<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1900-6586</journal-id>
<journal-title><![CDATA[Revista Científica General José María Córdova]]></journal-title>
<abbrev-journal-title><![CDATA[Rev. Cient. Gen. José María Córdova]]></abbrev-journal-title>
<issn>1900-6586</issn>
<publisher>
<publisher-name><![CDATA[Escuela Militar de Cadetes "General José María Córdova"]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1900-65862021000200478</article-id>
<article-id pub-id-type="doi">10.21830/19006586.701</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[La inteligencia como organización burocrática: disfunciones del modelo weberiano]]></article-title>
<article-title xml:lang="en"><![CDATA[Intelligence as a bureaucratic organization: dysfunctions of the Weberian model]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Guisado]]></surname>
<given-names><![CDATA[Álvaro Cremades]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Franco]]></surname>
<given-names><![CDATA[Henry Cancelado]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad Nebrija  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Spain</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Universidad de los Andes  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Colombia</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>06</month>
<year>2021</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>06</month>
<year>2021</year>
</pub-date>
<volume>19</volume>
<numero>34</numero>
<fpage>478</fpage>
<lpage>496</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_arttext&amp;pid=S1900-65862021000200478&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_abstract&amp;pid=S1900-65862021000200478&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_pdf&amp;pid=S1900-65862021000200478&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[RESUMEN. Si bien el desarrollo histórico de los servicios de inteligencia durante el siglo XX fue altamente dispar, desde una aproximación comparativa se observa que gran parte de las comunidades de inteligencia de regímenes políticos democráticos mantienen hoy en su estructura y funcionamiento grandes semejanzas, producto de una institucionalización determinada por el modelo de organización burocrática de tipo weberiano. Así, este artículo busca comprender los aspectos organizacionales de los servicios de inteligencia desde la perspectiva de la racionalidad burocrática, con el propósito de explorar las críticas a este modelo y evaluar su relación con las disfunciones en el ámbito particular de los servicios de inteligencia. Los resultados muestran que estas distorsiones afectan tanto la funcionalidad como la legitimidad de estas organizaciones, lo que muestra la necesidad de buscar cambios estructurales más allá del modelo actual.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[ABSTRACT. Despite the disparity of the intelligence services' historical development during the 20th century, a comparative approach reveals that most of today's democratic political regimes' intelligence communities maintain apparent similarities in their structure and operation, a product of the Weberian-type bureaucratic organization model's institutionalization. This article seeks to understand the intelligence services' organizational aspects from bureaucratic rationality to explore the criticisms of this model and evaluate its relationship with dysfunctions in the specific field of intelligence services. The results show that these distortions affect both the functionality and the legitimacy of these organizations, revealing the need to seek structural changes beyond the current model.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[burocracia]]></kwd>
<kwd lng="es"><![CDATA[gestión]]></kwd>
<kwd lng="es"><![CDATA[organización gubernamental]]></kwd>
<kwd lng="es"><![CDATA[seguridad del Estado]]></kwd>
<kwd lng="es"><![CDATA[servicios de inteligencia]]></kwd>
<kwd lng="en"><![CDATA[bureaucracy]]></kwd>
<kwd lng="en"><![CDATA[governmental organization]]></kwd>
<kwd lng="en"><![CDATA[intelligence services]]></kwd>
<kwd lng="en"><![CDATA[management]]></kwd>
<kwd lng="en"><![CDATA[state security]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Aid]]></surname>
<given-names><![CDATA[M. M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Sins of ommission and commission: Strategic cultural factors and US intelligence failures during the Cold War]]></article-title>
<source><![CDATA[Intelligence and National Security]]></source>
<year>2011</year>
<volume>26</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>478-94</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Allen]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Coates]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
</person-group>
<source><![CDATA[Strategic decision-making paradigms: A primer for seniors leaders]]></source>
<year>2009</year>
<publisher-name><![CDATA[U.S. Army War College]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Andregg]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Do intelligence bureaucracies fear ethics, and if so, why?]]></article-title>
<source><![CDATA[International Journal of Intelligence Ethics]]></source>
<year>2012</year>
<volume>3</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>100-20</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Arcos]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Palacios]]></surname>
<given-names><![CDATA[J. M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[EU INTCEN: A transnational European culture of intelligence analysis?]]></article-title>
<source><![CDATA[Intelligence and National Security]]></source>
<year>2019</year>
<volume>35</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-23</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Betts]]></surname>
<given-names><![CDATA[R. K]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Analysis, war, and decision: Why intelligence failures are inevitable]]></article-title>
<source><![CDATA[World Politics]]></source>
<year>1978</year>
<volume>31</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>61-89</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bigo]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Shared secrecy in a digital age and a transnational world]]></article-title>
<source><![CDATA[Intelligence and National Security]]></source>
<year>2019</year>
<volume>34</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>382</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Braybrooke]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Lindblom]]></surname>
<given-names><![CDATA[C. E]]></given-names>
</name>
</person-group>
<source><![CDATA[A strategy of decision]]></source>
<year>1963</year>
<publisher-name><![CDATA[The Free Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Brewin]]></surname>
<given-names><![CDATA[R. L]]></given-names>
</name>
</person-group>
<source><![CDATA[A review of the concept of military worth and its application in military decision making]]></source>
<year>1964</year>
<publisher-loc><![CDATA[California ]]></publisher-loc>
<publisher-name><![CDATA[United States Naval Postgraduate School]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cayford]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Pieters]]></surname>
<given-names><![CDATA[W]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Effectiveness fettered by bureaucracy - why surveillance technology is not evaluated]]></article-title>
<source><![CDATA[Intelligence and National Security]]></source>
<year>2020</year>
<volume>36</volume>
<numero>7</numero>
<issue>7</issue>
<page-range>1026-41</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Clark]]></surname>
<given-names><![CDATA[R. M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Intelligence analysis. A target-centric approach]]></article-title>
<source><![CDATA[CQ Press]]></source>
<year>2013</year>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cohen]]></surname>
<given-names><![CDATA[M. D.]]></given-names>
</name>
<name>
<surname><![CDATA[March]]></surname>
<given-names><![CDATA[J. G.]]></given-names>
</name>
<name>
<surname><![CDATA[Olsen]]></surname>
<given-names><![CDATA[J. P]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A garbage can model of organizational choice]]></article-title>
<source><![CDATA[Administrative Science Quarterly]]></source>
<year>1972</year>
<volume>17</volume>
<page-range>1-25</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cremades]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA[Teoría de juegos y análisis estratégico: una revisión metodológica en torno a la toma de decisiones y el conflicto internacional (Documento de Opinión 23)]]></source>
<year>2016</year>
<publisher-name><![CDATA[Instituto Español de Estudios Estratégicos]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cremades]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA[Inteligencia y secreto en Guatemala: la trascendencia del Archivo Histórico de la Policía Nacional]]></source>
<year>2017</year>
<publisher-name><![CDATA[Universidad de San Carlos de Guatemala]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cremades]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Payá]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Inteligencia y decision: apuntes sobre el papel de los analistas]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Delgado]]></surname>
<given-names><![CDATA[J. J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Inteligencia aplicada a la seguridad del siglo XXI]]></source>
<year>2017</year>
<publisher-name><![CDATA[Epraxis]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Crozier]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[The bureaucratic phenomenon]]></source>
<year>2010</year>
<publisher-name><![CDATA[Transaction Publishers]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="">
<collab>Deputy to the DCI for Resource Management</collab>
<source><![CDATA[National Index of Intelligence Products for Intelligence Consumers. Memorandum for Director of Central Intelligence]]></source>
<year>2004</year>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Díaz]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA[El papel de la comunidad de inteligencia en la toma de decisiones de la política exterior y de seguridad de España (Documento de Trabajo 3/2006)]]></source>
<year>2006</year>
<publisher-name><![CDATA[Observatorio de Política Exterior Española, Fundación Alternativas]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Díaz]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Methodological approaches to the concept of intelligence failure]]></article-title>
<source><![CDATA[Unisci Discussion Papers]]></source>
<year>2005</year>
</nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Donovan]]></surname>
<given-names><![CDATA[W]]></given-names>
</name>
</person-group>
<source><![CDATA[Memorandum of Establishment of Service of Strategic Information]]></source>
<year>1941</year>
<publisher-loc><![CDATA[Washington D. C ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Durbin]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
</person-group>
<source><![CDATA[The CIA and the politics of US intelligence reform]]></source>
<year>2017</year>
<publisher-name><![CDATA[Cambridge University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Farson]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Establishing effective intelligence oversight systems]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Born]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Wills]]></surname>
<given-names><![CDATA[.]]></given-names>
</name>
</person-group>
<source><![CDATA[Overseeing intelligence services: A toolkit]]></source>
<year>2012</year>
<publisher-name><![CDATA[DCAF]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gill]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<source><![CDATA[Policing politics: Security intelligence and the liberal democratic state]]></source>
<year>2005</year>
<publisher-name><![CDATA[Frank Cass]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gill]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Theories of intelligence ¿Where are we, where should we go and how might we proceed?]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Gill]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Marrin]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Phytian]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Intelligence theory: Key questions and debates]]></source>
<year>2009</year>
<publisher-name><![CDATA[Routledge]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gill]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The way of explaining intelligence organization and process]]></article-title>
<source><![CDATA[Intelligence and National Security]]></source>
<year>2018</year>
<volume>33</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>578</page-range></nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hedley]]></surname>
<given-names><![CDATA[J. H]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Learning from intelligence failures]]></article-title>
<source><![CDATA[Intelligence Journal of Intelligence and Counterintelligence]]></source>
<year>2007</year>
<volume>18</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>435-50</page-range></nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Heuer]]></surname>
<given-names><![CDATA[R. J]]></given-names>
</name>
</person-group>
<source><![CDATA[Psychology of intelligence analysis]]></source>
<year>1999</year>
<publisher-name><![CDATA[Center for the Study of Intelligence, Central Intelligence Agency]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hill]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[The public policy process]]></source>
<year>2005</year>
<publisher-name><![CDATA[Pearson Longman]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hilsman]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<source><![CDATA[Strategic intelligence and national decisions]]></source>
<year>1956</year>
<publisher-name><![CDATA[The Free Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hoffman]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
</person-group>
<source><![CDATA[Black swans and pink flamingos: Five principles for force design]]></source>
<year>2015</year>
<publisher-name><![CDATA[War on the Rocks]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hoffmann]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<source><![CDATA[Why is there no IR scholarship on intelligence agencies? Some ideas for a new approach (ZMO Working Paper 23)]]></source>
<year>2019</year>
<publisher-name><![CDATA[SSOAR]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="">
<collab>House of Commons</collab>
<source><![CDATA[Review of intelligence on weapons of mass destruction. Report of a Committee of Privy Counsellors]]></source>
<year>2004</year>
</nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="">
<collab>House of Commons</collab>
<source><![CDATA[The report of the Iraq inquiry. Report of a Committee of Privy Counsellors]]></source>
<year>2016</year>
</nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jordán]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA[Una revisión del ciclo de inteligencia]]></source>
<year>2016</year>
<publisher-name><![CDATA[Análisis GESI, 2]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kahneman]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Maps of bounded rationality: Psychology for behavioral economics]]></article-title>
<source><![CDATA[The American Economic Review]]></source>
<year>2003</year>
<volume>93</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>1449-75</page-range></nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kendall]]></surname>
<given-names><![CDATA[W]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The function of intelligence]]></article-title>
<source><![CDATA[World Politics]]></source>
<year>1949</year>
<volume>1</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>542-52</page-range></nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kent]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<source><![CDATA[Strategic intelligence for american world policy]]></source>
<year>1965</year>
<publisher-name><![CDATA[Archon Books]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Marrin]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The 9/11 terrorist attacks: A failure of policy not strategic intelligence analysis]]></article-title>
<source><![CDATA[Intelligence and National Security]]></source>
<year>2011</year>
<volume>26</volume>
<numero>2-3</numero>
<issue>2-3</issue>
<page-range>182-202</page-range></nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Marrin]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Improving intelligence studies as an academic discipline]]></article-title>
<source><![CDATA[Intelligence and National Security]]></source>
<year>2014</year>
<volume>31</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>266-79</page-range></nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Marrin]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Why intelligence analysis has limited influence on American foreign policy]]></article-title>
<source><![CDATA[Intelligence and National Security]]></source>
<year>2018</year>
<volume>32</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>725-42</page-range></nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Matei]]></surname>
<given-names><![CDATA[F. C.]]></given-names>
</name>
<name>
<surname><![CDATA[De Castro]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Transitional justice and intelligence democratization]]></article-title>
<source><![CDATA[International Journal of Intelligence and CounterIntelligence]]></source>
<year>2019</year>
<month>)</month>
<volume>32</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>717-36</page-range></nlm-citation>
</ref>
<ref id="B41">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Merton]]></surname>
<given-names><![CDATA[R. C]]></given-names>
</name>
</person-group>
<source><![CDATA[Social theory and social structure]]></source>
<year>1968</year>
<publisher-name><![CDATA[The Free Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B42">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Negroponte]]></surname>
<given-names><![CDATA[J. D.]]></given-names>
</name>
<name>
<surname><![CDATA[Wittenstein]]></surname>
<given-names><![CDATA[E. M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Urgency, opportunity, and frustration: Implementing the intelligence reform and terrorism prevention act of 2004]]></article-title>
<source><![CDATA[Yale Law &amp; Policy Review]]></source>
<year>2010</year>
<volume>28</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>379-417</page-range></nlm-citation>
</ref>
<ref id="B43">
<nlm-citation citation-type="">
<collab>Office of the Director of National Intelligence (ODNI)</collab>
<source><![CDATA[U.S. National Intelligence: An overview 2011]]></source>
<year>2011</year>
</nlm-citation>
</ref>
<ref id="B44">
<nlm-citation citation-type="book">
<collab>Office of the Director of National Intelligence (ODNI)</collab>
<source><![CDATA[Intelligence community legal reference book]]></source>
<year>2019</year>
<publisher-name><![CDATA[Office of General Council]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B45">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Piedra C.]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
</person-group>
<source><![CDATA[Coyunturas críticas en los sistemas de inteligencia]]></source>
<year>2012</year>
<publisher-name><![CDATA[Flacso-Sede Ecuador]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B46">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Perrow]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<source><![CDATA[Normal accident: Living with high-risk technology]]></source>
<year>1984</year>
<publisher-name><![CDATA[Basic Books]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B47">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pfluke]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A history of the Five Eyes Alliance: Possibility for reform and additions]]></article-title>
<source><![CDATA[Comparative Strategy]]></source>
<year>2019</year>
<volume>38</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>302-15</page-range></nlm-citation>
</ref>
<ref id="B48">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pouliot]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Mérand]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Bourdieu&#8217;s concepts]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Adler-Nisse]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Bourdieu in international relations: Rethinking key concepts in IR]]></source>
<year>2011</year>
<publisher-name><![CDATA[Routledge]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B49">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Richards]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Pedalling hard: Further questions about the intelligence cycle in the contemporary era]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Phythian]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Understanding the intelligence cycle]]></source>
<year>2013</year>
<publisher-name><![CDATA[Routledge]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B50">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rubinstein]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA[Modeling bounded rationality]]></source>
<year>1998</year>
<publisher-name><![CDATA[The MIT Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B51">
<nlm-citation citation-type="book">
<collab>Select Committee on Intelligence</collab>
<source><![CDATA[Report on the U.S. Intelligence Community&#8217;s prewar intelligence assessments on Iraq]]></source>
<year></year>
<publisher-name><![CDATA[United States Senate]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B52">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shiraz]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Aldrich]]></surname>
<given-names><![CDATA[R. J]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Secrecy, spies and the global south: Intelligence studies beyond the &#8220;Five Eyes&#8221; alliance]]></article-title>
<source><![CDATA[International Affairs]]></source>
<year>2019</year>
<volume>95</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>1313-29</page-range></nlm-citation>
</ref>
<ref id="B53">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Simon]]></surname>
<given-names><![CDATA[H. A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Invariants of human behavior]]></article-title>
<source><![CDATA[Annual Review of Psychology]]></source>
<year>1990</year>
<volume>41</volume>
<page-range>1-19</page-range></nlm-citation>
</ref>
<ref id="B54">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Stephens]]></surname>
<given-names><![CDATA[T. W]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Bureaucracy, intelligence and technology: a reappraisal]]></article-title>
<source><![CDATA[World Affairs]]></source>
<year>1976</year>
<volume>139</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>231-43</page-range></nlm-citation>
</ref>
<ref id="B55">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Streeck]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Thelen]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
</person-group>
<source><![CDATA[Beyond continuity: Institutional change in advanced political economics]]></source>
<year>2005</year>
<publisher-name><![CDATA[Oxford University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B56">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Taleb]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
</person-group>
<source><![CDATA[The black swan: The impact of the highly improbable]]></source>
<year>2007</year>
<publisher-name><![CDATA[Random House]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B57">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Taylor]]></surname>
<given-names><![CDATA[R. J]]></given-names>
</name>
</person-group>
<source><![CDATA[Operational art and intelligence: What is the relationship?]]></source>
<year>1993</year>
<publisher-loc><![CDATA[Fort Leavenworth ]]></publisher-loc>
<publisher-name><![CDATA[United States Army Command and General Staff Collegue]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B58">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Torres F.]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Servicios de inteligencia como estructuras burocráticas: origen y doctrina]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Salgado]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Gudiño]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Desde el sur: visiones y aportes a los estudios internacionales desde Latinoamérica]]></source>
<year>2018</year>
<publisher-loc><![CDATA[Ecuador ]]></publisher-loc>
<publisher-name><![CDATA[Friedrich-Ebert-Stiftung (FES-ILDIS)]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B59">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Turing]]></surname>
<given-names><![CDATA[A. M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The chemical basis of morphogenesis]]></article-title>
<source><![CDATA[Philosophical Transactions of the Royal Society of London]]></source>
<year>1952</year>
<volume>237</volume>
<numero>641</numero>
<issue>641</issue>
<page-range>37-72</page-range></nlm-citation>
</ref>
<ref id="B60">
<nlm-citation citation-type="">
<collab>U.S. Senate Select Committee on Intelligence &amp; U.S. House Permanent Select Committee on Intelligence</collab>
<source><![CDATA[Joint inquiry into intelligence community activities before and after the terrorist attacks of September 11, 2001]]></source>
<year>2002</year>
</nlm-citation>
</ref>
<ref id="B61">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Van Puyvelde]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Curtis]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Standing on the shoulders of giants: diversity and scholarship in intelligence studies]]></article-title>
<source><![CDATA[Intelligence and National Security]]></source>
<year>2016</year>
<volume>31</volume>
<numero>7</numero>
<issue>7</issue>
<page-range>1040-54</page-range></nlm-citation>
</ref>
<ref id="B62">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wahlert]]></surname>
<given-names><![CDATA[M. H]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The &#8220;motivated bias&#8221; dilemma in warfare and intelligence]]></article-title>
<source><![CDATA[Defense &amp; Security Analysis]]></source>
<year>2012</year>
<volume>28</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>247-59</page-range></nlm-citation>
</ref>
<ref id="B63">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Warner]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[McDonald]]></surname>
<given-names><![CDATA[J. J]]></given-names>
</name>
</person-group>
<source><![CDATA[US Intelligence Community Reform Studies Since 1947]]></source>
<year>2005</year>
<publisher-loc><![CDATA[Washington DC ]]></publisher-loc>
<publisher-name><![CDATA[Center for the Study of Intelligence]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B64">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Weaver]]></surname>
<given-names><![CDATA[W]]></given-names>
</name>
</person-group>
<source><![CDATA[Analytical studies in aerial warfare. Summary technical report of the Applied Mathematics Panel, vol. 2]]></source>
<year>1946</year>
<publisher-name><![CDATA[Office of Scientific Research and Development]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B65">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Weber]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[Economía y sociedad]]></source>
<year>2008</year>
<publisher-name><![CDATA[Fondo de Cultura Económica]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B66">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Weintraub]]></surname>
<given-names><![CDATA[E. Roy]]></given-names>
</name>
</person-group>
<source><![CDATA[Game theory and Cold War rationality: A review essay (CHOPE Working Paper, 2016-19)]]></source>
<year>2016</year>
<publisher-loc><![CDATA[Durham, NC ]]></publisher-loc>
<publisher-name><![CDATA[Duke University, Center for the History of Political Economy (CHOPE)]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B67">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wheaton]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
</person-group>
<source><![CDATA[Re-imagining the intelligence process]]></source>
<year>2012</year>
<conf-name><![CDATA[ 2012 Annual Conference of the International Studies Association]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B68">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wirtz]]></surname>
<given-names><![CDATA[J. J]]></given-names>
</name>
</person-group>
<source><![CDATA[Understanding intelligence failure: Warning, response and deterrence]]></source>
<year>2016</year>
<publisher-name><![CDATA[Routledge]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B69">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wucker]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[The gray rhino: How to recognize and act on the obvious dangers we ignore]]></source>
<year>2016</year>
<publisher-name><![CDATA[St. Martin&#8217;s Press]]></publisher-name>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
