Cite This Item

Copy Citation

MLA
“What Are the Attackers’ Key Information Needs?” Mapping the Risks: Assessing the Homeland Security Implications of Publicly Available Geospatial Information, by JOHN C. BAKER et al., 1st ed., RAND Corporation, Santa Monica, CA; Arlington, VA; Pittsburgh, PA, 2004, pp. 17–40, www.jstor.org/stable/10.7249/mg142nga.12. Accessed 20 Jan. 2021.
APA
BAKER, J., LACHMAN, B., FRELINGER, D., O’CONNELL, K., HOU, A., TSENG, M., . . . YOST, C. (2004). What Are the Attackers’ Key Information Needs? In Mapping the Risks: Assessing the Homeland Security Implications of Publicly Available Geospatial Information (pp. 17-40). Santa Monica, CA; Arlington, VA; Pittsburgh, PA: RAND Corporation. Retrieved January 20, 2021, from http://www.jstor.org/stable/10.7249/mg142nga.12
CHICAGO
BAKER, JOHN C., BETH E. LACHMAN, DAVID R. FRELINGER, KEVIN M. O’CONNELL, ALEXANDER C. HOU, MICHAEL S. TSENG, DAVID ORLETSKY, and CHARLES YOST. "What Are the Attackers’ Key Information Needs?" In Mapping the Risks: Assessing the Homeland Security Implications of Publicly Available Geospatial Information, 17-40. Santa Monica, CA; Arlington, VA; Pittsburgh, PA: RAND Corporation, 2004. Accessed January 20, 2021. http://www.jstor.org/stable/10.7249/mg142nga.12.

Export Citation

Export a RIS file (For EndNote, ProCite, Reference Manager, Zotero, Mendeley…)
Export a Text file (For BibTex)
Note: Always review your references and make any necessary corrections before using. Pay attention to names, capitalization, and dates.