<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                    <journal-id></journal-id>
            <journal-title-group>
                                                                                    <journal-title>EKEV Akademi Dergisi</journal-title>
            </journal-title-group>
                            <issn pub-type="ppub">1301-6229</issn>
                                        <issn pub-type="epub">2148-0710</issn>
                                                                                            <publisher>
                    <publisher-name>Erzurum Kültür Eğitim Vakfı</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.17753/sosekev.1775385</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Sociology (Other)</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Sosyoloji (Diğer)</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                                                            <article-title>CIA BELGELERİNDE YAPAY ZEKÂ VE ERKEN OTOMASYON: 1950’LERDEN ÜRETKEN DÖNEME KURUMSAL HAFIZA VE DÖNÜM NOKTALARI</article-title>
                                                                                                                                                                                                <trans-title-group xml:lang="en">
                                    <trans-title>Artificial Intelligence and Early Automation in CIA Documents: Institutional Memory and Turning Points from the 1950s to the Generative Era</trans-title>
                                </trans-title-group>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-5526-2089</contrib-id>
                                                                <name>
                                    <surname>Arslan</surname>
                                    <given-names>Alp Cenk</given-names>
                                </name>
                                                                    <aff>POLİS AKADEMİSİ, GÜVENLİK BİLİMLERİ ENSTİTÜSÜ, GÜVENLİK STRATEJİLERİ VE YÖNETİMİ ANABİLİM DALI, GÜVENLİK STRATEJİLERİ VE YÖNETİMİ (DR)</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                                                <issue>Advanced Online Publication</issue>
                                        <fpage>257</fpage>
                                        <lpage>272</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20250928">
                        <day>09</day>
                        <month>28</month>
                        <year>2025</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20260305">
                        <day>03</day>
                        <month>05</month>
                        <year>2026</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2013, EKEV Akademi Dergisi</copyright-statement>
                    <copyright-year>2013</copyright-year>
                    <copyright-holder>EKEV Akademi Dergisi</copyright-holder>
                </permissions>
            
                                                                                                                        <abstract><p>Bu çalışma, yapay zekâ (YZ) ve otomasyonun istihbarat alanındaki tarihsel gelişimini 1950’lerden günümüze kadar CIA belgeleri ve ABD Bilgi Edinme Özgürlüğü Yasası (FOIA) arşivlerine dayanarak incelemeyi amaçlamaktadır. Araştırma, tarihsel-analitik bir desen benimsemekte ve “teknolojik sıçrama noktaları” kavramı çerçevesinde altı ana dönemi tanımlamaktadır. Bu dönemler (1) erken otomasyon (1950–1969), (2) bilgisayarlaşma ve ilk YZ söylemleri (1970’ler), (3) uzman sistemler ve kurumsal YZ planlaması (1980’ler), (4) büyük veri ve otomasyon entegrasyonu (1990–2000’ler), (5) makine öğrenmesi ve deneysel projeler (2010’lar) ve (6) üretken yapay zekâ çağı (2020’ler) olarak öne çıkmaktadır. Veriler ağırlıklı olarak CIA FOIA belgeleri, iç raporlar ve eğitim materyallerinden elde edilmiş, ayrıca istihbarat tarihi ve YZ politikaları üzerine ikincil literatürle desteklenmiştir. Bulgular, “YZ” kavramı literatüre girmeden önce bile otomasyonun istihbarat iş akışlarına dâhil olduğunu göstermektedir. NSA–CIA kriptoanaliz projeleri, Georgetown–IBM makine çevirisi deneyi ve CIA’in INTELLOFAX sistemi bu erken örneklerdendir. 1980’lerde sistematik YZ eğitim programları ve kurumsal planlama öne çıkarken, 2000’lerde büyük veri madenciliği ve Açık Kaynak İstihbaratı (OSINT) entegrasyonu dikkat çekmiştir. 2010’larda Project Sable Spear gibi deneysel YZ uygulamaları, 2020’lerde ise üretken YZ’nin yükselişi CIA’in odak alanını şekillendirmiştir. Kurumun açık kaynaklarda yayımladığı güncel yayınları olan “Analiz için Yapay Zekâ: Önümüzdeki Yol”, “İstihbarat Analizi, Sentez ve Otomasyon” ve” Yapay Zekânın Vaatleri ve Tehlikeleri”, üretken YZ’nin sunduğu fırsatları, sınırlarını ve etik sorunlarını tartışmaktadır. Çalışma, hız, kapasite, güvenilirlik ve politik bağımsızlık gibi kurumsal önceliklerin CIA’in YZ adaptasyonunda sürekli tekrarlandığını, ancak günümüzde şeffaflık protokolleri ve hibrit insan–makine iş akışlarının merkezi bir öncelik hâline geldiğini ortaya koymaktadır.</p></abstract>
                                                                                                                                    <trans-abstract xml:lang="en">
                            <p>This study aims to examine the historical development of artificial intelligence (AI) and automation in the field of intelligence from the 1950s to the present, based on CIA documents and Freedom of Information Act (FOIA) archives. The research adopts a historical-analytical design and, within the framework of the concept of “technological inflection points,” identifies six main periods: (1) early automation (1950–1969), (2) computerization and initial AI discourses (1970s), (3) expert systems and institutional AI planning (1980s), (4) big data and automation integration (1990s–2000s), (5) machine learning and experimental projects (2010s), and (6) the generative AI era (2020s). Data are drawn primarily from CIA FOIA documents, internal reports, and training materials, supplemented by secondary literature on intelligence history and AI policies. The findings show that automation was integrated into intelligence workflows even before the concept of “AI” entered the literature. NSA–CIA cryptanalysis projects, the Georgetown–IBM machine translation experiment, and the CIA’s INTELLOFAX system are among these early examples. While systematic AI training programs and institutional planning came to the fore in the 1980s, the 2000s were marked by big data mining and the integration of Open Source Intelligence (OSINT). In the 2010s, experimental AI applications such as Project SABLE SPEAR emerged, and in the 2020s the rise of generative AI reshaped the CIA’s focus areas. The agency’s recent open-source publications, “Artificial Intelligence for Analysis: The Road Ahead, “Intelligence Analysis, Synthesis, and Automation” and “The Promise and Peril of AI”, discuss the opportunities, limitations, and ethical challenges of generative AI. The study reveals that institutional priorities such as speed, capacity, reliability, and political independence have been continuously reiterated in the CIA’s adaptation of AI, but that today transparency protocols and hybrid human–machine workflows have become central priorities.</p></trans-abstract>
                                                            
            
                                                                                        <kwd-group>
                                                    <kwd>Yapay zekâ</kwd>
                                                    <kwd>  Otomasyon</kwd>
                                                    <kwd>  İstihbarat tarihi</kwd>
                                                    <kwd>  CIA</kwd>
                                                    <kwd>  Güvenlik stratejileri</kwd>
                                            </kwd-group>
                                                        
                                                                                                        <kwd-group xml:lang="en">
                                                    <kwd>Artificial intelligence</kwd>
                                                    <kwd>  Automation</kwd>
                                                    <kwd>  Intelligence history</kwd>
                                                    <kwd>  CIA</kwd>
                                                    <kwd>  Security strategies</kwd>
                                            </kwd-group>
                                                                                                            </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">Baxter, P., &amp; Jack, S. (2008). Qualitative case study methodology: Study design and implementation for novice researchers. The Qualitative Report, 13(4), 544–559. https://doi.org/10.46743/2160-3715/2008.1573</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">Borene, A. B. (2023). “Intelligence analysis, synthesis, and automation”. https://www.cia.gov/resources/csi/static/a3f91ec21ddbc4b2d14a44dba51b3b0f/Article-Intelligence-Analysis-Synthesis-Automation.pdf adresinden 28 Ağustos 2025’te alınmıştır.</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">Buchanan, B. G., &amp; Smith, R. G. (1988). Fundamentals of expert systems. Annual review of computer science, 3(1), 23-58.</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">Creswell, J. W., &amp; Poth, C. N. (2018). Qualitative inquiry and research design: Choosing among five approaches (4th ed.). SAGE.</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">Central Intelligence Agency. (n.d.a). “Freedom of Information Act electronic reading room”. https://www.cia.gov/readingroom/home adresinden 28 Eylül 2025’te alınmıştır.</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">Central Intelligence Agency. (n.d.b). “Artificial intelligence and data science careers”. https://www.cia.gov/careers/artificial-intelligence-and-data-science-careers/ adresinden 28 Ağustos 2025’te alınmıştır.</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">Central Intelligence Agency. (1954). “Mechanical Translation”. https://www.cia.gov/readingroom/docs/CIA-RDP81-00706R000100140012-3.pdf adresinden 28 Ağustos 2025’te alınmıştır.</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">Central Intelligence Agency. (1955). “Intellofax system”. https://www.cia.gov/readingroom/docs/CIA-RDP79B00752A000300110003-1.pdf adresinden 28 Ağustos 2025’te alınmıştır.</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">Central Intelligence Agency. (1959). “Proposal Economic Machine Translation System.” https://www.cia.gov/readingroom/docs/CIA-RDP64-00046R000200030002-4.pdf adresinden 28 Ağustos 2025’te alınmıştır.</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">Central Intelligence Agency. (1971). “Report on perceptron”. https://www.cia.gov/readingroom/docs/CIA-RDP78B04770A002300030029-4.pdf adresinden 28 Ağustos 2025’te alınmıştır.</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">Central Intelligence Agency. (1983a). “Artificial intelligence applications”. https://www.cia.gov/readingroom/document/cia-rdp85-00142r000100050001-7 adresinden 28 Ağustos 2025’te alınmıştır.</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">Central Intelligence Agency. (1983b). “Artificial intelligence program recommendations”. https://www.cia.gov/readingroom/docs/CIA-RDP85M00364R000500770006-0.pdf adresinden 28 Ağustos 2025’te alınmıştır.</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">Central Intelligence Agency. (1983c). “1983 AI symposium summary report”. https://www.cia.gov/readingroom/docs/CIA-RDP86M00886R000500040010-5.pdf adresinden 28 Ağustos 2025’te alınmıştır.</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">Central Intelligence Agency. (1986). “Automatic data processing”. https://www.cia.gov/readingroom/document/cia-rdp86b00689r000300120032-0 adresinden 28 Ağustos 2025’te alınmıştır.</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">Central Intelligence Agency. (1987). “Request for training in artificial intelligence”. https://www.cia.gov/readingroom/docs/CIA-RDP89-00955R000200240022-6.pdf adresinden 28 Ağustos 2025’te alınmıştır.</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">Central Intelligence Agency. (1988). “U.S. intelligence requirements for the late 1980s”. https://www.cia.gov/readingroom/document/cia-rdp90-00552r000201130004-2 adresinden 28 Ağustos 2025’te alınmıştır.</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">Central Intelligence Agency. (1995). “The strategic use of open-source information”. https://www.cia.gov/readingroom/docs/DOC_0006122487.pdf adresinden 28 Ağustos 2025’te alınmıştır.</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">Central Intelligence Agency. (2021). “Lessons from SABLE SPEAR: The Application of an Artificial Intelligence Methodology in the Business of Intelligence”. https://www.cia.gov/resources/csi/static/ArticleSableSpearExperimentInAI.pdf adresinden 28 Ağustos 2025’te alınmıştır.</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">Defense Intelligence Agency. (2019). “Defense Intelligence Agency uses artificial intelligence to confront opioid crisis”. https://www.dia.mil/News-Features/Articles/Article-View/Article/1942872/defense-intelligence-agency-uses-artificial-intelligence-to-confront-opioid-cri/ adresinden 28 Ağustos 2025’te alınmıştır.</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">Department of Homeland Security. (2023). 2020 and 2021 DHS data mining report. https://www.dhs.gov/sites/default/files/2023-08/23_0831_priv_dhs-data-mining-report.pdf</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">Douglas, Y. C. (2024). “The CIA and early AI: Exploring the foundations and impact”. https://www.researchgate.net/publication/380424895_The_CIA_and_Early_AI_Exploring_the_Foundations_and_Impact adresinden 28 Ağustos 2025’te alınmıştır.</mixed-citation>
                    </ref>
                                    <ref id="ref22">
                        <label>22</label>
                        <mixed-citation publication-type="journal">Eisenhower Presidential Library. (1955). Technological Capabilities Panel Recommendations on Which the Central Intelligence Agency Has Full Responsibility for Study and Report to the National Security Council. https://www.eisenhowerlibrary.gov/sites/default/files/research/online-documents/declassified/fy-2014/079-017.pdf adresinden 28 Ağustos 2025’te alınmıştır.</mixed-citation>
                    </ref>
                                    <ref id="ref23">
                        <label>23</label>
                        <mixed-citation publication-type="journal">Ewbank, J. (2024). The role of artificial intelligence in the U.S. intelligence community: Current uses and future developments. The Aspen Institute. https://www.aspeninstitute.org/wp-content/uploads/2024/10/Ewbank_Role-of-AI-in-USIC_Final.pdf adresinden 28 Ağustos 2025’te alınmıştır.</mixed-citation>
                    </ref>
                                    <ref id="ref24">
                        <label>24</label>
                        <mixed-citation publication-type="journal">Garvin, P. L. (1968). The Georgetown-IBM experiment of 1954: an evaluation in retrospect. Mouton.</mixed-citation>
                    </ref>
                                    <ref id="ref25">
                        <label>25</label>
                        <mixed-citation publication-type="journal">Gleeson, D. J. (2023). “Artificial intelligence for analysis: The road ahead”. https://www.cia.gov/resources/csi/static/88dbcb2b5d4812731b3ff5122e3b6cb5/Article-Artificial-Intelligence-for-Analysis-The-Road-Ahead.pdf adresinden 28 Ağustos 2025’te alınmıştır.</mixed-citation>
                    </ref>
                                    <ref id="ref26">
                        <label>26</label>
                        <mixed-citation publication-type="journal">Hamilton, D., &amp; Kreuzer, M. (2018). The big data imperative: Air force intelligence for the information age. Air &amp; Space Power Journal, Spring 2018, https://www.airuniversity.af.edu/Portals/10/ASPJ/journals/Volume-32_Issue-1/F-Hamilton_Kreuzer.pdf</mixed-citation>
                    </ref>
                                    <ref id="ref27">
                        <label>27</label>
                        <mixed-citation publication-type="journal">Heuer, R. J. (1999). Psychology of intelligence analysis. Center for the Study of Intelligence.</mixed-citation>
                    </ref>
                                    <ref id="ref28">
                        <label>28</label>
                        <mixed-citation publication-type="journal">Husain, A. (2017). The sentient machine: the coming age of artificial intelligence. Simon and Schuster.</mixed-citation>
                    </ref>
                                    <ref id="ref29">
                        <label>29</label>
                        <mixed-citation publication-type="journal">Indiana University. (1991). “Expert systems and knowledge-based engineering (1984-1991)”. https://scholarworks.iu.edu/journals/index.php/ijdl/article/view/12891/19564 adresinden 28 Ağustos 2025’te alınmıştır.</mixed-citation>
                    </ref>
                                    <ref id="ref30">
                        <label>30</label>
                        <mixed-citation publication-type="journal">Intelligence Community. (2020). “Artificial intelligence ethics framework for the intelligence community”. https://www.intelligence.gov/ai/ai-ethics-framework adresinden 28 Ağustos 2025’te alınmıştır.</mixed-citation>
                    </ref>
                                    <ref id="ref31">
                        <label>31</label>
                        <mixed-citation publication-type="journal">ISACA (2023). The promise and peril of the AI revolution: Managing risk [White paper]. ISACA. https://www.isaca.org/resources/white-papers/2023/the-promise-and-peril-of-the-ai-revolution</mixed-citation>
                    </ref>
                                    <ref id="ref32">
                        <label>32</label>
                        <mixed-citation publication-type="journal">Kolodii, R. (2020). From CIA to C (AI). American Intelligence Journal, 37(1), 160–169.</mixed-citation>
                    </ref>
                                    <ref id="ref33">
                        <label>33</label>
                        <mixed-citation publication-type="journal">Miller, G. (2020). “How the CIA read secret communications of friends and foes for almost 50 years”. https://www.youtube.com/watch?v=_g1hYhCa4iQ adresinden 28 Ağustos 2025’te alınmıştır.</mixed-citation>
                    </ref>
                                    <ref id="ref34">
                        <label>34</label>
                        <mixed-citation publication-type="journal">Mitchell, B. (2024). “How the CIA is using generative AI — now and into the future”. https://fedscoop.com/how-the-cia-is-using-generative-ai-lakshmi-raman/ adresinden 28 Ağustos 2025’te alınmıştır.</mixed-citation>
                    </ref>
                                    <ref id="ref35">
                        <label>35</label>
                        <mixed-citation publication-type="journal">National Archives and Records Administration. (n.d.). “Records of the Central Intelligence Agency (CIA)”. https://www.archives.gov/research/intelligence/cia adresinden 28 Ağustos 2025’te alınmıştır.</mixed-citation>
                    </ref>
                                    <ref id="ref36">
                        <label>36</label>
                        <mixed-citation publication-type="journal">National Security Agency. (2015). “Declassified and approved for release by NSA and CIA on 08-28-2015 pursuant to E.O. 13526 ST 80292”. https://www.nsa.gov/portals/75/documents/news-features/declassified-documents/oral-history-interviews/nsa-oh-17-82-kullback.pdf adresinden 28 Ağustos 2025’te alınmıştır.</mixed-citation>
                    </ref>
                                    <ref id="ref37">
                        <label>37</label>
                        <mixed-citation publication-type="journal">National Security Archive. (2015). “The CIA and signals intelligence”. https://nsarchive.gwu.edu/briefing-book/cyber-vault-intelligence/2015-03-20/cia-and-signals-intelligence adresinden 28 Ağustos 2025’te alınmıştır.</mixed-citation>
                    </ref>
                                    <ref id="ref38">
                        <label>38</label>
                        <mixed-citation publication-type="journal">National Security Archive. (2020). “The CIA&#039;s ‘Minerva’ secret.” https://nsarchive.gwu.edu/briefing-book/chile-cyber-vault-intelligence-southern-cone/2020-02-11/cias-minerva-secret adresinden 28 Ağustos 2025’te alınmıştır.</mixed-citation>
                    </ref>
                                    <ref id="ref39">
                        <label>39</label>
                        <mixed-citation publication-type="journal">Office of the Director of National Intelligence. (2008). “ODNI data mining report”. https://www.fbiic.gov/public/2008/feb/ODNI_Data_Mining_Report.pdf adresinden 28 Ağustos 2025’te alınmıştır.</mixed-citation>
                    </ref>
                                    <ref id="ref40">
                        <label>40</label>
                        <mixed-citation publication-type="journal">Riehle, K. (2025). How do we know if an intelligence analytic product is good? Intelligence and National Security, 40(2), 261–276. https://doi.org/10.1080/02684527.2025.2468051</mixed-citation>
                    </ref>
                                    <ref id="ref41">
                        <label>41</label>
                        <mixed-citation publication-type="journal">Pastor-Galindo, J., Nespoli, P., Mármol, F. G., &amp; Pérez, G. M. (2020). The not yet exploited goldmine of OSINT: Opportunities, open challenges and future trends. IEEE access, 8, 10282-10304.</mixed-citation>
                    </ref>
                                    <ref id="ref42">
                        <label>42</label>
                        <mixed-citation publication-type="journal">Phillips, F., Hwang, G. G., &amp; Limprayoon, P. (2016). Inflection points and industry change: Was Andy Grove right after all?. Journal of Technology Management for Growing Economies, 7(1), 7-26.</mixed-citation>
                    </ref>
                                    <ref id="ref43">
                        <label>43</label>
                        <mixed-citation publication-type="journal">Riehle, K. (2025). How do we know if an intelligence analytic product is good? Intelligence and National Security, 40(2), 261–276. https://doi.org/10.1080/02684527.2025.2468051</mixed-citation>
                    </ref>
                                    <ref id="ref44">
                        <label>44</label>
                        <mixed-citation publication-type="journal">U.S. Senate Select Committee on Intelligence. (1977). “Project MKULTRA, the CIA&#039;s program of research in behavioral modification joint hearing”. https://www.intelligence.senate.gov/wp-content/uploads/2024/08/sites-default-files-hearings-95mkultra.pdf adresinden 28 Ağustos 2025’te alınmıştır.</mixed-citation>
                    </ref>
                                    <ref id="ref45">
                        <label>45</label>
                        <mixed-citation publication-type="journal">Umbrello, S. (2021). AI Winter. In Michael Klein &amp; Philip Frana (Eds.), Encyclopedia of Artificial Intelligence: The Past, Present, and Future of AI. ss. 7-8.</mixed-citation>
                    </ref>
                                    <ref id="ref46">
                        <label>46</label>
                        <mixed-citation publication-type="journal">Vanderbilt University. (2025). “AI is a strategic necessity in modern intelligence work”. https://www.vanderbilt.edu/national-security/2025/05/09/ai-is-a-strategic-necessity-in-modern-intelligence-work-national-security/ adresinden 28 Ağustos 2025’te alınmıştır.</mixed-citation>
                    </ref>
                                    <ref id="ref47">
                        <label>47</label>
                        <mixed-citation publication-type="journal">Yin, R. K. (2009). Case study research: Design and methods (5th ed.). SAGE.</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
