Източници на латиница


Anderson et al. 2009: Anderson, Richard, et al. Risk Management and Corporate Governance. OECD, 30.04.2009, oecd.org, PDF, 49 p., url

Armitage, Nye, Jr. 2007: Armitage, Richard, and Joseph Nye, Jr. “Smart Power” and the U.S. Strategy for Security in a Post-9/11 World. Washington: CSIS, 07.11.2007, nationalsecurity.oversight.house.gov, PDF, 15 p.

ATP 2-22.9 2017: Open-Source Intelligence (U). Army Techniques Publication No. 2-22.9. Marine Corps Reference Publication No. 2-JOA.3. ATP 2-22.9/MCRP 2-10A.3. Washington, D.C.: Headquarters, Department of the Army – Quantico, Virginia: Headquarters, United States Marine Corps, 30 June 2017, fas.org, PDF, 92 p., url

Baker 2002: Baker, Kathryn. Organizational Culture. Chapter 11. – In: Communication. Management Benchmark Study. Washington, 2002, au.af.mil, PDF, 13 p.

Bara et al. 2001: Bara, Bruno, et al. Model Theory of Deduction: A Unified Computational Approach (2001, 63 p.) – In: Cognitive Science 25 (2001) p. 839-901. elsevier.com, PDF, 63 p. 

Belvedere 2019: Belvedere, Berny. Are Facts And Opinions Really So Different? – Arc Digital. Ashburn, Virginia, arcdigital.media, 29.12.2019, HTML, url

BHRC 2011: Bar Human Rights Committee. Types of Questioning and Interviewing Techiniques. Niger Delta Child Rights Watch Project Resources. London: Bar Human Rights Committee (BHRC), November 2011, barhumanrights. org.uk, PDF, 4 p., url

Blackburn 2007: Blackburn, Perry. The Code Model of Communication: A Powerful Metaphor in Linguistic Metatheory. Washington: Library of Congress, SIL International, 2007, sil.org, PDF, 263 p. 

Bood, Postma 1998: Bood, Robert P., and Theo J. B. M. Postma. Scenario Analysis as a Strategic Management Tool. University of Groningen, Faculty of Economics, Department of Management and Organisation, 1998, ecsocman.hse.ru, PDF, 38 p., url

Borek 2017: Borek, John Joseph. Analytic Tradecraft in the U.S. Intelligence Community. Walden University ScholarWorks. Walden Dissertations and Doctoral Studies Collection. Walden University, 19.07.2017, scholarworks.waldenu. edu, PDF, 164 p., url

Botterman et al. 2009: Botterman, Sarah, et al. Between Community and Society: Investigating the Dimensions of Social Cohesion. An Empirical Study on Social Cohesion Indicators of Belgian Communities. Paper Presented at the International Conference “From GDP to Well-Being: Economics on the Road to Sustainability”. Ancona, 3-5 December 2009, soc.kuleuven.be, PDF, 24 p.

Brundtland 1987: Brundtland Commission. Report of the World Commission on Environment and Development (WCED): Our Common Future. United Nations (UN), 04.08.1987, un.org, PDF, 374 p., url

Budriūnaitė 2014: Budriūnaitė, Agnė. The Tension Between Illusion and Reality in Zhuangzi’s ‘Dream of the Butterfly’. Philosophical Analysis of the Western Reception. – The Polish Journal of Aesthetics, Vol. 32 (1/2014), academia.edu, PDF, 16 p. (pp. 137-152).

Bulmer 2011: Bulmer, Sandra Lindsay. How Do Brands Affect National Identity? The University of Auckland, 2011, researchspace.auckland.ac.nz, PDF, 361 p., url

Burchill et al. 2005: Burchill, Scott, et al. Theories of International Relations. Third Edition. New York: Palgrave MacMillan, 2005, palgrave.com, PDF, 61 p., access: 03.02.2009; updated reference: lib.jnu.ac.in, PDF, 321 p., url

Burns et al. 2014: Burns, Michele, et al. A Framework for Sustainable Security Systems. World Economic Forum: Global Agenda Council on Social Security Systems, August 2014, weforum.org, PDF, 100 p., url

Cacciattolo 2014: Cacciattolo, Karen. Understanding Organisational Cultures. – European Scientific Journal, November 2014, special edition, vol. 2 ISSN: 1857 – 7881 (Print) e-ISSN 1857-7431, eujournal.org, PDF, 7 p.

Canter et al. 2007: Canter, Larry, et al. NEPA Analysis Guidance Manual. Aberdeen Proving Ground, May 2007, aec.army.mil, PDF, 81 p., url

CAP 2009: Sustainable Security 101. Why We Need a New Security Paradigm. Washington, D.C.: Center for American Progress (CAP), cdn. americanprogress.org, 08.08.2009, PDF, 4 p., url

Carmona et al. 2007: Carmona, Jack Burga, et al. Strategic Management Toolkit. Handbook. From Mission to Action. Management Series for Microfinance Institutions. Warsaw: Microfinance Centre for Central and Eastern Europe and the New Independent States, March 2007, microfinancegateway.org, PDF, 110 p., url

Carter 2000: Carter, Bradley. Differentiation and Social Cohesion: Returning to Durkheim for a Theory of Deviance. A Thesis in Sociology. Lubbock, Texas, USA, August 2000, etd.lib.ttu.edu, PDF, 62 p.

Cellucci 2008: Cellucci, Carlo. The Scope of Logic: Deduction, Abduction, Analogy. Roma, 2008, uniroma1.it, PDF, 16 p.

Charney, Irvin 2014: Charney, David L., M.D. and John A. Irvin. A Guide to the Psychology of Espionage. Draft (This draft article will appear in a future edition of AFIO's Intelligencer Journal) Falls Church, Virginia 22043: Association of Former Intelligence Officers (AFIO), 28.08.2014, cyberwar.nl, PDF, 10 p., url

Chifu 2009: Chifu, Iulian. Societal Security. An Agenda for the Eastern Europe. Bucharest: Center for Conflict Prevention and Early Warning, cpc-ew.ro, 22.03.2009, PDF, 18 p., url

CHS 2003: Commission on Human Security (CHS). Human Security Now. New York, 2003, reliefweb.int, PDF, 168 p., url

CHS 2003: Commission on Human Security (CHS). Human Security Now. New York, 2003, reliefweb.int, PDF, 168 p.

CIA 2000: Strategic Investment Plan for Intelligence Community Analysis. ADCI/AP 2000-01. CIA, 2000-2001, fas.org, PDF, 78 p., url

CIA 2009: A Tradecraft Primer: Structured Analytic Techniques for Improving Intelligence Analysis. Prepared by the US Government. CIA, March 2009, Posted: May 04, 2009 11:31 AM. Last Updated: May 04, 2009 01:16 PM, cia.gov, PDF, 45 p., url

Clift et al. 2005: Clift, A. Denis, et al. Learning with Professionals: Selected Works from the Joint Military Intelligence College. A collection of previously published works by students and members of the faculty of the Joint Military Intelligence College. Washington, D.C.: Joint Military Intelligence College, 17 July 2005, ni-u.edu, PDF, 345 p., url

Cohen 2001: Cohen, David. ACT-ON. A Tool for Assessing Your Environment and Creating an Initial Strategic Plan. Adapted from Cohen, David; de la Vega, Rosa, and Watson. Advocacy for Social Justice: A Global Action and Reflection Guide, Chapter 2,  Connecticut, USA: Kumarian Press Inc., 2001, internationalbudget.org, PDF, 2 p., url

COM(2001): Commission of the European Communities. Structural Indicators. COM(2001) 619 final. Brussels, 30.10.2001, ec.europa.eu, PDF, 21 p., access: 30.06.2010; updated reference: ec.europa.eu, PDF, 21 p., url

Cozzo 2002: Cozzo, Cesare. Epistemic Truth and Excluded Middle. Roma, 2002, uniroma1.it, PDF, 35 p. 

CSS 2008: Risk Analysis. Focal Report 1. Zurich, ETH – Swiss Federal Institute of Technology, Center for Security Studies (CSS), Crisis and Risk Network (CRN), 2008, bevoelkerungsschutz.admin.ch, PDF, 34 p., url

Curry, Schultz 2009: Curry, Andrew, and Wendy Schultz. Roads Less Travelled: Different Methods, Different Futures, pp. 35-60. – In: Journal of Futures Studies. Taipei, Taiwan, May 2009, 13(4), citeseerx.ist.psu.edu, PDF, 26 p., url

Damodaran 2010: Damodaran, Aswath. Risk Management: A Corporate Governance Manual. New York, 2010, people.stern.nyu.edu, PDF, 113 p., url

Davies et al. 2003: Davies, Islay, et al. Using Meta Models for the Comparison of Ontologies. Hammamet, Tunisia, 2003, emmsad.org, PDF, 10 p., access: 21.09.2009; updated reference: eprints.qut.edu.au, PDF, 9 p., url

Davis 2002: Davis, Jack. Improving CIA Analytic Performance: Strategic Warning. Washington, 2002, au.af.mil, PDF, 9 p.

Davis: Davis, Lynn. Globalization’s Security Implications. Issue Paper. RAND Corporation, 2005, rand.org, IP245, PDF, 8 p.

De Leeuw, Hox, Dillman 2008: De Leeuw, Edith D., Joop J. Hox, and Don A. Dillman. International Handbook of Survey Methodology. New York – London: European Association of Methodology, Lawrence Erlbaum Assotiates, Taylor & Francis, 2008, joophox.net, PDF, 558 p., url

Devlin 2005: Devlin, Keith. Confronting Context Effects in Intelligence Analysis: How Can Mathematics Help? Stanford, 2005, stanford.edu, PDF, 70 p. 

Dickes et al. 2009: Dickes, Paul, et al. Social Cohesion: Measurement Based on the Data from European Value Study. Luxembourg, 2009, epp.eurostat.ec.europa.eu, PDF, 13 p., access: 28.05.2010, ec.europa.eu, PDF, 13 p., access: 28.05.2010; updated reference: access: 16.01.2022, url

Dinakar 2009: Dinakar, Divya. Knowledge Management Models. A Compilation of Various Knowledge Management Models in Practice. North Carolina State University, Spring 2009, semanticscholar.org, PDF, 13 p., url

Drew, Snow 2006: Drew, Dennis, and Donald Snow. Making Twenty-First-Century Strategy: An Introduction to Modern National Security Processes and Problems. Air University Press, Maxwell Air Force Base, Alabama, 2006, PDF, 289 p., url

Duncan et al. 2007: Duncan, Howard, et al. Social Cohesion. Ottawa: Metropolis World Bulletin, September 2007, canada.metropolis.net, PDF, 32 p.

Eisenberg 2002: Eisenberg, Avigail. Pluralism, Consociationalism, Group Differentiated Citizenship and the Problem of Social Cohesion. Victoria, British Columbia, Canada, 2002, arts.ubc.ca, PDF, 31 p.

Ellet 2007: Ellet, William. The Case Study Handbook: How to Read, Discuss, and Write Persuasively about Cases. Boston: Harvard Business School Press, 2007, uascentral.uas.alaska.edu, PDF, 280 p.; edisciplinas.usp.br, PDF, 278 p., url

Fact or Opinion, 03.02.2020: Fact or Opinion. Paragraph in Chapter 2. Types of Sources. – Choosing & Using Sources: A Guide to Academic Research. Online Book. Ohio State Pressbooks, ohiostate.pressbooks.pub, HTML, url

Fidler 2005: Fidler, David P. Transnational Threats to National Security: Daniel Deudney’s Case Against Linking Environmental Degradation and National Security. Princeton Project on National Security, 2005, princeton.edu, PDF, 16 p.

Fineman 2010: Fineman, Milijana. Improved Risk Analysis for Large Projects: Bayesian Networks Approach. Queen Mary University of London, 2010, qmro.qmul.ac.uk, PDF, 202 p., url

Fischer, Spiker, Riedel 2009: Fischer, Susan C., V. Alan Spiker and Sharon L. Riedel. Critical thinking training for Army officers. Vol II: A Model of Critical Thinking. Final Report. Santa Barbara, CA – Fort Leavenworth, KS: Anacapa Sciences, Inc., – US Army Research for the Behavioral and Social Sciences, February 2009, pdfs.semanticscholar.org, PDF, 106 p., url

FM 3-07 2008: Field Manual No. 3-07. Stability Operations. FM 3-07. Washington, D.C.: Headquarters, Department of the Army (HDA), 6 October 2008, fas.org, PDF, 208 p., url

Friedkin 2004: Friedkin, Noah. Social Cohesion. Santa Barbara, 2004, arjournals.annualreviews.org, PDF, 19 p. (pp. 409-425).

Friedman 2008: Friedman, Michael. American Identity: Ideas, Not Ethnicity. Washington, 13 February 2008, america.gov, HTML.

Fuerth 2008: Fuerth, Leon. On the Scope of National Security. Washington, 2008, forwardengagement.org, PDF, 7 p., url

Galabuzi, Teelucksingh 2010: Galabuzi, Grace-Edward, and Cheryl Teelucksingh. Social Cohesion, Social Exclusion and Social Capital. Peel, Canada, February 2010, peelregion.ca, PDF, 49 p.

Gates 2010: Gates, Linda Parker. Strategic Planning with Critical Success Factors and Future Scenarios: An Integrated Strategic Planning Framework. Technical Report. CMU/SEI-2010-TR-037. ESC-TR-2010-102. Carnegie Mellon University, Software Engineering Institute, 2010, semanticscholar.org, PDF, 67 p., url

Gavin, Myklebust, Grant 2010: Gavin E., Trond Myklebust, and Tim Grant. The Question of Question Types in Police Interviews: A Review of the Literature from a Psychological and Linguistic Perspective, The International Journal of Speech, Language and the Law, IJSLL (online) ISSN 1748-8893, Equinox Publishing, 2010, pp. 45-66, researchgate.net, PDF, 22 p., url

Germon et al. 2011: Germon, Rony, et al. A Matrix Approach for Threat Assessment on Human Capital in SMEs, pp. 274-282. – In: International Journal of Business and Management Studies. Volume 3, No. 2, 2011, sobiad.org, PDF, 10 p., url

Gompert et al. 2008: Gompert, David, et al. Analysis of Strategy and Strategies of Analysis. RAND Corporation, 2008, rand.org, RAND_MG718, PDF, 98 p., ISBN 978-0-8330-4503-4, url

Gordon 2009a: Gordon, Theodore J. The Delphi Method. The Millennium Project. Futures Research Methodology – V3.0. Washington, 10.06.2009, test.scripts.psu.edu, PDF, 31 p.  

Gordon 2009b: Gordon, Theodore J. The Real-Time Delphi Method. The Millennium Project. Futures Research Methodology – V3.0. Washington, 10.06.2009, test.scripts.psu.edu, PDF, 21 p.

Gradstein, Justman 1999: Gradstein, Mark, and Moshe Justman. Education, Social Cohesion and Economic Growth. Discussion Paper № 99-16. Beer Sheva, Israel, 1999, econ.bgu.ac.il, PDF, 31 p.

Gregory 2005: Gregory, Frank. Intelligence-led Counter-terrorism: A Brief Analysis of the UK Domestic Intelligence System’s Response to 9/11 and the Implications of the London Bombings of 7 July 2005. Real Instituto Elcano: Area: International Terrorism – ARI Nº 94/2005, 2/7/2005, realinstitutoelcano.org, PDF, 5 p., access: 07.06.2006; updated reference: biblioteca.ribei.org, ARI-106-2006-I, PDF, 8 p., url

Habegger, ed. 2008: Habegger, Beat, ed. International Handbook on Risk Analysis and Management. Zurich, ETH Zentrum/SEI, 2008, crn.ethz.ch, PDF, 234 p., url

Hanif 2014: Hanif, Nomaan. The Securitisation of Hizb ut Tahrir. A Comparative Case Study. A Thesis. University of London: Department of Politics and International Relations, 2014, pure.royalholloway.ac.uk, PDF, 373 p., url

Haque 2012: Haque, K. Ashequl. Culture Shapes Security. A Sensitivity to Cultural Differences Is a Prerequisite for Sound Security, pp. 52-57. – per Concordiam. Journal of European Security and Defense Issues, vol. 3, No. 4. Securing Resources. Europe’s Quest for Reliable Supplies. Garmisch-Partenkirchen: George C. Marshall European Center for Security Studies, marshallcenter.org, 29.10.2012, pC_V3N4_en, PDF, 68 р., url

Hardi, Zdan, eds. 1997: Hardi, Peter, and Terrence Zdan (eds.). Assessing Sustainable Development: Principles in Practice. Winnipeg, Manitoba, Canada: The International Institute for Sustainable Development, 1997, iisd.org, PDF, 175 p., url

Harris, Spiker 2012: Harris, Douglas H., and V. Alan Spiker. Critical Thinking Skills for Intelligence Analysis. – In: Ergonomics – A Systems Approach. Edited by Dr. Isabel L. Nunes. ISBN 978-953-51-0601-2. Published online: 25 April 2012. Published in print edition April 2012, InTech, 2012, pp. 209-232, cdn. intechopen.com, 25.09.2017, PDF, 26 p., url

Hell, Vidačić, Garača 2009: Hell, Marko, Stjepan Vidačić, and Željko Garača. Methodological Approach to Strategic Performance Optimization. Received: 14.07.2009. Accepted: 15.10.2009. – In: Management. Volume 14, Split, Croatia, 2009, 2, pp. 21-42, efst.hr, PDF, 22 p., url

Herschel, Jones 2005: Herschel, Richard T., and Nory E. Jones. Knowledge Management and Business Intelligence: The Importance of Integration. – Journal of Knowledge Management. ISSN 1367-3270. Emerald Group Publishing Limited, 2005, vol. 9 No. 4, pp. 45-55, semanticscholar.org, PDF, 11 p., url

Heuer, Jr. 1999: Heuer, Jr., Richards J. Psychology of Intelligence Analysis. Central Intelligence Agency, Center for the Study of Intelligence, History Staff, 1999, odci.gov, PDF, 165 p., access: 12.10.2008; updated reference: cia.gov, PDF, 214 p., url

Heylighen 1988: Heylighen, Francis. Formulating the Problem of Problem-Formulation (11 p.). – In: Cybernetics and Systems, Trapple R. (ed.), Dordrecht: Kluwer Academic Publishers, 1988, cleamc11.vub.ac.be, PDF, 11 p. (pp. 949-957).

Heylighen 1992: HeylighenHeylighen, Francis. A Cognitive-Systemic Reconstruction: Maslows's Theory. – In: Behavioral Science, Volume 37. Brussels, 1992, pespmc1.vub.ac.be, PDF, 19 p. (pp. 39-57).

Heylighen et al. 2007: Heylighen, Francis, et al. The Emergence of Distributed Cognition: A Conceptual Framework, pespmc1.vub.ac.be, PDF, 18 p. 

IFRC 2012: Community Early Warning Systems: Guiding Principles. Geneva: International Federation of Red Cross and Red Crescent Societies (IFRC), 2012, ifrc.org, PDF, 84 р., url

Isoherranen 2012: Isoherranen, Ville. Strategy Analysis Frameworks for Strategy Orientation and Focus. Oulu, Finland: University of Oulu, Faculty of Technology, Department of Industrial Engineering and Management, 2012, jultika.oulu.fi, PDF, 80 p., url

JALLC 2007: Joint Analysis Handbook. Third Edition. Authors: Jacqueline Eaton, John Redmayne, Marvin Thordsen. Monsanto, Lisbon: NATO Joint Analysis and Lessons Learned Centre (JALLC), October 2007, jallc.nato.int, PDF, 122 p., url

JALLC 2016: Joint Analysis Handbook. 4th Edition. Authors: Jacqueline Eaton, John Redmayne, Marvin Thordsen. Monsanto, Lisbon: NATO Joint Analysis and Lessons Learned Centre (JALLC), February 2016, jallc.nato.int, PDF, 135 p., url

Johnson, ed., et al. 2006: Johnson, Loch K., ed., et al. Handbook of Intelligence Studies. Edited by Loch K. Johnson. First edition. London and New York: Routledge, Taylor and Francis Group e-Library, 2006, dl.icdst.org, PDF, 401 p., url

Jones 2005: Jones, Jack A. An Introduction to Factor Analysis of Information Risk (FAIR). A Framework for Understanding, Analyzing, and Measuring Information Risk. Draft. Washington: FAIR Institute, Risk Management Insight LLC (RMI), 2005, theartofservicelab.s3.amazonaws.com, PDF, 76 p., url

JP 1-02 2004: Joint Publication 1-02. Department of Defense (DOD) Dictionary of Military and Associated Terms. JP 1-02. Washington, D.C.: Office of the Chairman of the Joint Chiefs of Staff, 12 April 2001 (As Amended Through 9 June 2004), cia.gov, PDF, 736 p., url

JP 1-02 2015: Joint Publication 1-02. Department of Defense (DOD) Dictionary of Military and Associated Terms. JP 1-02. Washington, D.C.: Office of the Chairman of the Joint Chiefs of Staff, 2015, dod.mil, PDF, 473 p. 

JP 2-0 2013: Joint Publication 2-0. Joint Intelligence. JP 2-0. Washington, D.C.: Office of the Chairman of the Joint Chiefs of Staff, 22 October 2013, jcs.mil, PDF, 144 p., url

JP 2-01 2017: Joint Publication 2-01. Joint and National Intelligence Support to Military Operations.  JP 2-01. Washington, D.C.: Office of the Chairman of the Joint Chiefs of Staff, 5 July 2017, jcs.mil, PDF, 220 p., url

JP-1 2019: Joint Publication 1. Department of Defense (DOD) Dictionary of Military and Associated Terms. Washington, D.C.: Office of the Chairman of the Joint Chiefs of Staff, November 2019, jcs.mil, PDF, 376 p., url

Kapitan 1992: Kapitan, Tomis. Peirce and the Autonomy of Abductive Reasoning. – In: Erkenntnis, 37, July 1992, niu.edu, PDF, 27 p. (pp. 1-26), access: 16.04.2010; updated reference: researchgate.net, url

Kates et al. 2005: Kates, Robert, et al. What Is Sustainable Development? Goals, Indicators, Values, and Practices. – In: Environment: Science and Policy for Sustainable Development. Philadelphia, USA, 2005, vol. 47, № 3, heldref.org, PDF, 14 p. (pp. 8-21).

Katter et al. 1979: Katter, Robert, et al. Cognitive Processes in Intelligence Analysis: A Descriptive Model and Review of the Literature. Technical Reprot 445. Woodland Hills, California: Operating Systems, Inc. – Alexandria, Virginia: U.S. Army Research Institute for the Behavioral and Social Sciences, December 1979, marshallcenter.org, PDF, 85 p., access: 26.06.2005; updated reference: apps.dtic.mil, access: 03.11.2019, url

Kicinger 2004: Kicinger, Anna. International Migration as a Non-Traditional Security Threat and the EU Responses to This Phenomenon. Warsaw, October 2004, cefmr.pan.pl, PDF, 13 p., url

Kim 2009: Kim, Jiyul. Cultural Dimensions of Strategy and Policy. Letort Paper. U.S. Army War College: Strategic Studies Institute, strategicstudiesinstitute. army.mil, May 2009, PUB919, PDF, 54 p., url

Kim, Mauborgne 2004: Kim, W. Chan, and Renée Mauborgne. Blue Ocean Strategy. Reprint R0410D. Harvard Business Review, October 2004, info.psu.edu.sa, PDF, 11 p., url

Kim, Mauborgne 2005: Kim, W. Chan, and Renée Mauborgne. Blue Ocean Strategy: From Theory to Practice, California Management Review, vol. 47, No. 3, Reprint Series, pp. 105-121, Berkeley, University of California, Haas School of Business, spring 2005, semanticscholar.org (researchgate.net), PDF, 21 p., url

Kirshner, ed. 2006: Kirshner, Jonathan (ed.). Globalization and National Security. New York, 2006, 613 р. Google Books, books.google.bg.

Knight 1964: Knight, Frank. Risk, Uncertainty and Profit. Reprints of Economic Classics. New York: Augustus M. Kelley, Bookseller, 1964, mises.org, PDF, 445 p., url

Kosow, Gaßner 2008: Kosow, Hannah, and Robert Gaßner. Methods of Future and Scenario Analysis. Overview, Assessment, and Selection Criteria. DIE Research Project “Development Policy: Questions for the Future”. Bonn: German Development Institute (DIE: Deutsches Institut für Entwicklungspolitik), 2008, ISSN 1860-0468, die-gdi.de, PDF, 133 p., url

Kouhossounon 2017: Kouhossounon, Bernadin. Societal Security in the Context of Migration. – Security Dimensions. International & National Studies. Scientific Journal, 2017, vol. 3, No. 23. From Personal to Global Security. Kraków: University of Public and Individual Security APEIRON in Cracow, 2017, pp. 213-230, security-dimensions.pl, PDF, 18 p., access: 11.03.2020, url

Krizan 1999: Krizan, Lisa. Intelligence Essentials for Everyone. Occasional Paper Number Six. Washington: Joint Military Intelligence College, June 1999, dtic.mil, PDF, 89 p.; apps.dtic.mil, a476726, PDF, 90 p., url

Kruger 2010: Kruger, Jean-Pierre. A Study of Strategic Intelligence as a Strategic Management Tool in the Long-term Insurance Industry in South Africa. University of South Africa, January 2010, uir.unisa.ac.za, PDF, 376 p., url

Kuosa 2014: Kuosa, Tuomo. Towards Strategic Intelligence – Foresight, Intelligence, and Policy-Making. National Defense College, Center for Asymmetric Threat Studies, Dynamic Futures, 2014, ec.europa.eu, PDF, 124 p., url

Lantis 2002: Lantis, Jeffrey. Strategic Culture and National Security Policy. Malden-Oxford: International Studies Association, 2002, marshallcenter.org, PDF, 27 p. (87-113).

Lebowitz 2017: Lebowitz, Shana. Radical Candor's Kim Scott: The Most Effective Leadership Style. A former Google and Apple Exec Says There Are 4 Ways to Lead a Team – and 3 Are Ineffective, Business Insider, 21.03.2017, businessinsider.com, HTML, url

Lehner, Michelson, Adelman 2010: Lehner, Paul, Avra Michelson and Leonard Adelman. Measuring the Forecast Accuracy of Intelligence Products. The MITRE Corporation, December 2010, mitre.org, PDF, 13 p., url

Levine 2006: Levine, Mitchell. Security Restructuring Using the Entitlement Matrix Approach. New Canaan, Connecticut, USA: Audit Serve, Inc., 2006, auditserve.com, HTML, url

Macleod 2005: Macleod, Alex. Culture, National Identity and Security. Notes for a presentation prepared for the Toronto Symposium on Human Cultural Security and EU-Canada Relations. University of Torornto, 06-07.06.2005, individual.utoronto.ca, PDF, 6 p., url

Matthews et al., eds. 2008: Matthews, Helen, et al. (eds.). Operational Risk. CIMA: Topic Gateway series No. 51. Prepared by Helen Matthews and Technical Information Service, September 2008, cimaglobal.com, PDF, 14 p., url

Maximini 2018: Maximini, Dominik. Organizational Culture Models. Chapter 2. – From: Maximini, Dominik. The Scrum Culture: Introducing Agile Methods in Organizations. Springer International Publishing, Switzerland, 2018, pp. 9-25, iranarze.ir, PDF, 18 p., url

McCorkle, ed. 2002. McCorkle, Suzanne (ed.). Electronic Encyclopedia of Communication. New York: Communication Institute for Online Scholarship (CIOS), 2002, cios.org, HTML.

McDowell 1991: McDowell, Don. Strategic Intelligence: Defining the National Threat to Public Order and Security (1991). – In: Don McDowell. Strategic Intelligence & Analysis. Selected Writings by Don McDowell. The Intelligence Study Center, 2000, intstudycen.com, PDF, 61 p., (pp. 46-54 (47-55).

McDowell 1992a: McDowell, Don. Strategic Intelligence and Law Enforcement (1992). – In: Don McDowell. Strategic Intelligence & Analysis. Selected Writings by Don McDowell. The Intelligence Study Center, 2000, intstudycen.com, PDF, 61 p. (pp. (34-39 (35-40).

McDowell 1992b: McDowell, Don. Analysis and Management Style. The Missing Link Between Vision and Decisions (1992). – In: McDowell. Strategic Intelligence & Analysis. Selected Writings by Don McDowell. The Intelligence Study Center, 2000, intstudycen.com, PDF, 61 p. (pp. 40-45 (pp. 41-46).

McDowell 1993: McDowell, Don. Law Enforcement Decision Making. The Pivotal Role of Strategic Analysis (1993). – In: Don McDowell. Strategic Intelligence & Analysis. Selected Writings by Don McDowell. The Intelligence Study Center, 2000, intstudycen.com, PDF, 61 p. (pp. 29-33 (30-34).

McDowell 1997: McDowell, Don. Strategic Intelligence & Analysis. Guidelines on Methodology & Application. The Intelligence Study Center, 1997, intstudycen.com, PDF, 35 p.

McDowell 1999: McDowell, Don. Quo Vadis Strategic Intelligence? Overview of the Implementation and Impact of Strategic Intelligence (1999). – In: Don McDowell. Strategic Intelligence & Analysis. Selected Writings by Don McDowell. The Intelligence Study Center, 2000, intstudycen.com, PDF, 61 p. (pp. 8-17 (9-18).

McDowell 2000: McDowell, Don. Strategic Intelligence & Analysis. Selected Writings by Don McDowell. The Intelligence Study Center, 2000, intstudycen.com, PDF, 61 p.

McDowell 2009: McDowell, Don. Strategic Intelligence: A Handbook for Practitioners, Managers and Users. Revised Edition. Scarecrow Professional Intelligence Education Series. Series Editor: Jan Goldman. Lanham, Maryland – Toronto – Plymouth, UK: The Scarecrow Press, Inc.,  2009, e-reading.club, PDF, 287 p., url

McNamara 1997: McNamara, Carter. Strategic Planning (in Nonprofit or Forprofit Organizations). Minneapolis, 1997-2008, managementhelp.org, HTML, access: 29.12.2009; globalwebconnexions.com, PDF, 15 p., url

MCWP 2-14 1998: Marine Corps Warfighting Publication 2-14. MCWP 2-14. Counterintelligence. Coordinating Draft – 7th October 1998. Washington, D.C. 20380-1775, Department of Navy, Headquarters United States Marine Corps, tscm.com, PDF, 315 p., url

Menzies 1996: Menzies, Tim. Applications of Abduction: Knowledge-Level Modeling. Melbourn, 1996, menzies.us, PDF, 20 p.

Michel, Kurokawa 2005: Michel, James, and Tomomi Kurokawa. Human Security and Social Development: Comparative Research in Four Asian Countries. Conference Paper. Arusha Conference “New Frontiers of Social Policy” – 12-15. Arusha, Tanzania, 14 December 2005, siteresources.worldbank.org, PDF, 36 p., url

Miles, Keenan, Kaivo-Oja 2003: Miles, Ian, Michael Keenan and Jari Kaivo-Oja. Handbook of Knowledge Society Foresight. Dublin, European Foundation for the Improvement of Living and Working Conditions, 2003, edz.bib.uni-mannheim.de, PDF, 169 p., url

Moody, White 2003: Moody, James, and Douglas White. Structural Cohesion and Embeddedness: A Hierarchical Concept of Social Groups. – In: American Sociological Review 68 (1). Nashville, 2003, eclectic.ss.uci.edu, PDF, 49 p., (pp. 103-127).

Moore 2003: Moore, David. Species of Competencies for Intelligence Analysis. Washington: National Security Agency, 2003, scip.cms-plus.com, PDF, 35 p.

Moore 2006: Moore, David T. Critical Thinking and Intelligence Analysis. Occasional Paper Number Fourteen. Washington, D.C.: Joint Military Intelligence College, May 2006, 134 p.

Moore 2007: Moore, David T. Critical Thinking and Intelligence Analysis. Occasional Paper Number Fourteen. Second Printing (with revisions). Washington, D.C.: National Defense Intelligence College, March 2007, PDF, 159 p., url

Mora 2003: Mora, Manuel, Guisseppi A. Forgionne and Jatinder N. D. Gupta. Decision Making Support Systems: Achievements, Trends and Challenges for the New Decade. Idea Group Inc., 2003, tgu.edu.vn, PDF, 438 p., url

Morgenthau 2006: Morgenthau, Hans. Politics Among Nations: The Struggle for Power and Peace. 7th Edition. New York, 2006, polski.buffalo.edu, PDF, 752 p.

Nagel et al. 2013: Nagel, Kurt, et al. General Management Tools. Steinbeis University Berlin: School of International Business and Entrepreneurship, 2013, steinbeis-sibe.de, PDF, 677 p., url

Ó Tuathail, Dalby, eds. 1998: Ó Tuathail, Gearóid, and Simon Dalby (eds.). Rethinking Geopolitics. London – New York: Routledge, 1998, frenndw.files.wordpress.com, 02.06.2002, PDF, 346 p., url

Oxburgh, Myklebust, Grant 2010: Oxburgh, Gavin E., Trond Myklebust, and Tim Grant. The Question of Question Types in Police Interviews: A Review of the Literature from a Psychological and Linguistic Perspective, The International Journal of Speech, Language and the Law, IJSLL (online) ISSN 1748-8893, Equinox Publishing, 2010, pp. 45-66, researchgate.net, PDF, 22 p.

Pentland et al. 2001: Pentland, Pat, et al. Creating Defense Excellence: Defense Addendum to Road Map for National Security. Washington: U.S. Commission on National Security/21st Century (Hart-Rudman Commission), 15 May 2001, au.af.mil, PDF, 100 p., url

Pernin et al. 2007: Pernin, Christopher, et al. The Knowledge Matrix Approach to Intelligence Fusion. RAND Corporation, 2007, rand.org, RAND_TR416, PDF, 55 p., url

Pillar 2008: Pillar, Paul. Predictive Intelligence: Policy Support or Spectator Sport? – In: SAIS Review, vol. XXVIII, № 1, Washington, Winter-Spring 2008, muse.jhu.edu, PDF, 11 p. (pp. 25-35).

Quille et al. 2005: Quille, Gerrard, et al. An Action Plan for European Defense: Implementing the Security Strategy. (Introduction by Alyson JK Bayles) International Security Information Service (ISIS) – Brussels, Europe, and Military Center for Strategic Studies (CeMiSS) – Rome, Italy, 2005, casd.difesa.it, PDF, 73 p.

Ratcliffe 2007: Jerry H. Ratcliffe. Integrated Intelligence and Crime Analysis: Enhanced Information Management for Law Enforcement Leaders. Second Edition. Washington, D.C.: Police Foundation – Office of Community Oriented Policing Services (COPS), 7 August 2007, cops.usdoj.gov, PDF, 51 p.

Ray 2004: Ray, Michael. Madrid Train Bombings of 2004. Terrorist Attacks, Spain – Encyclopedia Britanica, britannica.com, updated 04.03.2019, HTML, url

Reicher, McCrone, Hopkins 2010: Reicher, Steve, David McCrone and Nick Hopkins. A Strong, Fair and Inclusive National Identity: A Viewpoint on the Scottish Government’s Outcome 13. Equality and Human Rights Commission Research report 62. Manchester: Equality and Human Rights Commission, Autumn 2010, equalityhumanrights.com, PDF, 29 р., url

Rhydderch et al. 2009: Rhydderch, Alun, et al. Scenario Planning. Guidance Note. Foresight Horizon Scanning Centre, Government Office for Science, October 2009, bis.gov.uk, PDF, pp. 11-13, url

Ritzen et al. 2000: Ritzen, Jo, et al. On “Good” Politicians and “Bad” Policies: Social Cohesion, Institutions, and Growth. Washington, 30 September 2000, siteresources.worldbank.org, PDF, 36 p.

Roe 2011: Roe, Paul. The Societal Dimension of Global Security. – In: Encyclopedia of Life Support Systems (EOLSS), vol. I. Global Security and International Political Economy, eolss.net, 30.11.2011, PDF, 6 p., url

Rogers 2006: Rogers, Paul. International Security in the Early Twenty-First Century (2000), ciaonet.org, HTML.

Romm 1993: Romm, Joseph J. Defining National Security: The Nonmilitary Aspects. The Pew Project on America’s Task in a Changed World. New York: Council on Foreign Relations Press, 1993, Google Books, 122 p., url

Rothschild 1995: Rothschild, Emma. What Is Security?, pp. 53-98. – Daedalus, the Journal of the American Academic of Arts and Sciences, vol. 124, No. 3. The Quest for World Order. The MIT Press for the American Academy of Arts and Sciences, Summer, 1995, peacepalacelibrary.nl, PDF, 47 p., url

Sachs 2003: Sachs, Stephen. The Changing Definition of Security. Oxford, 2003, stevesachs.com, HTML, url

Sanders 1987: Sanders, Michaele. The Fact/Opinion Distinction: An Analysis of the Subjectivity of Language and Law. Article 5. – Marquette Law Review (673), vol. 70, issue 4, Milwaukee, Wisconsin: Marquette University Law School, Summer 1987, pp. 673-691, scholarship.law.marquette.edu, PDF, 20 p., url

Sarkar 2010: Sarkar, Kuheli Roy. Assessing Insider Threats to Information Security Using Technical, Behavioural and Organisational Measures. – Information Security Technical Report 15 (2010) 122-133. Elsevier Ltd., 2010, pdfs.semanticscholar.org, PDF, 22 p., url

Sathaye et al. 2007: Sathaye, Jayant, et al. Sustainable Development and Mitigation – In: Metz et al. (eds.). Climate Change 2007: Mitigation. Contribution of Working Group III to the Fourth Assessment Report of the Intergovernmental Panel on Climate Change. Cambridge – New York: Cambridge University Press, ipcc.ch, PDF, 54 p. (pp. 691-743), url

Schechtman 1996: Schechtman, Gregory. Manipulating the OODA Loop: The Overlooked Role of Information Resource Management in Information Warfare. Thesis. Air University, USA, December 1996, au.af.mil, PDF, 116 p., url

Segell 2005: Segell, Glen. Three Intelligence Methodologies for Border Defence and Border Security. – In: Scientia Militaria: South African Journal of Military Studies, 2005, vol. 3, issue 2, ajol.info, PDF, 23 p., url

Segnestam 2002: Segnestam, Lisa. Indicators of Environment and Sustainable Development: Theories and Practical Experience. Paper No 89. Washington: The World Bank Environment Department, December 2002, siteresources.worldbank.org, PDF, 66 p., url

Senivongse 2019: Senivongse, Chulatep. External Knowledge Absorption in Information Technology Small and Medium Enterprises: Exploratory Multiple Case Studies of The Role of Absorptive Capacity Meta-Routines and Exploratory Regimes. A Ph.D. Dissertation. Graduate School of Bangkok University: The Institute for Knowledge and Innovation Southeast Asia (IKI-SEA), 2019, dspace.bu.ac.th, PDF, 440 p., url

Shenkir, Walker 2007: Shenkir, William G., and Paul L. Walker. Enterprise Risk Management: Tools and Techniques for Effective Implementation. Montvale, NJ, USA: Institute of Management Accountants, 2007, stjohns.edu, PDF, 34 p., url

Smith 2003: Smith, W. Thomas. Encyclopedia of the Central Intelligence Agency. New York, Facts On File, Inc., 2003, umaa-library.org, PDF, 290 p., url

Steele 2004: Steele Vivas, Robert David. Special Operations Forces Open Source Intelligence Handbook. Draft “Strawman” Not Complete Not Staffed. Oakton, Virginia: OSS International Press, 23 June 2004, oss.net, PDF, 125 p., url

Steele 2006: Steele Vivas, Robert David. The Smart Nation Act: Public Intelligence in the Public Interest. Oakton, Virginia: OSS International Press,  September 2006, oss.net, PDF, 270 p., url

Sulek et al. 2011: Sulek, David, et al. Asserting Global Leadership in the Cyber Domain. Ready for What’s Next. 2011 Update. Booz Allen Hamilton Inc., 16.08.2011, boozallen.com, PDF, 24 p., access: 15.05.2013. Compare: Sulek, David, et al. Asserting Global Leadership in the Cyber Domain. Ready for What’s Next. Cyber 2020. federalnewsradio.com, PDF, 24 p., url

Suri, Valentino 2016: Suri, Jeremi, and Benjamin Valentino. Sustainable Security: Rethinking American National Security Strategy. Oxford University Press, December 2016, tobinproject.org, PDF, 545 p., url

Swenson et al. 2003: Swenson, Russell, et al. Bringing Intelligence About: Practitioners Reflect on Best Practitioners. Washigton, DC: Joint Military Intelligence College, May 2003, apps.dtic.mil, PDF, 158 p., url

Tattersall 2015: Tattersall, Andy. Who, What, Where, When, Why: Using the 5 Ws to Communicate Your Research. – LSE Impact Blog. London School of Economics and Political Science, blogs.lse.ac.uk, 8 April 2015, HTML, url

Tharp 2009: Tharp, Bruce. Four Organizational Culture Types. Holland, Michigan, USA, 2009, haworth.com, PDF, 6 p.

Théron 2012: Théron, Jacques. An Information Warfare Perspective on Entropy Warfare. Pretoria: South African National Defence Force (SANDF), Department of Defence, 2012, academia.edu, PDF, 11 p., url

Thornton 2003: Thornton, Chris. Quantitative Abstraction Theory. – In: AISB Journal 1(3), SSAISB, 2003, semanticscholar.org (aisb.org.uk), PDF, 9 p., url

Todorovic et al. 2011: Todorovic, Maja, et al. Sustainable Technology Management Indicators: Objectives Matrix Approach. Belgrade, 24 August 2011, pp. 11386-11398 – In: African Journal of Business Management. Vol. 5 (28), Canton, Georgia, USA, 16 November 2011, semanticscholar.org, PDF, 13 p., url

Treverton, Ghez 2012: Treverton, Gregory F., and Jeremy J. Ghez. Making Strategic Analysis Matter. Prepared for the National Intelligence Council. Approved for public release; distribution unlimited. Arlington, Virginia, USA: RAND Corporation, 2012, ISBN: 978-0-8330-5879-9, rand.org, RAND_CF287, PDF, 52 p., url

U.N. DSD 2001: United Nations Division for Sustainable Development. Indicators of Sustainable Development: Guidelines and Methodologies. United Nations Commission on Sustainable Development (UNCSD), 2001, un.org, PDF, 315 p., url

U.N. SDGR 2017: The Sustainable Development Goals Report 2017. United Nations, New York, 2017, unstats.un.org, PDF, 64 p., url

U.S. DAU 2006: Risk Management Guide for DoD Acquisition. Sixth Edition (Version 1.0). Fort Belvoir (Virginia, USA): Department of Defense, Defense Acquisition University, August 2006, dau.mil, PDF, 40 p., url

U.S. DHS 2008: U.S. DHS Risk Lexicon. U.S. Department of Homeland Security, Risk Steering Committee, September 2008, dhs.gov, PDF, 60 p., url

U.S. DHS 2010: U.S. DHS Risk Lexicon – 2010 Edition. Department of Homeland Security, Risk Steering Committee, September 2010, dhs.gov, PDF, 72 p., url

U.S. DOE 2005: Comprehensive Emergency Management System. DOE O 151.1C. Washington: United States Department of Energy (U.S. DOE), 2 November 2005, doeal.gov, PDF, 90 p., url

UCOP 2016: SMART Goals: A How to Guide: A Guide for Managers and Employees. Performance Appraisal Planning 2016-2017. University of California, 2016-2017, ucop.edu, PDF, 13 p., url

Uriarte, Jr. 2008: Uriarte, Jr., Filemon A. Introduction to Knowledge Management. A Brief Introduction to Knowledge Management for Non-practitioners Interested in Understanding the Subject. ISBN No. 978-979-19684-0-9. Jakarta, Indonesia: ASEAN Foundation, 2008, aseanfoundation.org, PDF, 179 p., url

Van der Laan 2010: Van der Laan, Lucas. Foresight Competence and the Strategic Thinking of Strategy-level Leaders. Toowoomba: University of Southern Queensland, Australia, 2010, eprints.usq.edu.au, PDF, 300 p., url

Vermont 2012: Guide to Risk Assessment & Response. The University of Vermont, Enterprise Risk Management Program, August 16, 2012, uvm.edu, PDF, 30 p., url

Warner 2002: Warner, Michael. Wanted: A Definition of “Intelligence” – In: Studies in Intelligence. Washington, D.C., 20505: Central Intelligence Agency, Center for the Study of Intelligence, 2002, vol. 46, No. 3, cia.gov, HTML, access: 04.05.2005, url: http://www.cia.gov/csi/studies/vol46no3/article02.html; updated reference: apps.dtic.mil, PDF, 9 p. (pp. 15-22), url

Wells, Wells 2011: Wells, Rebecca, and Charles Wells. Academic Program Portfolio Model, Research in Higher Education Journal. Ponte Vedra Beach, FL, USA: Academic and Business Research Instutute, 08.01.2011, aabri.com, PDF, 19 p., url

Wolfers 1952: Wolfers, Arnold. “National Security” as an Ambiguous Symbol – Political Science Quarterly, vol. 67, No. 4, December 1952, pp. 482-502, files.janjires.webnode.cz, Wednesday, 14 February, 2007, 04:50:02 h, PDF, 23 p., url

Wood et al. 2005: Wood, Suzanne, et al. Reporting of Counterintelligence and Security Indicators by Supervisors and Coworkers. Technical Report 05-6. Monterey, California, USA: Defense Personnel Security Research Center (PERSEREC), May 2005, dtic.mi, PDF, 57 p.

Woolley 1998: Woolley, Frances. Social Cohesion and Voluntary Activity: Making Connections. Paper prepared for Conference on the State of Living Standards and the Quality of Life in Canada: Perspectives and Prospective, Ottawa, October 30 and 31, 1998, csls.ca, PDF, 31 p.

Wray et al. 2002: Wray, Simone, et al. A Risk Management Standard. Extracts from the document PD ISO/IEC Guide 73: 2002 by International Organization for Standardization (ISO) reproduced with the permission of British Standards Institution under license number 2002SK/0313. London: AIRMIC, ALARM, IRM, 2002, theirm.org, PDF, 16 p., url

Zegers, Murombezi 2004: Zegers, Robert, and Cornelius Murombezi. Strategic Management. Jordanian Edition. Adapted by Mahmoud al-Sayyed. Amman, The Hashemite Kingdom of Jordan, 2004, ISBN 9957-447-06-8, pdf.usaid.gov, PDF, 174 p., url