🍂 Autumn reading time! Let our AI Librarian find your perfect cozy read 🫖
Explore the literary world of this author
Understanding Russian Propaganda in Eastern Europe
Russia employs a sophisticated social media campaign against former Soviet states that includes news tweets, nonattributed comments on web pages, trol...
Improving Machine Learning to Detect and Understand Online Conspiracy Theories
Using linguistic and rhetorical theory, researchers developed an improved model of machine-learning technology to detect conspiracy theory language. T...
A Social Network Analysis of Online Activity
The authors reviewed literature on White identity terrorism and racially or ethnically motivated violent extremism (REMVE) and analyzed social media d...
This report assesses challenges for unit cohesion from integrating women into special operations forces and provides analytical support for validating...
Lessons for Future Department of Defense Social Media Analysis in Support of Information Operations
To support the U.S. Department of Defense in expanding its capacity for social media analysis, this report reviews the analytic approaches that will b...
Analyzing, Modeling, and Simulating the Will to Fight of Military Units
This report defines and describes will to fight and provides a model of unit will to fight that can be applied to ground combat units of any scale. It...
Recommendations for Hazing Prevention Policy and Practice
This report documents research focused on helping the Department of Defense build a more-systematic approach to hazing prevention and response. The re...
Comparing the Presentation of News Information Over Time and Across Media Platforms
...
Using Social Bots to Fight Violent Extremism
As the online recruitment of violent extremist organizations grows, the U.S. government may benefit from promising emerging technology tools to rapidl...
Technology Distribution and Data Safety
The authors analyze a new project finance dataset on China's development-funded artificial intelligence (AI) export projects-adding interview-based co...
Lessons for the U.S. Army Information Operations Practitioner
Adapting the format of military classic, The Defence of Duffer's Drift, this report analyzes alternative courses of action in the same hypothetical mi...
Scalable Analytics for Early Warning
The authors examine scalable analytic means to detect malign or subversive information efforts. The report has operational relevance to the U.S. gover...
Anchoring Command Efforts on a Coherent Story
In the contemporary era marked by informational competition, one of the most important activities of a strategic or operational command is the develop...
To assist Air Force efforts to prevent and respond to sexual assault, this report focuses on providing a better understanding of sexual assaults commi...
A Framework for Defense Information Professionals
Using the principles of necessity, effectiveness, and proportionality, the authors develop a framework for evaluating influence operations with an ini...
A Qualitive and Quantitative Analysis of the Link Between USMC Vernacular Epideictic and Public Deliberative Speech 10 Oct. 2012
Acquisition Recommendations for Army Cyber Command
This report aims to inform the Army on how to effectively acquire and develop data analytics capabilities, leveraging both commercial solutions and in...