on: 16.04.2015.

Open access

Lithuanian Annual Strategic Review

The Journal of Military Academy of Lithuania

Open access

Samer Al-Khateeb and Nitin Agarwal

Understanding Botnets. Cambridge, MA. Kumar, S., Barbier, G., Abbasi, M.A., Liu, H., 2011. TweetTracker: An Analysis Tool for Humanitarian and Disaster Relief., in: ICWSM. Labatut, V., Dugue, N., Perez, A., 2014. Identifying the Community Roles of Social Capitalists in the Twitter Network. Presented at the IEEE/ACM International Conference on Advances in Social Network Analysis and Mining (ASONAM), China. doi: 10.1109/ASONAM.2014.6921612 Nissen, T.E., 2015. #TheWeaponizationOfSocialMedia. Protalinski, E., 2012

Open access

Rino Bandlitz Johansen, Monica Martinussen and Nils Kvilvang

psychological distress of soldiers during modern military operations: Building a network of relationships among morale and psychological distress. Paper presented at the IMTA conference, Amsterdam. Van Dick, R., Wagner, U., Stellmacher, O.C., & Christ, O. (2005). To be(long) or not to be(long): Social identification in organizational contexts. Genetic, Social and General Psychology Monographs, 13, 189-218. Vinokur, A. D., Pierce, P. F., Lewandowski-Romps, L., Hobfoll, S. E., & Galea, S. (2011). Effects of war exposure on air force personnel

Open access

Hans-Joachim Klaus Ruff-Stahl

,1518,600567,00.html (accessed 9 January 2012). Reason, James. Human Error. Cambridge: Cambridge University Press, 1990. Reason, James. "Human Error: Models and Management." Western Journal of Medicine 172, no. 6 (June 2000): 393-396. —. Managing the Risks of Organizational Accidents. Burlington, VT: Ashgate, 1997. Ritchey, Tom. Wicked Problems - Social Messes: Decision Support Modeling with Morphological Analysis. Berlin: Springer, 2011. Ruff-Stahl, Hans-Joachim. Medienkriege. Wiesbaden: Verlag fuer

Open access

Johan Sigholm

, G., “4chan and /b/: An Analysis of Anonymity and Ephemerality in a Large Online Community,” In Proc. Fifth International AAAI Conference on Weblogs and Social Media (ICWSM-11), Jul. 2011. [9] Bhattacharjee, Y., “How a Remote Town in Romania Has Become Cybercrime Central,” Wired Magazine, Jan. 31 2011. Available: http://www.wired.com/magazine/2011/01/ff_hackerville_romania/ [10] Bradbury, D., “The Spy Who Hacked Me,” Infosecurity, Vol 8 Issue 5, Elsevier, Sep./Oct. 2011. [11] Cabinet Office of the United Kingdom

Open access

Alicia Ohlsson, Erik Hedlund and Gerry Larsson

highest (strongly agree). As mentioned in the Introduction section, these items are categorized into four dimensions: (1) networking ability, (2) apparent sincerity, (3) social astuteness and (4) interpersonal influence. The scale also offers a total score reflecting an individual’s Political skill ability and is often operationalized as a total score in the literature (e.g. Blickle et al. 2008 ; Huang et al. 2013 ; Shi et al. 2013 ). Our analysis used the total scale score, which had a Cronbach’s alpha value of 0.91. 2.5.4 Team performance Participants

Open access

Ricardo G. Lugo, Stefan Sütterlin, Benjamin J. Knox, Øyvind Jøsok, Kirsi Helkala and Natalie Marie Lande

consent prior to the study and were debriefed about the study’s purpose after completing the data collection. Participants were informed that they could withdraw from participation at any time and without any consequences throughout and after the session. The study was approved by the Norwegian Social Science Data Services (NSD; project number 43901) and conformed to the NDCA’s ethical guidelines for experimental studies. 2.5 Data reduction and statistical analysis Statistical analysis was done with SPSS v.22. The SPSS script for the moderation analysis

Open access

Helga Myrseth, Olav Kjellevold Olsen, Einar Kristian Borud and Leif Åge Strand

type. In the crude logistic regression analyses in which presence of gaming problems was entered as the criterion variable (0 = nonproblem gaming, 1 = problem gaming), six of the 12 predictor variables (social motivation, coping motivation, enhancement motivation, depression, boredom proneness – lack of internal stimulation, and loneliness) showed a significant relationship with gaming problems, but only two of these (enhancement motivation and lack of internal stimulation) remained significant in the adjusted analysis ( Tab. 3 ). Tab. 3 Predictors of

Open access

G.L.A. Harris, Ayanna Shivers and Patricia Deuster

, V.E., Talbot, L., Jonas, W., and Friedl, K. 2007. Military Medicine, 172, 1133-1137. Directory of HBCU Distance Learning Programs. http://www.dll.org/hbcus/DistanceLearning/deafult.htm. Retrieved July 23, 2010. Directory of HBCU Programs for Nontraditional Students. http://dll.org/hbcus/NonTraditionalStudents/default,htm. Retrieved July 23, 2010. Dudfield, Helen. 2009. The Development of shared Mental Models during Air Battlespace Collective Training using Dispersed Networked Systems. The Research and Technology