2013
DOI: 10.1080/08850607.2013.807189
|View full text |Cite
|
Sign up to set email alerts
|

Sharing Secrets: A Game Theoretic Analysis of International Intelligence Cooperation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…Information may be obtained through the receipt either independently or dependently. From the supporter's perspective, the information must be accurate (Byman, 2006) because it can challenge the supporter state's views or undermine the supporter's preferred policies (Munton and Fredj, 2013), ultimately posing a security threat. To enhance information accuracy, the supporter prefers the winning-hearts-and-minds strategy as the strategy enhances the recipient government's intelligence capability.…”
Section: Figure 1 External Intelligence Assistance and Violence Again...mentioning
confidence: 99%
See 1 more Smart Citation
“…Information may be obtained through the receipt either independently or dependently. From the supporter's perspective, the information must be accurate (Byman, 2006) because it can challenge the supporter state's views or undermine the supporter's preferred policies (Munton and Fredj, 2013), ultimately posing a security threat. To enhance information accuracy, the supporter prefers the winning-hearts-and-minds strategy as the strategy enhances the recipient government's intelligence capability.…”
Section: Figure 1 External Intelligence Assistance and Violence Again...mentioning
confidence: 99%
“…This provides a secure environment for people, resulting in building trustworthy relationships, facilitating information flow and enhancing the intelligence capability of the recipient government. From the supplier's perspective, the enforcement of intelligence capability of the recipient is important for the supporter because intelligence assistance is a two-sided process, and information passed to the supporter needs to be accurate (Byman, 2006; Munton and Fredj, 2013). From the recipient's perspective, the enhanced intelligence capability results in fewer identification problems, enabling the counterinsurgent government to implement the winning-hearts-and-minds strategy.…”
Section: A Theory Of External Intelligence Assistance and Violence Ag...mentioning
confidence: 99%