政大機構典藏-National Chengchi University Institutional Repository(NCCUR):Item 140.119/94879
English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  全文笔数/总笔数 : 113324/144300 (79%)
造访人次 : 51127575      在线人数 : 898
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻


    请使用永久网址来引用或连结此文件: https://nccur.lib.nccu.edu.tw/handle/140.119/94879


    题名: 情報決策象限理論之建構與個案分析-孫子兵法情報概念的反思
    The Construction and Case Study of the Quadrangular Theory for Intelligence-Decision:Reflection on the Intelligence Thought of Sun Tzu.
    作者: 紀光陽
    Chi, Kuang Yang
    贡献者: 李英明
    宋筱元

    Lee,Ying Ming
    Song,Sheau Yuan

    紀光陽
    Chi,Kuang Yang
    关键词: 孫子兵法
    情報
    信息
    認知
    決策
    象限理論
    決策方程式
    美伊戰爭
    The Art of War by Sun-tzu
    intelligence
    information
    cognition
    decision-making
    Quadrant theory
    Equation of decision
    Second Gulf War
    日期: 2009
    上传时间: 2016-05-09 12:35:34 (UTC+8)
    摘要: 「情報」與「決策」存在著高度的密切關係,「情報」正確而及時則相對提高「決策」的正確性;反之,則降低「決策」的正確性。但同一個「情報」對不同的個人而言,會產出不同的「決策」結果,此即是「決策」不僅與「情報」有關,亦與個人的「認知」條件有著密切的關係。
      因此,本文透過孫子兵法「情報」與「決策」的關係,架構出孫子的決策邏輯與位階性,再以此建構出情報決策「象限理論」,企圖系統性地解釋「情報」條件與決策者「認知」條件的複雜關係,並藉由第二次美伊戰爭的決策過程作為例證,說明導致決策錯誤的重要因素。並由「象限理論」中第一象限區域,及美伊戰爭決策缺失中,檢討並演繹出「國家安全決策新思維」,文中指出一個專業且中立的情報機關,除了要提升情報信息的客觀性外,更要避免、改變決策者先入為主的錯誤認知。經由本文所提出的「象限理論」、「決策方程式」、「個案分析」、「國家安全決策新思維」,將有助於瞭解並加速決策產出的質量與效能,進而有利於優質決策的產出。
    There is highly relationship between intelligence and decision-making. The correct and on time intelligence will make a good policy; but the wrong or slow intelligence will make a bad policy, on the contrary. The same intelligence for different individuals will result in different decision-making, which means decision-making has high relationship with intelligence and personal cognition.
    For this reason, this article constructs The Quadrangular Theory of Intelligence and Decision-making based on The Art of Sun-tzu theory, to explain the complicated relation between intelligence and personal cognition, as well as to state the important factor which leads to the wrong decision-making in the Second Gulf War.
    This article also point out an important concept: the professional and intelligence agencies will not only improve the objectively intelligence, but also will avoid policymaker`s prejudiced cognition. The Quadrangular Theory of Intelligence and Decision-making will help to understand the whole situation and accelerate the high quality and high efficiency decision-making process.
    參考文獻: 中文參考文獻
    書籍
    于長海(1994),《軍事系統決策研究》,北京:軍事科學出版社。
    孔令晟(1995),《大戰略通論》,臺北:好聯出版社。
    毛治國(2003),《決策》,臺北:天下雜誌出版社。
    王 沖、沙雪良(2002),《致勝奇招兵聖孫子》,臺北:希代書版股份有
    限公司。
    王永生(1999),《決策方略論》,北京:人民出版社。
    王雨田(1987),《控制論、信息論、系統科學與哲學》,北京:中國人民大學出版社。
    王逸舟(1998),《西方國際政治學:歷史與理論》,上海:上海人民出版
    社。
    包昌火(1991),《情報研究方法論》,北京:科學技術文獻出版社。
    安 平(2000),《活用孫子兵法與經商》,臺北:正展出版社。
    呂亞力(1984),《政治學方法論》,臺北:三民出版社。
    呂理州(1994),《明治維新:日本邁向現代化的歷程》,臺北:遠流出版
    社。
    宋筱元(1999),《國家情報問題之研究:情報與國家關係之分析》,桃園:
    中央警察大學。
    巫和懋、夏 珍(2002),《賽局高手》,臺北:時報出版社。
    李世俊、楊世舉、蕈家瑞(1995),《活用孫子兵法. 經營篇, 經營者的決
    策/管理/行銷/領導寶典》,臺北:遠流出版社。
    李耐國(2001),《軍事情報研究》,北京:軍事科學出版社。
    李 靜(1994),《科學思維的推理藝術》,臺北:淑馨出版社。
    李啟明(1996),《不戰而屈人之兵》,臺北:臺灣中華書局出版社。
    杜 陵(1978),《情報學》,桃園:中央警官學校。
    杜 陵(1988),《情報寫作藝術》,桃園:中央警官學校。
    岳劍波(1975),《信息環境論》,北京:書目文獻出版社。
    易克信、趙國琦(1992),《社會科學情報理論與方法》,北京:社會科學文
    獻出版社。
    易君博(1993),《政治理論與研究方法》,臺北:三民書局。
    林碧炤(1987),《論國際政治的持續與轉變》,臺北:桂冠出版社。
    邱子豪(1995),《孫子兵法企業管理學》,臺北:漢宇出版社。
    胡文彬(1999),《情報學》,臺北:政治作戰學校。
    胡建恆(1968),《謀略戰研究》,臺北:政工幹部學校。
    席汝楫(1997),《社會與行為科學研究方法》,臺北:五南出版社。
    徐立新(2004),《兵聖孫子》,臺北:宜高文化出版社。
    桂京山(1977),《反情報工作概論》,桃園:中央警官學校。
    國家安全局(1963),《情報學》,臺北:國家安全局。
    張中勇(1993),《後冷戰時期國家安全情報組織及其任務之研究》,臺北:
    國科會研究報告。
    張中勇(1993),《情報研究-從情報活動的實際實踐與理論解析觀點探
    討》,桃園:中央警官學校。
    張中勇(1993),《情報與國家安全之研究》,臺北:三鋒出版社。
    張中勇(1994),《情報研究-從情報活動的實際實踐與理論解析觀點探
    討》,臺北:行政院國家科學委員會科資中心。
    張式琦(1971),《作戰情報》,臺北:情報學校。
    張式琦(1983),《國家情報》,臺北:中華戰略學會大陸研究會。
    張春興(1975),《心理學》,臺北:東華書局。
    張殿清(1997),《特殊的較量:情報與反情報》,北京:世界知識出版社。
    張殿清(2001),《情報與反情報》,臺北:時英出版社。
    張曉軍(2001),《武經七書:軍事情報思想研究》,北京:軍事科學出版
    社。
    許芳銘(1999),《一個決策過程的系統式思考型構》,新竹:交通大學經營
    管理研究所博士論文。
    陳一明(1992),《孫子兵法與決策》,河北:中州古籍出版社。
    陳海鳴(1990),《一個決策過程概念及架構的討論-從認知的觀點》,新
    竹:國立交通大學管理科學研究所博士論文。
    陳湛勻(1999),《現代決策應用與方法分析》,臺北:五南出版社。
    陸忠偉(2003),《非傳統安全論》,北京:時事出版社。
    彭懷恩(1982),《決策論奇才:賽蒙》,臺北:允晨文化出版。
    游伯龍(1985),《行為與決策-知己知彼的基礎與應用》,臺北:中央研究
    院。
    湯炎光(1963),《情報戰》,臺北:建華出版社。
    程方平(1988),《教育情報學簡論》,四川:四川教育出版社。
    鈕先鍾(1997),《孫子三論:從古兵法到新戰略》,臺北:麥田出版社。
    馮恩樁、謝仁興(1994),《情報研究學基礎》,北京:科學技術文藝出版
    社。
    楊士毅(1991),《邏輯、民主、科學-方法論導讀》,臺北:書林出版社。
    楊少俊(1992),《孫子兵法的電腦研究》,北京:解放軍出版社。
    楊善群(1999),《孫子》,永和:貿騰發賣出版社。
    葉文倩(1988),《決策、目標與經營理念》,臺北:書泉出版社。
    鄒志仁(1991),《情報學基礎》,南京:南京大學出版社。
    褚良才(2002),《孫子兵法研究與應用》,浙江:浙江大學出版社。
    趙保佑、李正平、李允豹(1992),《情報社會學》,北京:東方出版社。
    劉愷之(2002),《孫子兵法的智慧法則》,臺北:臺灣廣廈有聲圖書。
    蔡志忠(2004),《孫子兵法》,臺北:時報出版社。
    蔡萬助(2000),《21世紀軍事管理知識體系之研究》,臺北:華泰文化出
    版社。
    鄭克禮(1996),《孫子兵法在當今世界的妙用》,臺北:方智出版社。
    閻晉中(1999),《軍事情報學》,北京:時事出版社。
    謝清佳(1989),《資訊概念架構的芻議及其應用》,新竹:交通大學管理科
    學研究所博士論文。
    謝清佳(1996),《資訊管理:理論與實務》,臺北:智勝文化。
    魏 鏞(2001),《中華民國行政資訊體系之建立與展望》,臺北: 行政院
    研究發展考核委員會編印。
    魏宏森(1988),《系統理論及其哲學思考》,北京:清華大學出版社。
    嚴定暹(2003),《孫子兵法活學活用》,臺北:凱信出版社。
    蘇韶懿(1998),《孫子兵法論述-結構及其現代管理意涵之研究》,新竹:
    交通大學經營管理研究所博士論文。
    專書篇章
    宋學文(2000),〈全球化與非政府組織對國家關係的影響〉,收錄於吳英
    明、林德昌編,《非政府組織》,臺北:商鼎文化出版社,頁67-91。
    林正義(1996),〈臺灣安全戰略〉,收錄於謝淑媛編,《台海安全情報》,
    臺北:玉山出版社,頁45-70。
    羅森勃呂特、維納、別格羅(1969),〈行為、目的和目的論〉,《控制論哲
    學問題譯文集》,北京:商務印書館出版社,頁1-17。
    佛.尼.洛博夫(1995),〈戰爭中的謀略〉,《當代國外軍事名著精選》,
    北京:軍事誼文出版社,頁550-572。
    翻譯書籍
    Bossidy, Larry and Ram Charan着 李 明譯(2003),《執行力》,
    臺北:天下文化出版社。
    Farago, Ladislas著 法務部調查局譯(1955),《智慧之戰》,臺北:內
    政部調查局。
    Hirshleifer, Jack著 劉廣靈、李紹榮譯(2000),《不確定性或信息分
    析》,北京:中國社會科學出版社。
    Hulnick, Arthur S.著,國防部譯(2006),《情報與國土安全》,臺
    北:國防部譯印,頁18。
    Odom, William E.著,國防部譯(2005),《情報改革》,臺北:國防部
    譯印。
    Peters, B. Guy著,陳永芳譯(2003),《比較政治的理論與方法》,臺
    北:韋伯出版社。
    Robbinns, Stephen P.著,林思伶、李炳林譯(2005),《決策DNA》,
    臺北:培生教育出版社。
    Schramm, Wilbur L.著,余也魯譯(1990),《傳學概論:傳媒‧信息與
    人》,香港:海天出版社。
    K. B. 塔拉卡諾夫著,何士彬譯(1993),《情報學》,北京:書目文獻出
    版社。
    列爾涅爾(1980),《控制論基礎》,北京:科學出版社,頁85-86。
    期刊及學術會議文章
    老 參(1975),〈泛論軍事情報-情報是現代國防的第一線〉,《三軍聯合
    月刊》,第13卷3期,頁95-106。
    李英明、賴皆興(2005),〈從理性博奕向結構博奕轉移:兼論兩岸結構博
    奕〉,《遠景基金會季刊》,第6卷4期,頁1-29。
    汪毓瑋(2002),〈資訊時代之情報在危機決策中之作用與面臨之問題〉,
    《中華戰略學刊》,秋季刊,頁127-166。
    宋筱元(1998),〈從臺商間諜案論獨裁政權之情報機構〉,《理論與政
    策》,第47期,頁48-59。
    宋筱元(1998),〈情報研究-一門新興的學科〉,《警政學報》,第33
    期,頁459-479。
    宋筱元、紀光陽(2007),〈論孫子兵法中的情報決策觀〉,《中央警察大學
    警學叢刊》,第37卷第4期,頁43-68。
    林吉郎(2002),〈我國國家安全與危機管理:整合性緊急管理政策與機
    制〉,《國防雜誌》,第17卷9期,頁87-105。
    紀光陽(2007),〈論孫子兵法的决策思維-情報觀點的反思〉,《北臺灣科
    技學院通識學報》,第3期,頁245-263。
    孫伯先(1971),〈論戰爭原則-安全與情報〉,《情報學術研究》,第7
    期,頁24-39。
    馬費成(2002),〈論情報學的基本原理〉,《資訊傳播與圖書館學》,第8
    卷3期,頁35-44。
    高希均(2003),〈領導智慧與執行能力〉,《遠見雜誌》,第204期,頁
    30-31。
    許志強(2002),〈情報學多元進化理論研究〉,《資訊傳播與圖書館學》,
    第8卷4期,頁55-66。
    章一平(1997),〈冷戰後世界的新安全觀〉,《現代國際關係》,第2期,
    頁38-41。
    鈕先鍾(1973),〈國家安全政策,一個隱晦的領域〉,《軍事譯粹》,第
    22卷7期,頁3-21。
    黃秋龍(2004),〈非傳統安全的理論與實踐〉,《展望與探索》,第2卷4
    期,頁11-22。
    劉慶元(2002),〈國家安全戰略理論探析〉,《中華戰略學刊》,冬季刊,
    頁23-54。
    瑩 蒼(1969),〈研讀總統政治作戰情報戰訓示之心得〉,《情報學術研
    究》,第2期,頁1-20。
    蔡政修(2004),〈911事件後的美國國家安全戰略:以波灣戰爭與北韓核子
    危機為例〉,《問題與研究》,第43卷6期,頁129-165。
    繆 園(2002),〈20世紀90年代以來日本情報科學與圖書館情報學的發
    展〉,《資訊傳播與圖書館學,第8卷3期,頁85-92。
    謝志淵(2003),〈從情報學發展趨勢探討國軍戰場情報準備工作之發展〉,
    《陸軍學術月刊》,第39卷458期,頁59-69。
    嚴怡民(1992),〈情報學研究現狀與展望〉,《情報學報》,第13卷1期,
    頁1-12。
    嚴怡民(1996),〈走向21世紀的情報學〉,《圖書情報知識》,第2期,頁
    5-12。
    蘇進強(2003),〈國家安全與危機管理機制〉,《新世紀智庫論壇》,第
    21期,頁4-25。
    沈玄池(2003),〈美伊戰爭與全球外交動向〉,中興大學全球和平戰略研究
    中心,2003年4月11日。
    <http://cgpss. nchu.edu.tw /modules/ wfsection/
    article.php? articleid=78>

    西文參考文獻
    Books
    Adler, Mortimer J. (1963), Philosophy, Chicago:Encyclopedia
    Britannica.
    Alexander, Milton J. (1974), Information Systems Analysis: Theory and Applications, Chicago: Science Research
    Associates.
    Ameringer, Charles D. (1990), U.S. Foreign Intelligence:
    The Secret Side of American Society, Le×ington: Lexington
    Books.
    Andrews, Linda W. (2003), Intelligence, New York: Franklin
    Watts.
    Babbie, Earl R. (1989), The Practice of Social Research,
    California: Wadsworth Publishing.
    Ball, Desmond (2003), China`s Signals Intelligence
    (SIGINT): Satellite Programs,Canberra: Strategic and
    Defence Studies Centre.
    Bamford, James (2005), A Pretext for War: 9/11, Iraq, and
    the Abuse of America`s intelligence Agencies, New York:
    Anchor Books.
    World Bank Staff Author (1997), World Development Report,
    Washington D. C..: World Bank Publications.
    Bar-Joseph, Uri (1995), Intelligence Intervention in the
    Politics of Democratic States: The United States, Israel,
    and Britain, University Park, Pennsylvania: The
    Pennsylvania State University Press.
    Barrett, David M. (2005), The CIA & Congress: The Untold
    Story from Truman to Kennedy, Lawrence, Kan.: University
    Press of Kansas.
    Baylis, John and Steve Smith (1997), The Globalization of
    World Politics: An Introduction to International
    Relations, New York: Oxford University Press.
    Berg, Bruce (1995), Qualitative Research Methods for the
    Social Sciences, Boston: Allyn & Bacon.
    Berkowitz, Bruce D. and Allan E. Goodman (1989), Strategic
    Intelligence for American National Security, Princeton,
    New Jersey: Princeton University Press.
    Berkowitz, Bruce D. and Allan E. Goodman (2000), Best
    Truth: Intelligence in the Information Age, New Haven:
    Yale University Press.
    Berkwitz, Morton and Peter G. Bock (eds.) (1965), American
    National Security, New York: Free Press.
    Berlinski, David (1979), 0n Systems Analysis: An Essay
    Concerning the Limitations on Some Mathematical Methods
    in the Social, Political and Biological Science, Mass:
    MIT Press.
    Best, Richard A. (2005), Intelligence Reorganization
    Proposals, 1949-2004, New York: Novinka.
    Blumenthal Sherman C. (1969), MIS-A Framework for Planning
    and Development, New Jersey: Prentice-Hall.
    Bochenski, Joseph M. (1972), Philosophy: An Introduction,
    New York: Harper & Row.
    Bohman, James (2000), New Philosophy of Social Science,
    Cambridge: MIT Press.
    Born, Hans (2005), Who`s Watching the Spies: Establishing
    Intelligence Service Accountability, Dulles, Va.: Potomac
    Books.
    Boulding, Kenneth E. (1953), The Image: Knowledge in Life
    and Society, Ann Arbor:University of Michigan Press.
    Brashaw, Nicholas C. (2001), Signals Intelligence, the
    British and the War in Yugoslavia 1941-1944, Southampton:
    University of Southampton, Dept. of History.
    Braybrooke, David and Charles Lindblom (1963), A Strategy
    of Decision: Policy Evaluation as a Social Process, New
    York: Free Press of Glencoe.
    Breckinridge, Scott D. (1986), The CIA and the U. S.
    Intelligence System, Boulder:Westview Press.
    Burch, John G. (1979), Information Systems: Theory and
    Practice, New York: Wiley.
    Bush, George W. (2002), Nation Strategy to Combat Weapons
    of Mass Destruction, Washington, D. C.: The White House.
    Buzan, Barry (1997), Security: A New Framework for
    Analysis, Boulder, Colo.: Lynne Rienner Publishing.
    Bynner, John (1979), Social Research: Princip1es and
    Procedures, New York: The Open University Press.
    Charters, David A. (1996), Intelligence Analysis and
    Assessment, London; Portland, Or.: Frank Cass.
    Chatterjee, Kalyan and William Samuelson (2001), Game
    Theory and Business Applications, Boston, Mass.: Kluwer
    Academic Publishing.
    Cianciolo, Anna T. (2004), Intelligence : A Brief History,
    Malden, MA: Blackwell Publishing.
    Cimbala, Stephen J. (ed. ) (1987), Intelligence and
    Intelligence Policy in a Democratic Society, New York:
    Transnational Publishing.
    Clark, Robert M. (2004), Intelligence Analysis: A Target-
    Centric Approach, Washington, D. C.: CQ Press.
    Clavell, James (ed.) (1983), The Art of War: Sun Tzu, New
    York: Delacorte Press.
    Clausewitz, Carl V. (1976), On War, Translated by Louise
    and Aylmermaude, Oxford, N. Y.; Oxford University Press.
    Cole, Stephen (1992), Making Science: Between Nature and
    Society, Cambridge, Mass.:Harvard University.
    Commission on CIA Activites Within the United States
    (1975), Report to the President,Washington, D. C.: U. S.
    Government Printing Office.
    Cooper, Joseph D. (1961), The Art of Decision-Making, New
    York: Doubleday.
    Cordesman, Anthony H. (2003), The Iraq War: Strategy,
    Tactics, and Military Lessons , Washington, D. C.: Center
    for Strategic and International Studies Press.
    Cordesman, Anthony H. and Arleigh A. Burke (2003),
    Intelligence Failures in the Iraq War, Center for
    Strategic and International, Washington, D. C.: Center
    for Strategic and International Studies Press.
    Cordesman, Anthony H. and Arleigh A. Burke (2003), The
    Lessons of the Iraq War: Issues Relating to Grand
    Strategy, Washington, D. C.: Center for Strategic and
    International Studies Press.
    Daalder, Ivo H. and James M. Lindsay (2003), America
    Unbound: The Bush Revolution in Foreign Policy/Ivo H.
    Daalder, James M. Lindsay, Washington, D. C.: Brookings
    Institution.
    Davenport, Thomas H. (2007), Competing on Analytics: The
    New Science of Winning, Boston, Mass.: Harvard Business
    School Press.
    Doane, James P. (2005), Dynamics of Homeland Security and
    National Defense, New York: McGraw-Hill.
    Doyal, Len (1986), Empiricism Explanation, and Rationality:
    An Introduction to the Philosophy of the Social Sciences,
    New York: Routledge & K. Paul.
    Drea, Edward J. (1992), MacArthur`s ULTRA: Codebreaking and
    the War Against Japan, Lawrence, Kansas: University Press
    of Kansas.
    Easton, David (1953), The Political System: An Inquiry into
    the State of Political Science,New York: Knopf.
    Easton, David (1965), A Systems Analysis of Politics Life,
    New York: John Wiley & Sons.
    Easton, David (1966), A Framework for Political Analysis,
    Macmallan: Free Press.
    Ferris, John R. (2005), Intelligence and Strategy: Selected
    Essays, New York, NY: F. Cass.
    Foo, Check T. and Peter H. Grinyer (1995), Sun Tzu on
    Management: The Art of War in Contemporary Business
    Strategy, Singapore: Butterworth-Heineman Asia.
    Fukuyama, Francis (2006), America at the Crossroads,
    Democracy, Power, and the Neoconservative Legacy, New
    Haven: Yale University Press.
    Fuller, Steve (1997), Science, Buckingham: Open University
    Press.
    Gabrys, Bogdan (2005), Do Smart Adaptive Systems Exist?:
    Best Practice for Selection and Combination of
    Intelligent Methods, Berlin: Springer.
    Gilligan, Tom (2003), CIA Life: 10,000 days with the
    Agency, Boston: Intelligence Book Division.
    Godson, Roy (1981), Intelligence Requirements for the
    1980`s: Covert Action. Washington, D. C.: National
    Strategy Information Center.
    Godson, Roy (1995), Dirty Tricks or Trump Cards: U.S.
    Covert Action and Counterintelligence, Washington, D. C.:
    Brassey`s.
    Godson, Roy (ed.) (1980), Intelligence Requirements for the
    1980`s Counterintelligence, Washington, D. C.: National
    Strategy Information Center.
    Godson, Roy and Ernest R. May (eds) (1995), U. S.
    Intelligence at the Crossroads: Agendas for Reform,
    Washington, D. C.: Brassey`s.
    Graham, Bob (2004), Intelligence Matters: The CIA, The FBI,
    Saudi Arabia, and the Failure of America`s War on Terror,
    New York: Random House.
    Griffin, David R. (2005), The 9/11 Commission Report:
    Omissions and Distortions Northampton, Mass.: Olive
    Branch Press.
    Griffith, Samuel B. (1963), Sun Tzu: The Art of War, New
    York: Oxford University.
    Gutjahr, Melanie (2005), The Intelligence Archipelago,
    Washington, D. C.: Joint Military Intelligence College.
    Halibozek, Edward P. (2005), Mergers and Acquisitions
    Security: Corporate Reorganizations and Security
    Management, Amsterdam; Boston: Elsever Butterworth
    Heinemann.
    Handel, Michael I. (1996), Masters of War: Classical
    Strategic Thought, London: Frank Cass.
    Harmon, Paul (1985), Expert System: Artificial Intelligence
    in Business, New York: John Willey.
    Hawkings, David E. and Shan Rajagopal (2005), Sun Tzu and
    the Project Battleground: Creating ProjectStrategy
    from“The Art of War”, New York: Palgrave Macmillan.
    Hedges, Larry V. (1985), Statistical Methods for Meta-
    Analysis, Orlando: Academic Press.
    Held, David, Anthony McGRew, David Goldblatt and Jonathan
    Perraton (eds.) (1999), Global Transformations: Politics,
    Economics and Culture, Oxford: Polity Press.
    Heywood, Andrew (2002), Politics, New York: Palgrave
    Foundations.
    Himanen, Mervi (2003), The Intelligence of Intelligent
    Buildings: The Feasibility of the Intelligent Building
    Concept in Office Buildings, Espoo: Technical Research
    Centre of Finland.
    Hirst, Rodney J. (1968), Philosophy: An Outline for the
    Intending Student, London: Routledge & K. Paul.
    Hoffmann, Paul and Terplan Kornel (2005), Intelligence
    Support Systems: Technologies for Lawful Intercepts, Boca
    Raton: Auerbach Publications.
    Hogarth, Robin M. (1979), Judgement and Choice: The
    Psychology of Decision, New York: John Wiley & Sons.
    Hollingsworth, Mark and Fielding Nick (2003), Defending the
    Realm: Inside MI5 and the War on Terrorism, London: Andr
    Deutsch.
    Holt, Pat M. (1995), Secret Intelligence and Public Policy:
    A Dilemma of Democracy, Washington D. C.: CQ Press.
    Holtzman, Samuel (1989), Intelligent Decision Systems,
    Reading, Mass.: Addison- Wesley.
    Hooker, Gregory (2005), Shaping the Plan for Operation
    Iraqi Freedom: The Role of Military Intelligence
    Assessments, Washington, D. C.: Washington Institute for
    Near East Policy.
    Hoover, Kenneth R. (1992), The Element of Social Scientific
    Thinking, New York: St. Martin`s.
    Huntington, Samuel P. (1991), The Third Wave:
    Democratization in the Late Twentieth Century, Okla:
    University of Oklahoma Press.
    Huntington, Samuel P. (1996), The Clash of Civilizations
    and the Remaking of Word Order, New York, N. K.: Simon &
    Schuster.
    Jackson, Peter and Siegel Jennifer (2005), Intelligence and
    Statecraft: The Use and Limits of Intelligence in
    International Society, Westport, Conn.: Praeger.
    Jervis, Robert (1976), Perception and Misperception in
    International Politics, Princeton,
    Johnson, Loch K. (1989), America`s Secret Power: The CIA in
    a Democratic Society, New York: Oxford University Press.
    Jomini, Antoine H. (1995), The Art of War, Novato, Calif.:
    Presidio Press.
    Jordan, Amos A. and William J. Taylor (eds.) (1984),
    American National Security: Policy and Process,
    Baltimore: The Johns Hopkins University.
    Kam, Ephraim (1988), Surprise Attack, Cambridge, Mass.:
    Harvard University Press.
    Keegan, John (2003 ), Intelligence in War: Knowledge of the
    Enemy from Napoleon to Al-Qaeda, London: Hutchinson.
    Keegan, John (2004), Intelligence in War: The Value--and
    Limitations--of What the Military Can Learn about the
    Enemy, New York: Vintage Books.
    Keeney, Ralph L. and Howard Raiffa (1993), Decision with
    Multiple Objective: Preferences and Value Tradeoffs, New
    York: Cambridge University Press.
    Kegley, Charles W. and Eugene R. Wittkopf (1981), World
    Politics: Trend and Transformation, New York: St.
    Martin`s Press.
    Kent, Sherman (1949), Strategic Intelligence for American
    World Policy, New Jersey: Princeton University Press.
    Kent, Sherman (1966), Strategic Intelligence for American
    World Policy, New Jersey: Princeton University Press .
    Kickert, Walter J. M. (1980), Organization of Decision-
    Making: A Systems-Theoretical Approach, Amsterdam: North-
    Holland Publishing Company.
    Kirk, Geoffrey S. (1970), Myth: Its Meaning and Functions
    in Ancient and Other Culture, Cambridge: University Press.
    Kuper, Adam and Jessica Kuper (1985), The Social Science
    Encyclopedia, London Boston and Henley: Routledge & Kegan
    Paul.
    Ladner, Roy and Petry Frederick E. (2005), Net-Centric
    Approaches to Intelligence and National Security, New
    York: Springer.
    Lewin, Ronald (1978), ULTRA Goes to War, London:
    Hutchinson. New Jersey: Princeton University Press.
    Lindblom, Charles E. (1968), The Policy Making Process, New
    York: Prentice-Hall.
    Lindley, Dennis V. (1971 ), Making Decision, New York:
    Wiley-Interscience.
    Lowenthal, Mark M. (2000 ), Intelligence: From Secrets to
    Policy, Washington, D. C.: CQ Press.
    Lowenthal, Mark M. (2005), Intelligence: From Secrets to
    Policy, Washington, D.C.: CQ Press.
    Luger, George F. (2005), Artificial Intelligence:
    Structures and Strategies for Complex Problem Solving,
    New York: Addison-Wesley.
    Macksey, Kenneth (2004), The Searchers: Radio Intercept in
    Two World Wars, London: Cassell.
    Mann, James (2004), Rise of the Vulcans: The History of
    Bush`s War Cabinet, New York: Penguin Books.
    Markle, Donald E. (2004), Spies and Spymasters of the Civil
    War, New York: Hippocrene Books.
    Marshall, Kneale T. (1995), Decision Making and
    Forecasting: With Emphasis on Model Building and Policy
    Analysis, New York: McGraw-Hill.
    Mcneilly, M. (1996), Sun Tzu and the Art of Business: Six
    Strategic Principles for Managers, New York: Oxford
    University.
    McNeilly, Mark (2001), Sun Tzu and the Art of Modern
    Warfare, New York: Oxford University.
    Minford, John (2002), The Art of War: Sun Tzu, New York:
    Viking.
    Moens, Alexander (2004), The Foreign Policy of George W.
    Bush: Values, Strategy, and Loyalty, Burlington VT:
    Ashgate Publishing.
    Morse, Edward L. (1976), Modernization and the
    Transformation of International Relation,New York: The
    Free Press.
    Nath, Dilip C. (2004), Intelligence Imperatives for India,
    New Delhi: India First Foundation.
    National, Defense University (1996), Strategic Assessment,
    Washington, D. C.: Government Printing Office.
    National Security Strategy of the United States (2002),
    Washington, D. C.: U. S. Government Printing Office.
    Neilson, Robert E. (1997), Sun Tzu and Information Warfare,
    Washington, D. C.: National Defense University.
    Nguyen, Hung T. and Berlin Wu (2006), Fundamentals of
    Statistics with Fuzzy Data , New York: Springer.
    Nye, Joseph S. (1990), The Changing Nature of American
    Power, New York: Basic Books.
    Oseth, John M. (1985), Regulating U. S. Intelligence
    Operations: A Study in Definition of the National
    Interest, Lexington, Kentucky: The University Press of
    Kentucky.
    Padelford, Norman J. and George A. Lincoln (1954),
    International Politics: Foundations of International
    Relations, New York: Macmillan.
    Perner, Petra (2002), Advance s in Data Mining:
    Applications in E- Commerce, Medicine, and Knowledge
    Management, Berlin: New York: Springer.
    Platt, Washington (1957), Strategic Intelligence
    Production: Basic Principles, New York:Frederick A.
    Praeger.
    Popper, Karl R. (1972), Objective Knowledge: An
    Evolutionary Approach, Oxford: Clarendon Press. Press of
    America.
    Powers, Thomas (2004), Intelligence Wars: American Secret
    History from Hitler to Al-Qaeda, New York: New York
    Review Books.
    Ragin, Charles C. (2000), Fuzzy Set Social Science,
    Chicago: The University of Chicago.
    Ranney, Austin (1996), Governing: An Introduction to
    Political Science, Upper Saddle River, New Jersey:
    Prentice-Hall.
    Ransom, Harry H. (1970), The Intelligence Establishment,
    Cambridge, Mass.: Harvard University Press.
    Rappaport, Alfred (1975), Information for Decision Making:
    Quantitative and Behavioral Dimensions, Englewood Cliffs,
    NEW JERSEY: Prentice-Hall.
    Richelson, Jeffrey (1995), The U. S. Intelligence
    Community, Boulder, Colo.: Westview Press.
    Ricks, Thomas E. (2006), Fiasco: The American Military
    Adventure in Iraq, New York: The Penguin Press.
    Roberts, Jonathan M. (1988), Decision-Making During
    International Crisis, New York: St. Martin Press.
    Rumbaugh, Duane M. (2003), Intelligence of Apes and Other
    Rational Beings, New Heaven: Yale University Press.
    Ryan, Frank X. (2002), Science, Humanism and the Scopes
    Trial, Bristol, England: Thoemmes Press.
    Sawyer, Ralph D. (1993), The Seven Military Classics of
    Ancient China , Boulder: Westview Press.
    Scanlan, Burt K. (1973), Principles of Management and
    Organizational Behavior, New York: John Wiley and Sons.
    Schmitt, Samuel A. (1969), Measuring Uncertainty: An
    Elementary Introduction to Bayesian Statistics, Mass.:
    Addison-Wesley.
    Schulhofer, Stephen J. (2005), Rethinking the Patriot Act :
    Keeping America Safe and Free, New York: Century
    Foundation Press.
    Schwarz, Brita (ed.) (1985),“Guidance for
    Decision,”Handbook of System Analysis, New York: Oxford.
    Shannon, Claude E. (1949), The Mathematical Theory of
    Communication, Urbana: University of Illinois Press.
    Shapere, Dudley (1984), Galileo: A Philosophical Study,
    Chicago: University of Chicago Press.
    Shulsky, Abram N. (1993), Silent Warfare: Understanding the
    World of Intelligence, Washington, D. C.: Brassey`s(US).
    Silbert, Leslie (2004), The Intelligencer, New York: Atria
    Books.
    Silverman, David (1993), Interpreting Qualitative Data,
    Newbury Park, CA: Sage.
    Simon, Herbert A. (1957), Administrative Behavior, New
    York: Macmillian.
    Simon, Herbert A. (1960), The New Science of Management
    Decision, New York: Harper Row.
    Simon, Herbert A. (1976), Administrative Behavior, New
    York: The Free Press.
    Simon, Herbert A. and Allen Newell (1972), Human Problem
    Solving, Englewood Cliffs, NEW JERSEY: Prentice Hall.
    Simon, Herbert A. and James G. March (1958), Organization,
    New York: John Wiley & Sons. Inc..
    Solso, Robert L. (1988), Cognitive Psychology, Boston:
    Allyn and Bacon.
    Steinbruner, John D. (1974), The Cybernetic Theory of
    Decision: New Dimensions of Political Analysis,
    Princeton, NEW JERSEY: Princeton University Press.
    Sternberg, Robert J. (1985), Beyond IQ: A Triachic Theory
    of Human Intelligence, New York: Cambridge University
    Press.
    Symeonidis, Andreas L. and Pericles A. Mitkas (2004),
    Intelligent Agents for Data Mining and Information
    Retrieval, Hershey, Pa.: Idea Group Publishing.
    Symeonidis, Andreas L. and Pericles A. Mitkas (2005), Agent
    intelligence Through Data Mining, New York: Springer.
    The Commission on the Roles and Capabilities of the United
    States Intelligence Community (1996), Preparing for the
    21st Century: An Appraisal of U. S. Intelligence,
    Washington, D. C.: Government Printing Office.
    Thomas, Gordon (2005), Gideon`s Spies: The Secret History
    of the Mossad, New York: Thomas Dunne Books.
    Thomas, Troy S. (2004), Beneath the Surface: Intelligence
    Preparation of the Battlespace for Counterterrorism,
    Washington, D.C.: Joint Military Intelligence College.
    Thompson, James D. (1967), Organization in Action, New
    York: McGraw-Hill Book Company.
    Tolstoy, Leo (1983), War and Peace, Translated by Louise
    and Aylmermaude, Oxford,N. Y.; Oxford University Press.
    Tuomela, Raimo (1985), Science, Action, and Reality,
    Boston: Sold and Distributed in the U. S. A. and Canada
    by Kluwer Academic Publishing.
    Turban, Efraim (1998), Decision Support System and
    Intelligent Systems, Upper Saddle River, NEW JERSEY:
    Prentice Hall.
    Turner, Stansfield (1985), Secrecy and Democracy: The CIA
    in Transition, Boston: Houghton Mifflin Company.
    Turner, Stansfield (2005), Burn before Reading: Presidents,
    CIA Directors, and Secret Intelligence, New York:
    Hyperion.
    U. S. Government Printing Office (1975), Rockefeller
    Commission Report to the President on CIA Activities with
    the United States: Washington, D. C.: U. S. Government
    Printing Office.
    Usama, Fayyad (1996), Mining Database: Toward Algorithms
    for Knowledge Discovery. Bulletin of the Technical
    Committee on Data Engineering, Menlo Park, Calif.: AAAI
    Press: MIT Press.
    Viotti, Paul R. and Mark V. Kauppi (1993), International
    Relations Theory: Realism, Pluralism, Globalism, New
    York: Macmillan Publishing.
    Watson, Brue W., Susan M. Watson, and Gerald W. Hoople
    (1990), United States Intelligence: An Encyclopedia, New
    York: Garland Publishing.
    Weber, Werner (2005), Ambient Intelligence, New York:
    Springer.
    Weldon, Curt (2005), Countdown to Terror: The Top- Secret
    Information that Could Prevent the Next Terrorist Attack
    on America-and How the CIA Has Ignored it, Washington, D.
    C.: Regnery Publishing.
    Wiener, Norbert (1962), Cybernetics, New York: MIT Press.
    Zegart, Amy (1999), Flawed by Design: The Evolution of the
    CIA, JCS, and NSC, Stanford, Calif.: Stanford University
    Press.
    Zey, Mary (1992), Decision Making: Alternatives to Rational
    Choice Mode, Newbury Park: Sage.Article in Specific Book
    Boorman, Scott A. (1972 ),“Deception in Chinese
    Strategy,”in William W. Whitson (ed.), The Military and
    Political Power in China in the 1970`s, New York:
    Praeger, pp. 313-337.
    Boot, Max (2004),“Myths about Neoconservatism,”in Irwin
    Stelzer (ed.), Neoconservatism, London: Atlantic Books,
    p. 39-55.
    Daniel, Donald C. and Katherine L. Herbig
    (1982),“Propositions on Military Deception,”in Donald
    C. Daniel (ed.), Strategic Military Deception, New York:
    Pergamon Press, pp. 3-30.
    Fairbank, John K. (1974),“Introduction: Varieties of the
    Chinese Military Experience,”in Edward L. Dreyer, Frank
    A. Kierman and John K. Fairbank (eds.), Chinese Way in
    Warfare, Cambridge Mass: Harvard University Press, pp. 2-
    26.
    Frei, Daniel (1978),“Introduction: The Rationales and
    Implication of Crisis Research,”in Danied Frei (ed.),
    International Crises and Crisis Management: An East-West
    Symposium, New York: Praeger Publishing, pp. 1-3.
    Hastedt, Glenn (1991),“Controlling Intelligence: Defining
    the Problem,”in Glenn Hastedt (ed.), Controlling
    Intelligence, London: Frank Cass & Co.Ltd., pp. 3-23.
    Heyman, Hans (1985),“Intelligence/Policy
    Relationships,”in Alfred C. Maurer, Marion D. Tunstall,
    and James M. Keagle (eds.), Intelligence: Policy and
    Process , Boulder: Westview Press, pp. 57-66.
    Kast, Fremont E. and James E. Rosenzweig (1972), “The
    Modern View: A Systems Approach,”in John B. Ronald
    (ed.), Systems Behavior, New York: Harper, pp. 14-28.
    Patrick, Watson (1995),“The FBI`s Changing Mission”in Roy
    Godson, Ernest R. May and Gary Schmitt (eds.), U.S.
    Intelligence at the Crossroads: Agendas for Reform,
    Washington, D.C: Brassey`s, pp. 145-162.
    Ransom, Harry Howe (1987),“The Politicization of
    Intelligence,”in Stephen J. Cimbala (ed.), Intelligence
    and Intelligence Policy in a Democratic Society , New
    York: Dobbes Ferry, Transnational Publishing, p. 55-72.
    Reitman, Walter R. (1964), “Heuristic Decision Procedures,
    Open Constraints, and the Structure of Ill-Defined
    Problems ,” in Maynard Shelley and Glenn L. Bryan
    (eds.), Human Judgments and Optimality, New York: Wiley &
    Sons, pp. 282-315.
    Shulsky, Abram N. (1995),“What is Intelligence? Secrets
    and Competition Among State,”in Roy Godson, Ernest R.
    May, and Gary Schmitt (eds.), U. S. Intelligence at the
    Crossroad: Agendas for Reform, Washington D. C.:
    Brassey`s, pp. 22-45.
    Simon, Herbert A. (1978),“Information-Processing of Human
    Problem Solving,”In William K. Estes (ed.) , Handbook of
    Learning and Cognitive Processes, New York: Distributed
    by the Halsted Press Division of Wiley, pp. 271-295.
    Thomas, Stafford T. (1985),“Intelligence Production and
    Consumption: A Framework of Analysis,”in Alfred C.
    Maurer, Marion D. Tunstall, and James M. Keagle
    (eds.),Intelligence: Policy and Process, Boulder,
    Co1o.: Westview Press, pp. 125-139.
    Sullivan, David S. (1980),“Evaluation U.S. Intelligence
    Estimates,”in Roy Godson (ed.) , Intelligence
    Requirements for the 1980s: Analysis and Estimate, New
    Brunswick: Transaction Books, pp. 49-73.
    Tipson, Frederick S. (1990),“National Security and the
    Role of Law,”in John N. Moore (ed.), National Security
    Law, Durham, N. C.: Carolina Academic Press, pp. 3-29.
    Yovits, Marshall C. (1974),“A Generalized Concept for
    Analysis of Information,” in Anthony Debons (ed.),
    Information Science: Search for Identity, New York:
    Marcel Dekker, pp. 25-47.
    Articles
    Abenheim, Donald (2003),“Germany and the United States in
    the Age of Terror Ideas, Domestic, and the International
    System of States,”Naval War College Review, No. 4, pp.
    62-82.
    Amos, Kovacs (1997),“Using Intelligence,”Intelligence and
    National Security, Vol. 12, No. 4, pp. 145-164.
    Arquilla, John (1994),“The Strategic Implications of
    Information Dominance,”Strategic Review, Summer. May,
    pp. 24-30.
    Betts, Richard K. (1978),“Analysis, Wars, and Decision:
    Why Intelligence Failures are Inevitable,”World
    Politics, Vol. 31, No. 1, pp. 61-89.
    Binnendijk, Hans (1997),“Tin Cup Diplomacy,”The National
    Interest, No. 49, pp. 88-91.
    Brecher, Michael (1973),“Image, Process and Feedback in
    Foreign Policy,”American Political Science Review, Vol.
    67, No. 1, pp. 74-97.
    Brookes, Bertram C. (1980),“The Foundation of Information
    Science. Part I. Philosophical Aspects,”Journal of
    Information Science, Vol. 2, No. 3, pp. 126-142.
    Cartwright, Dorwing (1949),“Some Principles of Mass
    Persuasion: Selected Findings of Research on the Sale of
    U. S. War Bonds,”Human Relation, N0. 2, pp. 253-268.
    Cimbala Stephen J. (1988),“What Kind of War
    Plan?”Airpower Journal, No. Summer.
    <Http://www.airpower.maxwell.af.mil/
    airchronicles/apj/apj88/sum88/cimbala.html>
    Cishan, Ruan (2003),“11.‘Soft Hegemony’Hurts Sino-
    U.S.Relation,”Chinese Education and Society, Vol. 36 ,
    No. 1, pp. 79-81.
    Cooper, Eunica and Marie Jahoda (1947),“The Evasion of
    Propaganda: How Prejudiced Peopler Respond to Anti-
    Propaganda Propaganda,”Journal of Psychology, No. 23,
    pp. 11-26.
    Dehghanpisheh, Babak (2007),“Apocalypse Now; Iraqi Forces
    Struggle in the Battle Against a Shadowy Shiite Death
    Cult. And that`s Only a Small Part of the Problems
    They`re facing in Iraq`s south,”Newsweek , Vol. 149 ,
    No. 6, p.36.
    Deng, Ju-Long (1982),“Control Problems of Grey Systems,”
    System and Control Letters, Vol. 1, No. 5, pp. 288-294.
    Desouza, Kevin C. (2001),“Intelligence Agents for
    Competitive Intelligence:Survey of
    Application,”Competitive Intelligence Review, Vol. 12,
    No. 4, pp. 57-63.
    Doran, Michael S. (2003),“Palestine, Iraq, and American
    Strategy,”Foreign Affairs, Vol. 82, No.1, pp. 19-24.
    Edwards, Ward (1954),“The Theory of Decision
    Making,”Psychological Bulletin, Vol. 51, No. 4, pp. 380-
    417.
    Farradane, Jason (1980),“Knowledge, Information, and
    Information science,”Journal of Information Science,
    Vol. 2, No. 2, pp. 70-88.
    Frigo, Mark L. (2003),“Strategy or Execution,”Strategic
    Finance, Vol. 84, No. 9, pp.9-11.
    Goodman, Allan (1984),“Dateline Langley: Fixing the
    Intelligence Mess,”Foreign Policy, No. 57, pp. 161-179.
    Haddock, Seigfried C. (2006),“The Dangers of
    Unilateralism,”NWSA Journal, Vol. 18,No. 3, pp. 23-33.
    Hall, Stuart (1980),“Culture Studies: Two
    Paradigms,”Media Culture and Society, No. 2, pp. 57-72.
    Hammarstrom Mats (1995),“Theory-Building in the Study of
    Crises,”Journal of Peace Research, Vol. 32, No. 2, pp.
    233-251.
    Hermann, Margaret G. and Thomas Preston (eds.) (2001),“Who
    Leads Matters The Effects of Powerful
    Individual,”International Studies Review, Vol. 3, No. 2,
    pp.83-131.
    Holzman, Franklyn D. (1989),“Politics and Guesswork: CIA
    and DIA Estimates of Soviet Military depending,”
    International Security, Vol. 14, No. 2, pp. 101-131.
    Jabar, Faleh A. (2003), “Opposing War Is Good, but Not
    Good Enough,” The Progressive, Vol. 67, No. 1, pp. 20-23.
    Jervis, Robert (2003),“Understanding the Bush Doctrine,”
    Political Science Quarterly,Vol. 118, No. 3, pp. 365-388.
    Kassop, Nancy (2003),“The War Power and Its Limits ,”
    Presidential Studies Quarterly,Vol. 33, No. 3, pp. 509-
    520.
    Kennan, George (1947),“The Sources of Soviet Conduct,”
    Foreign Affair, Vol. 25, No. 4,pp. 566-582.
    Knorr, Klaus (1964),“Failures in Nation Intelligence
    Estimate: The Case of the Cuba Missiles,”World Politics,
    No. 16, April, pp. 455-475.
    Kovacs, Amos (1997),“Using Intelligence,”Intelligence and
    National Security, Vol. 12, No. 4, p. 145-164.
    Kuncken, Jennifer (2006),“A Brief Guide to Islam,”Library
    Journal, Vol. 131, No. 6, p.99.
    Lebow, Richard N. (1987),“Is Crisis Management Always
    Possible?”Political Science Quarterly, Vol. 102, No. 2,
    pp. 181-192.
    Lijphart, Arend (1971),“Comparative Politics and the
    Comparative Method,”American Political Science Review,
    No. 3, pp. 682-693.
    Lyles, Marjorie A. and Ian I. Mitroff (1980),“
    Organizational Problem Formulation: An Empirical
    Study,”Administrative Science Quarterly, Vol. 25, No. 1,
    pp. 102-119.
    Miller, George A. (1956),“The Magical Number Seven, Plus
    or Minus Two: Some Limits on Our Capacity for Processing
    Information,”The Psychological Review, No. 63, pp. 81-97.
    Nordland, Rod and Babak Dehghanpisheh (2007 ),“Surge of
    Suicide Bombers; The Iraq War Has Turned into A
    Veritable `Martyr` Factory, Unlike Any Seen in Previous
    Conflicts ,”Newsweek, Vol. 150, No. 7, pp. 30-33.
    Philip, Gordon (2002),“NATO After 11 September,”Surival,
    Vol. 43, No. 4, pp. 89-106.
    Prescott, John E. and Craig Fleisher (1991),“SCIP: Who We
    Are and What We Do,”Competitive Intelligence Review,
    Vol. 2, No. 1, pp. 22-26.
    Rice, Condoleezza (2000),“Promoting the National
    Interest,”Foreign Affairs, Vol. 79,No. 1, pp. 45-62.
    Rothschild, Emma (1995),“What is Security,”Daedalus, Vol.
    124, N0. 3, pp. 53-99.
    Rumsfeld, Donald H. (2002 ),“Transforming the Military,”
    Foreign Affair, Vol. 81, No.3, pp. 20-32.
    Saaty, Thomas L. (1986),“Axiomatic Foundation of Analytic
    Hierarchy Process,” Management Science, Vol. 32, No. 7,
    pp. 778-790.
    Sapir, Edward (1935),“Communication, ”Encyclopedia of
    Social Sciences, Vol. 1, No. 4, pp. 75- 80.
    Schrodt, Philip A., Shannon G. David and Judith L. Weddle
    (1994),“Political Science: KED-A Program for the Maching
    Coding of Event Data,”Social Science Computer Review,
    Vol. 12, No. 3, pp. 561-588.
    Schwenk, Charles R. (1984),“Cognitive Simplification
    Processes in Strategic Decision-Making,”Strategic
    Management Journal, Vol. 5, No. 2, pp. 111-128.
    Smith, Gerald F. (1989),“Managerial Problem
    Identification,”OMEGA, Vol. 17, No. 1, pp. 27-36.
    Sproles, Claudene (2007),“Muslim Sects and Militant
    Groups,”Choice, Vol. 45, No. 1, pp. 43-55.
    Stephen, Soto (2001),“Competitive Intelligence Methods for
    System and Cultural Analysis,”Competitive Intelligence
    Review, Vol. 12, No. 3, pp. 31-34.
    Stuckey, Mary E. and Joshua R. Ritter (2007),“George Bush,
    <Human Rights>, and American Democracy,”Presidential
    Studies Quarterly , Vol. 37, No. 4, pp. 646-667.
    Talbott, Strobe (1996 ),“Democracy and the National
    Interest,”Foreign Affairs, Vol. 75, No. 6, pp. 47-64.
    Taylor, Ronald N. (1975),“Perception of Problem
    Constraints ,”Management Science,Vol. 22, No. 1, pp. 22-
    29.
    Theil, Stefan and Christopher Dickey (2003),“Saddam`s
    Bunkers,”Newsweek ,Vol. 141,No. 14, pp. 48- 49.
    Thomas, Stafford T. (1988),“Assesing Current Intelligence
    Studies,”International Journal of Intelligence and
    Counterintelligence, Vol. 2, No. 2, pp. 217-244.
    Troy, Thomas F. (1991),“The‘Correct’Definition of
    Intelligence,”International Journal of Intelligence and
    Counterintelligence, Vol. 5, No. 4, pp. 433-454.
    Ungson, Gerardo R. and Daniel N. Braunstein (eds.)
    (1981),“Managerial Information processing: A Research
    Review,”Administrative Science Quarterly, Vol. 26, No.
    1,pp. 116-138.
    Wolffe, Richard and Michael Hirsh (2003),“ War and
    Consequences,”Newsweek, Vol. 141, No. 5, pp. 22-29.
    Yusin, Maksim (2003),“Donald Rumsfeld`s Three
    Fronts, ”The Current Digest of the Post-Soviet Press,
    Vol. 54, No. 52, pp. 3-13.
    Zadeh, Lisa A. (1965),“Fuzzy Set,” Information Control,
    No. 8, pp. 338-353.
    Zagotta, Robert and Don Robbinson (2002),“Key to
    Successful Strategy Execution,”Journal of Business
    Strategy, Vol. 23, No. 1, pp. 30-34.
    Zunde, Pranas (1981),“Information Theory and Information
    Science,”Information Processing and Management, Vol. 17,
    No. 6, pp. 341-347.
    Newspaper & Magazine
    Albright, Madeleine E. (2002),“Where Iraq Fits in the War
    on Terror,”The New York Times, September 20.
    <http://query.nytimes.com/gst/fullpage.html>
    Ali, Ahmed (2007),“IRAQ: Death Threats and Attacks Force
    Familes to Flee,”Global Information Network, November
    6.
    <http://www.globalinfo.org/default.asp>
    Andrew, Buncombe (2003),“Cheney Under Pressure to Quit
    Over False War Evidence,”The INDEPENDENT, July 16.
    <http://news.independent.co.uk/world/politics/
    article96352.ece>
    Borger, Julian (2003),“Iraq: After the War: France Will
    Pay for Opposition Says Powell: Administration`s Dove
    Suggests Trouble Ahead as new UN Confrontation Looms
    Over Sanctions ,”Guardian Unlimited, April 24.
    <http://www.guardian.co.uk/frontpages/story/o,,1928039,
    oo.html>.
    Bowers, Faye,“Driving Forces in War-Wary Nations: The
    Stances of France, Germany,Russia and China Are Colored
    by Economic and National Interests,”Christian Science
    Monitor, February 25.
    <http://www.mondotimes.com/2/topics/5/news/1/2802>.
    Bumiller, Elisabeth and David E. Sanger (2006),“Traces of
    Terror: The President; Bush, as Terror Inquiry Swirls,
    Seeks Cabinet Post on Security,”The New York Times, June
    7.
    <http://query.nytimes.com/gst/fullpage.html>
    Calabresi, Massimo andTimothy J. Burger (2003),“Who Lost
    the WMD,”Time, June 29.
    <http://www.time.com/time/magazine/article/0,9171,
    1101030707-461781,00.html>
    Colachal, Abdul R. (2007),“Dynamism in Russia-China
    Relations: A study,”What Really Happened. Com, October
    14.
    <http://www.whatreallyhappened.com/>
    Dan, Balz and Abramowitz Michael (2006),“President Tries
    to Win Over a War-Weary Nation,”The Washington Post,
    September 12.
    <http://www.washingtonpost.com/>
    Depalma, Anthony (2003),“Threats and Responses: An
    Overview: March 19-20, 2003; Starting a War, Appealing
    for Surrender and Pulling Out the Networks,”The New
    York Times, March 20.
    <http: //query.nytimes.com/gst/fullpage.html>
    Diamond, John and Susan Page (2003),“Bush Signals He May
    Skip U. N.; Plan: Issue Iraq an Ultimatum Instead,”USA
    TODAY, Mar 14.
    <http://wap.usatoday.com/>
    Elliott, Michael (2002),“The Selling of the President`s
    War,”Time, November 11.
    <http://www.time.com/time/columnist/elliott/
    article/0,9565,389085,00.html>
    Ewen, MacAskill and Borge Julian (2006),“Iraq Mayhem
    Triggers Hunt for Exit Strategy in US and UK,”Guardian
    Unlimited, October 21.
    <http://www. guardian.co.uk/frontpages/story/o,,
    1928039,oo.html>
    FitzGerald, Frances (2002),“Threat of War: How Hawks
    Captured the White House: When the Soviet Threat
    Vanished, the Purpose of American Foreign Policy Seemed
    to Go with It-Until September 11 and Iraq`s Regime,”
    Guardian Unlimited,September 24.
    <http://www.guardian. co.uk/ frontpages/
    story/o,,,oo.html>
    Lemann, Nicholas (2002),“The Next World Order: The Bush
    Administration May Have a Brand New Doctrine of
    Power,”The New Yorker, February 1.
    <http://www.newyorker.com/fact/content/?02401fa_FACT1>
    Lemann, Nicholas (2003),“After Iraq: The Plan to Remake
    the Middle East,”The New Yorker, February 17.
    <http://www.newyorker.com/fact/content/?02401fa_FACT1>
    Ignatieff, Michael (2003),“Mission: Rebuild Iraq, Looking
    for Leader Amid the Ashes,”The New York Times Magazine,
    January 5.
    <http://www.nytimes.com/pages/magazine/>
    Mark, Mazzetti (2006),“Spy Agencies Say Iraq War Worsens
    Terrorism Threat,”The New York Times, September 24.
    <http://www.nytimes.com/page/todayspaper/index.html>
    Melloan, George (2004),“Why No WMDs? Saddam Was Playing a
    Shell Game,”The Wall Street Journal, February 3.
    <http://online.wsj.com/article/
    SB118289311361649057.html>
    Miller, Greg (2003),“Showdown with Iraq; Democracy Domino
    Theory `Not Credible`; A State Department Report Disputes
    Bush`s Claim that Ousting Hussein Will Spur Reforms in
    The Mideast, Intelligence Officials Say,”Los Angeles
    Times, March 14.
    <http://www.latimes.com/>
    Mulrine, Anna (2006),“`Civil War` or Not?; While U. S.
    Pols and Pundits Debate Labels, Iraqis Fear Their Country
    is Sliding Deeper into The Abyss,”U. S. News & World
    Report, December 11.
    <http://www.britannica. com/eb/article-9074508/US-News-
    World-Report>
    Neary, Lynn (2003),“Analysis: Intelligence Analysts React
    to Colin Powell`s Speech,”All Things
    Considered ,February 6.
    <http://www.npr.org/templates/rundowns/rundown.php?
    prgId=2>
    O`brien, Timothy L. (2003),“Threats and Responses:
    Monitoring; U. N. Group Finds No Hussein-Al Qaeda
    link,”The New York Times, June 27.
    <http://www.nytimes. com/ page/todayspaper/index.html>
    Page, Susan (2005),“Bush Poll Ratings Slide to New
    Low,”USA Today, November 15.
    <http:// wap.usatoday.com/>
    Pincus, Walter and Dana Priest (2003),“Analysts Cite
    Pressure on Iraq Judgement,”The Washington Post, June 5.
    <http://www.washingtonpost.com/>.
    Ponnuru, Ramesh (2003),“Getting to The Bottom of
    This `Neo` Nonsense: Before you Talk about Conservatives,
    Know What You`re Doing,”National Review, June 16.
    <http://www. sourcewatch.org /index.php?
    title=National_Review>
    Ponnuru, Ramesh (2003),“Getting to the Bottom of This Neo,
    Nonsense: Before you Talk about Conservatives, Know What
    You`re Doing,”Nation Review, June 16.
    <http:// www. sourcewatch. org/index.php?
    title=National_Review>
    Spratt, John (2007),“Monitoring War Costs,”Knight Ridder
    Tribune Business News. January 22.
    <http://www.dialogselect.com/business/forms/
    BusIndustryFinancialAll.html>
    (2002), The White House,“President Bush Delivers
    Graduation Speech at West Point,” June 1.
    <http://www.whitehouse.gov/news/releases/
    2002/06/20020601-3.html>.
    (2002),“Fact Sheet:Redesigning DOJ to Prevent Future Acts
    of Terrorism,”U. S. Department of State, May 29.
    <http://www.state.gov/>
    (2002),“Mueller Cites Changes in FBI to Enhance Fight on
    Terrorism Director Testifies before Joint House-Senate
    Intelligence Panel,”U. S. Department of State, October
    17.
    <http://www.state.gov/>
    (2002),“Report: U. N. Working on Secret Contingency Plans
    for War; Iraq: CIA Allowed to Direct Inspectors,”Al
    Bawaba , December 23.
    <http://www.albawaba.com/en/news/>.
    (2002), The White House,“President Delivers State of the
    Union Address,”January 29.
    <http://www.whitehouse.gov/news/releases/
    2002/01/20020129-11.html>
    (2003), The White House,“President Discuss The Future of
    Iraq,”February 23.
    <http://www.whitehouse.gov/news/releases/
    2003/02/20030226-11.html>
    (2003),“Was the Intelligence Cooked?”The New York Times,
    Jun 8.
    <http:// www. nytimes. com/page/todayspaper/index.html>
    (2003),“Newspapers Across Europe Look Nervously on as a US-
    led War Against Iraq Seems Increasingly Inevitable,”BBC,
    March 18.
    <http://news.bbc.co.uk/2/hi/europe/2859359.stm>
    (2003), The White House,“Remarks by The Vice President to
    The American Society of News Editors,”April 9.
    <http://www.whitehouse.gov/news/releases/
    2002/04/20020411-7.html>.
    (2004),“Judging Intelligence; The Senators` Views and
    Excerpts from the Report on Iraq Assessments,”The New
    York Times, July 10.
    <http://www.nytimes. com/page/ todayspaper/ index. html
    >.
    (2006),“Reply Letters and Emails: US Elections: The New
    Republic,”Guardian Unlimited, October13.
    <http://www.guardian.co.uk/frontpages/story/
    o,,1928039,oo.html>
    (2007),“American Casualties and `Bravery` Plummet Iraqi
    Civilian Casualties and Resistance Rise,”Free Iraq,
    October 26.
    <http://abutamam.blogspot.com/>
    描述: 博士
    國立政治大學
    國家發展研究所
    91261502
    資料來源: http://thesis.lib.nccu.edu.tw/record/#G0912615021
    数据类型: thesis
    显示于类别:[國家發展研究所] 學位論文

    文件中的档案:

    档案 大小格式浏览次数
    index.html0KbHTML2422检视/开启


    在政大典藏中所有的数据项都受到原著作权保护.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈