Follow
Joseph M. Hatfield
Title
Cited by
Cited by
Year
Do targeted assassinations work? A multivariate analysis of Israel's controversial tactic during al-Aqsa uprising
MM Hafez, JM Hatfield
Studies in Conflict & Terrorism 29 (4), 359-382, 2006
2072006
Social Engineering in Cybersecurity: The Evolution of a Concept
JM Hatfield
Computers & Security 73, 102-113, 2018
1992018
Virtuous Human Hacking: The Ethics of Social Engineering in Penetration-Testing
JM Hatfield
Computers & Security 83, 354-366, 2019
542019
A damage assessment framework for insider threats to national security information: Edward Snowden and the Cambridge Five in comparative historical perspective
DV Gioe, JM Hatfield
Cambridge Review of International Affairs 34 (5), 704-738, 2021
142021
The USNA's Interdisciplinary Approach to Cybersecurity Education
T Emmersen, JM Hatfield, J Kosseff, SR Orr IV
IEEE Computer 52 (3), 48-57, 2019
132019
An ethical defense of treason by means of espionage
JM Hatfield
Intelligence and National Security 32 (2), 195-207, 2017
112017
Can United States Intelligence Community Analysts Telework?
DV Gioe, JM Hatfield, M Stout
Intelligence and National Security 35 (6), 885-901, 2020
92020
There Is No Such Thing as Open Source Intelligence
JM Hatfield
International Journal of Intelligence and Counterintelligence, 2023
52023
Intelligence under Democracy and Authoritarianism: A Philosophical Analysis
JM Hatfield
Intelligence and National Security 37 (6), 903-919, 2022
52022
Immanuel Kant: From Universal Rationality to Perpetual Peace
JM Hatfield
Book Chapter, Philosophers and War, edited by Timothy Demy and Jeffrey Shaw …, 2017
22017
A Brief Guide to the Research Process
JM Hatfield
https://stonetowerpress.com/shop-2/authors/joseph-m-hatfield/a-brief-guide …, 2020
2020
Lactantius, Anabaptist Pacifism, and Tyrannicide
JM Hatfield
Wars of Religion: An Encyclopedia of Faith and Conflict, edited by Timothy …, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–12