TY - JOUR AU - Sparrow, M. K. PY - 1991 DA - 1991// TI - The application of network analysis to criminal intelligence: An assessment of the prospects JO - Soc. Netw VL - 13 UR - https://doi.org/10.1016/0378-8733(91)90008-H DO - 10.1016/0378-8733(91)90008-H ID - Sparrow1991 ER - TY - JOUR AU - Wiil, U. K. AU - Memon, N. AU - Gniadek, J. PY - 2011 DA - 2011// TI - CrimeFighter: A toolbox for counterterrorism JO - Lect. Notes Commun. Comput Inf. Sci. (Knowl. Discov., Knowl. Eng, Knowl. Manage) VL - 128 ID - Wiil2011 ER - TY - BOOK AU - Intelligence and, S. e. c. u. r. i. t. y. C. o. m. m. i. t. t. e. e. PY - 2009 DA - 2009// TI - Could 7/7 have been Prevented? Review of the Intelligence on the London Terrorist Attacks on 7 July 2005 ID - Intelligence and2009 ER - TY - CHAP AU - Woo, G. ED - Memon, N. ED - Farley, T. ED - Hicks, J. D. ED - Rosenorn, D. L. PY - 2009 DA - 2009// TI - Intelligence constraints on terrorist network plots BT - Mathematical Methods in Counterterrorism PB - Springer CY - Wien UR - https://doi.org/10.1007/978-3-211-09442-6_12 DO - 10.1007/978-3-211-09442-6_12 ID - Woo2009 ER - TY - JOUR AU - Rhodes, C. J. AU - Jones, p. PY - 2009 DA - 2009// TI - Inferring missing links in partially observed social networks JO - J. Oper. Res. Soc VL - 60 UR - https://doi.org/10.1057/jors.2008.110 DO - 10.1057/jors.2008.110 ID - Rhodes2009 ER - TY - BOOK PY - 2008 DA - 2008// TI - Curveball ID - ref6 ER - TY - STD TI - National commission on terrorist attacks upon the United States, The 9/11, Commission Report (Executive Summary) (USA, 2004) \_Exec.pdf http://www.9-11commission.gov/report/911Report \_Exec.pdf UR - http://www.9-11commission.gov/report/911Report ID - ref7 ER - TY - BOOK AU - Kebbell, M. R. AU - Muller, D. A. AU - Martin, K. PY - 2010 DA - 2010// TI - Understanding and managing bias Dealing Uncertainties Policing Serious Crime PB - Australian National University CY - Canberra ID - Kebbell2010 ER - TY - BOOK AU - Levy, B. H. PY - 2003 DA - 2003// TI - Who Killed Daniel Pearl? PB - Melville House Publishing CY - Brooklyn ID - Levy2003 ER - TY - JOUR AU - Atzenbeck, C. AU - Hicks, D. L. AU - Memon, N. PY - 2011 DA - 2011// TI - Supporting reasoning and communication for intelligence officers JO - Int. J. Netw VL - 8 ID - Atzenbeck2011 ER - TY - BOOK PY - 2008 DA - 2008// TI - Legacy of Ashes: The History of the CIA PB - Anchor Books CY - New York ID - ref11 ER - TY - BOOK AU - Clark, R. PY - 2007 DA - 2007// TI - Intelligence Analysis: A Target-Centric Approach PB - CQ Press CY - California ID - Clark2007 ER - TY - CHAP AU - Petersen, R. P. AU - Wiil, U. K. PY - 2011 DA - 2011// TI - Hypertext structures for investigative teams BT - Proceedings of the 22nd ACM Conference on Hypertext PB - ACM Press CY - New York ID - Petersen2011 ER - TY - CHAP AU - Petersen, R. R. AU - Wiil, U. K. PY - 2011 DA - 2011// TI - CrimeFighter Investigator: a novel tool for criminal network investigation BT - Proceedings of European Intelligence and Security Informatics Conference ID - Petersen2011 ER - TY - JOUR AU - Adderly, R. AU - Musgrove, P. PY - 2001 DA - 2001// TI - Police crime recording and investigation systems - A user’s view JO - Int. J. Police Strateg. Manage VL - 24 UR - https://doi.org/10.1108/13639510110382287 DO - 10.1108/13639510110382287 ID - Adderly2001 ER - TY - CHAP AU - Badalamente, R. V. AU - Greitzer, F. L. PY - 2005 DA - 2005// TI - Top ten needs for intelligence analysis tool development BT - Proceedings of International Conference on Intelligence Analysis ID - Badalamente2005 ER - TY - JOUR AU - Bier, E. A. AU - Card, S. K. AU - Bodnar, J. W. PY - 2010 DA - 2010// TI - Principles and tools for collaborative entity-based intelligence analysis JO - IEEE Trans. Vis. Comput. Graph VL - 16 UR - https://doi.org/10.1109/TVCG.2009.104 DO - 10.1109/TVCG.2009.104 ID - Bier2010 ER - TY - BOOK AU - Dean, G. AU - Gottschalk, P. PY - 2007 DA - 2007// TI - Knowledge Management in Policing and Law Enforcement ID - Dean2007 ER - TY - STD TI - i2 Limited, Analyst’s Notebook 2011.http://www.i2group.com/ UR - http://www.i2group.com/ ID - ref19 ER - TY - STD TI - Palantir Government 2011.http://www.palantirtech.com/government UR - http://www.palantirtech.com/government ID - ref20 ER - TY - CHAP AU - Pioch, N. J. AU - Everett, J. O. PY - 2006 DA - 2006// TI - POLESTAR: collaborative knowledge management and sensemaking tools for intelligence analysts BT - Proceedings of the International Conference on Information and Knowledge Management PB - ACM Press CY - New York ID - Pioch2006 ER - TY - CHAP AU - Shrinivasan, Y. B. AU - Wijk, J. J. PY - 2008 DA - 2008// TI - Supporting the analytical reasoning process in information visualization BT - Proceedings of the 26th Conference on Human Factors in Computing Systems PB - ACM Press CY - New York ID - Shrinivasan2008 ER - TY - CHAP AU - Wright, W. AU - Schroh, D. AU - Proulx, P. AU - Skaburskis, A. AU - Cort, B. PY - 2006 DA - 2006// TI - The Sandbox for analysis: concepts and methods BT - Proceedings of the Conference on Human Factors in Computing Systems ID - Wright2006 ER - TY - STD TI - Xanalys 2011.http://www.xanalys.com/ UR - http://www.xanalys.com/ ID - ref24 ER - TY - CHAP AU - Petersen, R. R. AU - Rhodes, C. J. AU - Wiil, U. K. PY - 2011 DA - 2011// TI - Node removal in criminal networks BT - Proceedings of European Intelligence and Security Informatics Conference PB - IEEE Computer Society CY - Washington ID - Petersen2011 ER - TY - CHAP AU - Petersen, R. R. AU - Wiil, U. K. ED - Subrahmanian, V. S. PY - 2013 DA - 2013// TI - CrimeFighter Investigator: criminal network sense-making BT - Handbook of Computational Approaches to Counterterrorism PB - Springer CY - New York UR - https://doi.org/10.1007/978-1-4614-5311-6_16 DO - 10.1007/978-1-4614-5311-6_16 ID - Petersen2013 ER - TY - BOOK AU - Petersen, R. R. PY - 2012 DA - 2012// TI - Criminal Network Investigation: Processes, Tools, and Techniques ID - Petersen2012 ER - TY - BOOK AU - Pearl, M. PY - 2004 DA - 2004// TI - A Mighty Heart ID - Pearl2004 ER - TY - JOUR AU - Rhodes, C. J. AU - Keefe, C. M. J. PY - 2007 DA - 2007// TI - Social network topology: a Bayesian approach JO - J. Oper. Res. Soc VL - 58 UR - https://doi.org/10.1057/palgrave.jors.2602352 DO - 10.1057/palgrave.jors.2602352 ID - Rhodes2007 ER - TY - BOOK AU - Wasserman, S. AU - Faust, K. PY - 1994 DA - 1994// TI - Social Network Analysis: Methods and Applications PB - Cambridge University Press CY - Cambridge UR - https://doi.org/10.1017/CBO9780511815478 DO - 10.1017/CBO9780511815478 ID - Wasserman1994 ER - TY - JOUR AU - Conklin, J. AU - Begeman, M. L. PY - 1988 DA - 1988// TI - gIBIS: a hypertext tool for exploratory policy discussion JO - ACM Trans Inf Syst VL - 6 UR - https://doi.org/10.1145/58566.59297 DO - 10.1145/58566.59297 ID - Conklin1988 ER - TY - CHAP AU - Field, A. AU - Hole, G. PY - 2003 DA - 2003// BT - How to Design and Report Experiments PB - Sage Publications Ltd CY - London ID - Field2003 ER - TY - CHAP AU - Atzenbeck, C. PY - 2006 DA - 2006// BT - WildDocs - Investigating Construction of Metaphors in Office Work ID - Atzenbeck2006 ER - TY - BOOK AU - Bernstein, M. PY - 2006 DA - 2006// TI - The Tinderbox Way PB - Eastgate Systems CY - Watertown ID - Bernstein2006 ER - TY - BOOK AU - Stenbit, J. P. AU - Wells, I. L. AU - Alberts, D. S. PY - 2002 DA - 2002// TI - NATO code of best practice for C2 assessment, [Chapter 5: Measures of Merit] PB - CCRP CY - Washington ID - Stenbit2002 ER - TY - CHAP AU - Irwin, C. AU - Roberts, C. AU - Mee, N. PY - 2002 DA - 2002// TI - Counter Terrorism Overseas BT - Defence Science and Technology Laboratory ID - Irwin2002 ER - TY - CHAP AU - Sageman, M. PY - 2004 DA - 2004// BT - Understanding Terrorist Networks PB - University of Pennsylvania Press (PENN) CY - Philadelphia, Pensylvania ID - Sageman2004 ER -