{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,30]],"date-time":"2024-08-30T11:40:18Z","timestamp":1725018018829},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2012,11,6]],"date-time":"2012-11-06T00:00:00Z","timestamp":1352160000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Secur Inform"],"published-print":{"date-parts":[[2012,12]]},"DOI":"10.1186\/2190-8532-1-17","type":"journal-article","created":{"date-parts":[[2012,11,6]],"date-time":"2012-11-06T21:14:16Z","timestamp":1352236456000},"source":"Crossref","is-referenced-by-count":1,"title":["Biologically-inspired analysis in the real world: computing, informatics, and ecologies of use"],"prefix":"10.1186","volume":"1","author":[{"given":"Laura A","family":"McNamara","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,11,6]]},"reference":[{"key":"19_CR1","first-page":"157","volume-title":"Challenges in Computational Social Modeling and Simulation for National Security Decision Making","author":"P Huxtable","year":"2011","unstructured":"Huxtable P: Leveraging Computational Social Science for National Security. In Challenges in Computational Social Modeling and Simulation for National Security Decision Making. Edited by: McNamara L, Trucano T, Gieseler C. Defense Threat Reduction Agency, Advanced Systems and Concepts Office, Ft. Belvoir, VA; 2011:157\u2013168."},{"key":"19_CR2","volume-title":"\"Bridging the Valley of Death: Transitioning from Public Sector to Private Sector Funding,\" National Renewable Energy Laboratory (NREL)","author":"LM Murphy","year":"2003","unstructured":"Murphy LM, Edwards PL: \"Bridging the Valley of Death: Transitioning from Public Sector to Private Sector Funding,\" National Renewable Energy Laboratory (NREL). Golden, Colorado; 2003."},{"key":"19_CR3","volume-title":"Information Ecologies: Using Technology with Heart","author":"B Nardi","year":"1996","unstructured":"Nardi B, O'Day VL: Information Ecologies: Using Technology with Heart. MIT Press, Boston; 1996."},{"key":"19_CR4","volume-title":"Iran: Nuclear Intentions and Capabilities","author":"National Intelligence Council","year":"2007","unstructured":"National Intelligence Council: Iran: Nuclear Intentions and Capabilities. Office of the Director of National Intelligence, Washington, DC; 2007."},{"key":"19_CR5","volume-title":"The 9\/11 Commission Report","author":"National Commission on Terrorist Attacks Against the United States","year":"2004","unstructured":"National Commission on Terrorist Attacks Against the United States: The 9\/11 Commission Report. United States Government Printing Office, Washington, DC; 2004."},{"key":"19_CR6","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MTS.2009.931879","volume":"28","author":"L Resnyansky","year":"2009","unstructured":"Resnyansky L: The internet and the changing nature of intelligence. IEEE Technol. Soc. Mag. 2009, 28: 41\u201348. Spring 2009 Spring 2009","journal-title":"IEEE Technol. Soc. Mag"},{"key":"19_CR7","volume-title":"The Wiki and the Blog: Toward A Complex Adaptive Intelligence Community","author":"DC Andrus","year":"2005","unstructured":"Andrus DC: The Wiki and the Blog: Toward A Complex Adaptive Intelligence Community. Central Intelligence Agency, Washington, DC; 2005. June 15 June 15"},{"key":"19_CR8","unstructured":"Palantir Technologies. Available: http:\/\/www.palantirtech.com\/ Available:"},{"key":"19_CR9","unstructured":"Analyst's Notebook. Available: http:\/\/www.coplink.com\/us\/products--services\/analysis-product-line\/analysts-notebook Available:"},{"key":"19_CR10","volume-title":"Image and Logic: A Material Culture of Microphysics","author":"P Galison","year":"1997","unstructured":"Galison P: Image and Logic: A Material Culture of Microphysics. University of Chicago, Chicago; 1997."},{"key":"19_CR11","volume-title":"Sociol. Res. Online","author":"D Byrne","year":"1997","unstructured":"Byrne D: Simulation - a way forward. Sociol. Res. Online 1997., 2: http:\/\/www.socresonline.org.uk\/socresonline\/2\/2\/4.html"},{"key":"19_CR12","volume-title":"\"Computational Analysis in US Foreign and Defense Policy,\" presented at the First International Conference on Computational Cultural Dynamics","author":"C Cioffi-Revilla","year":"2007","unstructured":"Cioffi-Revilla C, O'Brien S: \"Computational Analysis in US Foreign and Defense Policy,\" presented at the First International Conference on Computational Cultural Dynamics. College Park, MD; 2007."},{"key":"19_CR13","doi-asserted-by":"crossref","DOI":"10.17226\/13040","volume-title":"Intelligence Analysis for Tomorrow: Advances from the Behavioral and Social Sciences","author":"Committee on Behavioral and Social Science Research to Improve Intelligence Analysis for National Security","year":"2011","unstructured":"Committee on Behavioral and Social Science Research to Improve Intelligence Analysis for National Security: Intelligence Analysis for Tomorrow: Advances from the Behavioral and Social Sciences. National Research Council, National Academy of Sciences, Washington, DC; 2011."},{"key":"19_CR14","volume-title":"Nat. Def","author":"S Magnuson","year":"2010","unstructured":"Magnuson S: Military swimming in sensors and drowning in data. Nat. Def. 2010. , 2010 http:\/\/www.nationaldefensemagazine.org\/archive\/2010\/January\/Pages\/Military%E2%80%98SwimmingInSensorsandDrowninginData%E2%80%99.aspx , 2010"},{"key":"19_CR15","doi-asserted-by":"publisher","DOI":"10.1002\/047178656X","volume-title":"Emergent Information Technologies and Enabling Policies for Counter-Terrorism","author":"RL Popp","year":"2006","unstructured":"Popp RL, Allen D, Cioffi-Revilla C: Utilizing Information and Social Science Technology to Understand and Counter the Twenty-First Century Strategic Threat. In Emergent Information Technologies and Enabling Policies for Counter-Terrorism. Edited by: Popp RL, Yen J. IEEE\/John Wiley and Sons, Hoboken, NJ; 2006."},{"key":"19_CR16","volume-title":"Human Social Culture Behavior Modeling Program Newsletter Winter 2010","author":"Human Social Behavior Culture Modeling Program","year":"2010","unstructured":"Human Social Behavior Culture Modeling Program: HSCB Phase One and Two Summary. In Human Social Culture Behavior Modeling Program Newsletter Winter 2010. vol. 3 edition. Edited by: Schmorrow D. Strategic Analysis, Inc.\/Deputy Undersecretary of Defense for Science and Technology, Arlington, VA; 2010.","edition":"vol. 3"},{"key":"19_CR17","first-page":"8","volume-title":"Human Social Behavior Culture Modeling Program Newsletter, Spring 2010","author":"Human Social Behavior Culture Modeling Program","year":"2010","unstructured":"Human Social Behavior Culture Modeling Program: DoD-Wide Programs. In Human Social Behavior Culture Modeling Program Newsletter, Spring 2010. Edited by: Schmorrow D. Strategic Analysis, Inc.\/Deputy Undersecretary of Defense for Science and Technology, Arlington, VA; 2010:8."},{"key":"19_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-77672-9","volume-title":"Social Computing, Behavioral Modeling and Prediction","author":"H Liu","year":"2008","unstructured":"Liu H, Salerno JJ, Young M: Social Computing, Behavioral Modeling and Prediction. Springer, New York; 2008."},{"key":"19_CR19","volume-title":"Lecture Notes in Computer Science: Advances in Social Computing","author":"SK Chai","year":"2010","unstructured":"Chai SK, Salerno JJ, Mabry P: Lecture Notes in Computer Science: Advances in Social Computing. vol. 2010: 6007 edition. Springer, New York; 2010.","edition":"vol. 2010: 6007"},{"key":"19_CR20","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.socnet.2005.01.003","volume":"27","author":"R Goolsby","year":"2005","unstructured":"Goolsby R: Ethics and defense agency funding: some considerations. Soc. Netw. 2005, 27: 95\u2013106. 10.1016\/j.socnet.2005.01.003","journal-title":"Soc. Netw"},{"key":"19_CR21","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1007\/s10588-006-7081-0","volume":"12","author":"R Goolsby","year":"2006","unstructured":"Goolsby R: Combating terrorist networks: an evolutionary approach. Comput. Math. Org. Theory 2006, 12: 7\u201320. 10.1007\/s10588-006-7081-0","journal-title":"Comput. Math. Org. Theory"},{"key":"19_CR22","volume-title":"\"In Depth Observational Studies of Professional Intelligence Analysts 2005,\" presented at the International Conference on Intelligence Analysis","author":"J Scholtz","year":"2006","unstructured":"Scholtz J, Morse E, Hewett T: \"In Depth Observational Studies of Professional Intelligence Analysts 2005,\" presented at the International Conference on Intelligence Analysis. MacLean, VA; 2006."},{"key":"19_CR23","doi-asserted-by":"publisher","first-page":"1186","DOI":"10.1016\/j.intcom.2006.08.014","volume":"18","author":"J Scholtz","year":"2006","unstructured":"Scholtz J, Morse E, Steves MP: Evaluation metrics and methodologies for user-centered evaluation of intelligent systems. Interact. Comput. 2006, 18: 1186\u20131214. 10.1016\/j.intcom.2006.08.014","journal-title":"Interact. Comput"},{"key":"19_CR24","first-page":"245","volume-title":"Cost-Justifying Usability","author":"J Nielsen","year":"1994","unstructured":"Nielsen J: Guerrilla HCI: Using Discount Usability Engineering to Penetrate the Intimidation Barrier. In Cost-Justifying Usability. Edited by: Bias RG, Mayhew DJ. Academic, Boston, MA; 1994:245\u2013272. available at http:\/\/www.useit.com\/jakob\/publications.html available at"},{"key":"19_CR25","first-page":"1139","volume-title":"The Computer Science and Engineering Handbook","author":"J Nielsen","year":"2004","unstructured":"Nielsen J: Usability Engineering. In The Computer Science and Engineering Handbook. Edited by: Tucker AB. Chapman and Hall\/CRC Press, Boca Raton, FL; 2004:1139\u20131160."},{"key":"19_CR26","first-page":"3084","volume":"3","author":"CW Turner","year":"2006","unstructured":"Turner CW, Lewis JR, Nielsen J: Determining usability test sample size. Int. Encycl. Ergon. Hum. Factors 2006, 3: 3084\u20133088.","journal-title":"Int. Encycl. Ergon. Hum. Factors"},{"key":"19_CR27","volume-title":"Context and Consciousness: Activity Theory and Human-Computer Interaction","author":"B Nardi","year":"1996","unstructured":"Nardi B: Activity Theory and Human-Computer Interaction. In Context and Consciousness: Activity Theory and Human-Computer Interaction. Edited by: Nardi B. MIT Press, Cambridge, MA; 1996."},{"key":"19_CR28","volume-title":"Diffusion of Innovations","author":"E Rogers","year":"2003","unstructured":"Rogers E: Diffusion of Innovations. 5th edition. Free Press, New York; 2003.","edition":"5"},{"key":"19_CR29","volume-title":"\"A Survey of User-Centered Design Practice,\" presented at the CHI '02: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems: Changing our World","author":"K Vredenburg","year":"2002","unstructured":"Vredenburg K, Mao JY, Smith PW, Carey T: \"A Survey of User-Centered Design Practice,\" presented at the CHI '02: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems: Changing our World. Changing Ourselves, Minneapolis, MN; 2002."},{"key":"19_CR30","first-page":"227","volume-title":"Challenges in Computational Social Modeling and Simulation for National Security Decision Making","author":"J Scholtz","year":"2011","unstructured":"Scholtz J: A User-Centered Approach to Social Modeling and Simulation for Decision Making. In Challenges in Computational Social Modeling and Simulation for National Security Decision Making. Edited by: McNamara L, Trucano T, Gieseler C. Defense Threat Reduction Agency, Advanced Systems and Concepts Office, Ft. Belvoir, VA; 2011:227\u2013240."},{"key":"19_CR31","doi-asserted-by":"crossref","DOI":"10.4159\/9780674039681","volume-title":"Epstemic Cultures: How the Sciences Make Knowledge","author":"K Knorr-Cetina","year":"1999","unstructured":"Knorr-Cetina K: Epstemic Cultures: How the Sciences Make Knowledge. Harvard University Press, Cambridge, MA; 1999."},{"key":"19_CR32","doi-asserted-by":"publisher","first-page":"836","DOI":"10.1038\/462836a","volume":"462","author":"N Gilbert","year":"2009","unstructured":"Gilbert N: Modellers claim wars are predictable. Nature 2009, 462: 836. 10.1038\/462836a","journal-title":"Nature"},{"key":"19_CR33","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MIS.2008.72","volume":"23","author":"L Resnyansky","year":"2008","unstructured":"Resnyansky L: Social modeling as an interdisciplinary research practice. IEEE Intell. Syst. 2008, 23: 20\u201327. July\/August 2008 July\/August 2008","journal-title":"IEEE Intell. Syst"},{"key":"19_CR34","first-page":"241","volume-title":"Challenges in Computational Social Modeling and Simulation for National Security Decision Making","author":"JG Turnley","year":"2011","unstructured":"Turnley JG: Assessing the Goodness of Computational Social Models. In Challenges in Computational Social Modeling and Simulation for National Security Decision Making. Edited by: McNamara L, Trucano T, Gieseler C. Defense Threat Reduction Agency, Advanced Systems and Concepts Office, Ft. Belvoir, VA; 2011:241\u2013254."},{"key":"19_CR35","first-page":"970","volume":"53","author":"M Al-Fayoumi","year":"2009","unstructured":"Al-Fayoumi M, Banerjee S, Mananti PK: Analysis of social network using clever ant colony metaphor. World Acad. Sci. Eng. Technol. 2009, 53: 970\u2013974.","journal-title":"World Acad. Sci. Eng. Technol"},{"key":"19_CR36","volume-title":"\"The Best Bidding Price Based on Ant Colony Algorithms in Electric Power Markets,\" presented at the Sustainable Power Generation and Supply","author":"S Li","year":"2009","unstructured":"Li S, Gao L, Xu G: \"The Best Bidding Price Based on Ant Colony Algorithms in Electric Power Markets,\" presented at the Sustainable Power Generation and Supply. Nanjing, China; 2009."},{"key":"19_CR37","doi-asserted-by":"crossref","first-page":"70","DOI":"10.7551\/mitpress\/2137.001.0001","volume-title":"Context and Consciousness: Activity Theory and Human-Computer Interaction","author":"B Nardi","year":"1995","unstructured":"Nardi B: Studying Context: A Comparison of Activity Theory, Situated Action Models, and Distributed Cognition. In Context and Consciousness: Activity Theory and Human-Computer Interaction. Edited by: Nardi BA. MIT Press, Cambridge, MA; 1995:70\u2013102."},{"key":"19_CR38","volume-title":"Developmental Studies of Work as a Testbench of Activity Theory: The Case of Primary Care Medical Practice","author":"Y Engestr\u00f6m","year":"1996","unstructured":"Engestr\u00f6m Y: Developmental Studies of Work as a Testbench of Activity Theory: The Case of Primary Care Medical Practice. Cambridge University Press, New York; 1996."},{"key":"19_CR39","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1017\/CBO9780511812774.003","volume-title":"Perspectives on Activity Theory","author":"Y Engestr\u00f6m","year":"1999","unstructured":"Engestr\u00f6m Y: Activity Theory and Individual and Social Transformation. In Perspectives on Activity Theory. Edited by: Engestr\u00f6m Y, Miettinen R, Punam\u00e4ki RL. Cambridge University Press, New York; 1999:19\u201338."},{"key":"19_CR40","volume-title":"The Psychology of Human-Computer Interaction","author":"SK Card","year":"1983","unstructured":"Card SK, Moran TP, Newell A: The Psychology of Human-Computer Interaction. Lawrence Erbaum Associates, Hillsdale, NJ; 1983."},{"key":"19_CR41","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/7304.001.0001","volume-title":"Working Minds: A Practitioner's Guide to Cognitive Task Analysis","author":"B Crandall","year":"2006","unstructured":"Crandall B, Klein G, Hoffman RR: Working Minds: A Practitioner's Guide to Cognitive Task Analysis. MIT Press, Cambridge, MA; 2006."},{"key":"19_CR42","volume-title":"Perspectives on Cognitive Task Analysis: Historical Origins and Modern Community of Practice","author":"RR Hoffman","year":"2009","unstructured":"Hoffman RR, Militello LG: Perspectives on Cognitive Task Analysis: Historical Origins and Modern Community of Practice. Psychology Press (Taylor and Francis), New York; 2009."},{"key":"19_CR43","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1017\/CBO9780511812774.024","volume-title":"Perspectives on Activity Theory","author":"K Kuutti","year":"1999","unstructured":"Kuutti K: Activity Theory, Transformation of Work, and Information Systems Design. In Perspectives on Activity Theory. Edited by: Engestr\u00f6m Y, Miettinen R, Punam\u00e4ki RL. Cambridge University Press, New York; 1999:360\u2013376."},{"key":"19_CR44","first-page":"1","volume":"6","author":"O Barreteau","year":"2003","unstructured":"Barreteau O: Our companion modelling approach. J. Artif. Soc. Soc. Simul. 2003, 6: 1.","journal-title":"J. Artif. Soc. Soc. Simul"},{"key":"19_CR45","volume-title":"J. Artif. Soc. Soc. Simul","author":"W Dare","year":"2003","unstructured":"Dare W, Barreteau O: A role playing game in irrigated system negotiation: between playing and reality. J. Artif. Soc. Soc. Simul. 2003., 6: http:\/\/jasss.soc.surrey.ac.uk\/6\/3\/6.html"},{"key":"19_CR46","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511499319","volume-title":"Congregations in Conflict: Cultural Models of Local Religious Life","author":"PE Becker","year":"1999","unstructured":"Becker PE: Congregations in Conflict: Cultural Models of Local Religious Life. Cambridge, New York; 1999."}],"container-title":["Security Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/2190-8532-1-17.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/2190-8532-1-17\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/2190-8532-1-17.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,30]],"date-time":"2022-01-30T23:27:41Z","timestamp":1643585261000},"score":1,"resource":{"primary":{"URL":"https:\/\/security-informatics.springeropen.com\/articles\/10.1186\/2190-8532-1-17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,11,6]]},"references-count":46,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,12]]}},"alternative-id":["19"],"URL":"https:\/\/doi.org\/10.1186\/2190-8532-1-17","relation":{},"ISSN":["2190-8532"],"issn-type":[{"value":"2190-8532","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,11,6]]},"article-number":"17"}}