<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1405-0927</journal-id>
<journal-title><![CDATA[Historia y grafía]]></journal-title>
<abbrev-journal-title><![CDATA[Hist. graf]]></abbrev-journal-title>
<issn>1405-0927</issn>
<publisher>
<publisher-name><![CDATA[Universidad Iberoamericana, Departamento de Historia]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1405-09272025000100023</article-id>
<article-id pub-id-type="doi">10.48102/hyg.vi64.543</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Incorporating the Sensemaking Loop from Intelligence Analysis into Bespoke Tools for Digital History]]></article-title>
<article-title xml:lang="es"><![CDATA[Integrando el ciclo de comprensión del análisis de inteligencia en herramientas personalizadas para la historia digital]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Turkel]]></surname>
<given-names><![CDATA[William J.]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,The University of Western Ontario  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Canada</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>06</month>
<year>2025</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>06</month>
<year>2025</year>
</pub-date>
<numero>64</numero>
<fpage>23</fpage>
<lpage>54</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1405-09272025000100023&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1405-09272025000100023&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1405-09272025000100023&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract The discipline of intelligence analysis, like history, requires its practitioners to create interpretations supported by extensive collections of sources that may be incomplete, inconsistent, ambiguous, and occasionally deceptive. Here, I argue that models of the intelligence analyst&#8217;s research process, structured techniques for qualitative reasoning under uncertainty, and software for incorporating human &#8216;sensemaking&#8217; can all be adapted for use by historians. In doing so, I provide a sustained example of digital historical research using an extensive online collection of historical sources, the Old Bailey Online.]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen La disciplina del análisis de inteligencia, al igual que la historia, exige a sus practicantes crear interpretaciones respaldadas por grandes colecciones de fuentes, que pueden ser incompletas, inconsistentes, ambiguas e incluso engañosas en ocasiones. Aquí, sostengo que es posible adaptar modelos del proceso de investigación del analista de inteligencia, técnicas estructuradas para la razón cualitativa bajo incertidumbre y software que incorpore el &#8220;sensemaking&#8221; humano para su uso por historiadores. De este modo, ofrezco un ejemplo prolongado de investigación histórica digital que utiliza una gran colección de fuentes históricas en línea: la Old Bailey Online.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[digital history]]></kwd>
<kwd lng="en"><![CDATA[historical methods]]></kwd>
<kwd lng="en"><![CDATA[intelligence analysis]]></kwd>
<kwd lng="es"><![CDATA[historia digital]]></kwd>
<kwd lng="es"><![CDATA[métodos históricos]]></kwd>
<kwd lng="es"><![CDATA[análisis de inteligencia]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Beebe]]></surname>
<given-names><![CDATA[Sarah Miller]]></given-names>
</name>
<name>
<surname><![CDATA[Pherson]]></surname>
<given-names><![CDATA[Randolph H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Death in the Southwest]]></article-title>
<source><![CDATA[Cases in Intelligence Analysis: Structured Analytic Techniques in Action]]></source>
<year>2015</year>
<edition>2nd</edition>
<publisher-loc><![CDATA[Thousand Oaks, CA ]]></publisher-loc>
<publisher-name><![CDATA[CQ Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cohen]]></surname>
<given-names><![CDATA[Daniel J.]]></given-names>
</name>
<name>
<surname><![CDATA[Rosenzweig]]></surname>
<given-names><![CDATA[Roy]]></given-names>
</name>
</person-group>
<source><![CDATA[Digital History: A Guide to Gathering, Preserving, and Presenting the Past on the Web]]></source>
<year>2005</year>
<publisher-name><![CDATA[University of Pennsylvania Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Davis]]></surname>
<given-names><![CDATA[Jack]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Why Bad Things Happen to Good Analysts]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[George]]></surname>
<given-names><![CDATA[Roger Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Bruce]]></surname>
<given-names><![CDATA[James B.]]></given-names>
</name>
</person-group>
<source><![CDATA[Analyzing Intelligence: Origins, Obstacles, and Innovations]]></source>
<year>2008</year>
<page-range>157-70</page-range><publisher-loc><![CDATA[Washington, DC ]]></publisher-loc>
<publisher-name><![CDATA[Georgetown University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="">
<collab>DEVLONtechnologies</collab>
<source><![CDATA[]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="">
<collab>DEVLONtechnologies</collab>
<source><![CDATA[]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Endert]]></surname>
<given-names><![CDATA[Alex]]></given-names>
</name>
<name>
<surname><![CDATA[Bradel]]></surname>
<given-names><![CDATA[Lauren]]></given-names>
</name>
<name>
<surname><![CDATA[North]]></surname>
<given-names><![CDATA[Chris]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Beyond Control Panels: Direct Manipulation for Visual Analytics]]></article-title>
<source><![CDATA[IEEE Computer Graphics and Applications]]></source>
<year>2013</year>
<page-range>6-13</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Endert]]></surname>
<given-names><![CDATA[Alex]]></given-names>
</name>
<name>
<surname><![CDATA[Fiaux]]></surname>
<given-names><![CDATA[Patrick]]></given-names>
</name>
<name>
<surname><![CDATA[North]]></surname>
<given-names><![CDATA[Chris]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Semantic Interaction for Visual Text Analytics]]></article-title>
<source><![CDATA[IEEE Transactions on Visualization and Computer Graphics]]></source>
<year>2012</year>
<volume>18</volume>
<numero>12</numero>
<issue>12</issue>
<page-range>2879-88</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hedley]]></surname>
<given-names><![CDATA[John H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Evolution of Intelligence Analysis]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[George]]></surname>
<given-names><![CDATA[Roger Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Bruce]]></surname>
<given-names><![CDATA[James B.]]></given-names>
</name>
</person-group>
<source><![CDATA[Analyzing Intelligence: Origins, Obstacles, and Innovations]]></source>
<year>2008</year>
<page-range>19-34</page-range><publisher-loc><![CDATA[Washington, DC ]]></publisher-loc>
<publisher-name><![CDATA[Georgetown University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Heuer Jr.]]></surname>
<given-names><![CDATA[Richards J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Psychology of Intelligence Analysis]]></source>
<year>1999</year>
<publisher-name><![CDATA[CIA Center for the Study of Intelligence]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Heuer Jr.]]></surname>
<given-names><![CDATA[Richards J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Computer-Aided Analysis of Competing Hypotheses]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[George]]></surname>
<given-names><![CDATA[Roger Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Bruce]]></surname>
<given-names><![CDATA[James B.]]></given-names>
</name>
</person-group>
<source><![CDATA[Analyzing Intelligence: Origins, Obstacles, and Innovations]]></source>
<year>2008</year>
<page-range>251-65</page-range><publisher-loc><![CDATA[Washington, DC ]]></publisher-loc>
<publisher-name><![CDATA[Georgetown University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hitchcock]]></surname>
<given-names><![CDATA[Tim]]></given-names>
</name>
<name>
<surname><![CDATA[Turkel]]></surname>
<given-names><![CDATA[William J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Old Bailey Proceedings, 16741913: Text Mining for Evidence of Court Behavior]]></article-title>
<source><![CDATA[Annotated article, Models of Argument-Driven Digital History]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hitchcock]]></surname>
<given-names><![CDATA[Tim]]></given-names>
</name>
<name>
<surname><![CDATA[Turkel]]></surname>
<given-names><![CDATA[William J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Studying the Historical Emergence of Manslaughter in English Law Using Stable Random Projections and Tag Parameter Spaces]]></source>
<year>2021</year>
<publisher-name><![CDATA[Association for Computing in the Humanities]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hitchcock]]></surname>
<given-names><![CDATA[Tim]]></given-names>
</name>
<name>
<surname><![CDATA[Turkel]]></surname>
<given-names><![CDATA[William J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Making Sense of the Emergence of Manslaughter in British Criminal Justice]]></article-title>
<source><![CDATA[Digital Humanities Quarterly]]></source>
<year>2024</year>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kent]]></surname>
<given-names><![CDATA[Sherman]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Need for an Intelligence Literature]]></article-title>
<source><![CDATA[Studies in Intelligence]]></source>
<year>1955</year>
<volume>1</volume>
</nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kleiner]]></surname>
<given-names><![CDATA[Art]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Mystics: Royal Dutch/Shell&#8217;s Scenario Planners, 1967-1973]]></article-title>
<source><![CDATA[The Age of Heretics: A History of the Radical Thinkers Who Reinvented Corporate Management]]></source>
<year>2008</year>
<publisher-loc><![CDATA[San Francisco, CA ]]></publisher-loc>
<publisher-name><![CDATA[Jossey-Bass]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Marchio]]></surname>
<given-names><![CDATA[James]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Overcoming the Inertia of &#8216;Old Ways of Producing Intelligence&#8217;-The IC&#8217;s development and use of new analytic methods in the 1970s]]></article-title>
<source><![CDATA[Intelligence and National Security]]></source>
<year>2021</year>
<volume>36</volume>
<numero>7</numero>
<issue>7</issue>
<page-range>978-94</page-range></nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Marrin]]></surname>
<given-names><![CDATA[Stephen]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Intelligence Analysis: Structured Methods or Intuition]]></article-title>
<source><![CDATA[American Intelligence Journal]]></source>
<year>2007</year>
<page-range>7-16</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Milligan]]></surname>
<given-names><![CDATA[Ian]]></given-names>
</name>
</person-group>
<source><![CDATA[You Shouldn&#8217;t Need to be a Web Historian to Use Web Archives]]></source>
<year>2020</year>
<publisher-loc><![CDATA[Aarhus, Denmark ]]></publisher-loc>
<publisher-name><![CDATA[WARCNet Papers]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Moore]]></surname>
<given-names><![CDATA[David T.]]></given-names>
</name>
</person-group>
<source><![CDATA[Critical Thinking and Intelligence Analysis]]></source>
<year>2007</year>
<numero>14</numero>
<issue>14</issue>
<publisher-loc><![CDATA[Washington, DC ]]></publisher-loc>
<publisher-name><![CDATA[National Defence Intelligence College]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Moore]]></surname>
<given-names><![CDATA[David T.]]></given-names>
</name>
</person-group>
<source><![CDATA[Sensemaking: A Structure for An Intelligence Revolution]]></source>
<year>2011</year>
<publisher-loc><![CDATA[Washington, DC ]]></publisher-loc>
<publisher-name><![CDATA[National Defence Intelligence College Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Omand]]></surname>
<given-names><![CDATA[David]]></given-names>
</name>
</person-group>
<source><![CDATA[How Spies Think: Ten Lessons in Intelligence]]></source>
<year>2020</year>
<publisher-name><![CDATA[Penguin]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Paul]]></surname>
<given-names><![CDATA[Celeste Lyn]]></given-names>
</name>
<name>
<surname><![CDATA[Chang]]></surname>
<given-names><![CDATA[Jessica]]></given-names>
</name>
<name>
<surname><![CDATA[Endert]]></surname>
<given-names><![CDATA[Alex]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[TexTonic: Interactive Visualization for Exploration and Discovery of Very Large Text Collections]]></article-title>
<source><![CDATA[Information Visualization]]></source>
<year>2018</year>
</nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pherson]]></surname>
<given-names><![CDATA[Randolph H.]]></given-names>
</name>
<name>
<surname><![CDATA[Heuer Jr.]]></surname>
<given-names><![CDATA[Richards J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Structured Analytic Techniques for Intelligence Analysis]]></source>
<year>2021</year>
<edition>3rd</edition>
<publisher-loc><![CDATA[Thousand Oaks, CA ]]></publisher-loc>
<publisher-name><![CDATA[CQ Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pirolli]]></surname>
<given-names><![CDATA[Peter]]></given-names>
</name>
<name>
<surname><![CDATA[Card]]></surname>
<given-names><![CDATA[Stuart]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Information Foraging]]></article-title>
<source><![CDATA[Psychological Review]]></source>
<year>1999</year>
<volume>106</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>643-75</page-range></nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pirolli]]></surname>
<given-names><![CDATA[Peter]]></given-names>
</name>
<name>
<surname><![CDATA[Card]]></surname>
<given-names><![CDATA[Stuart]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Sensemaking Process and Leverage Points for Analyst Technology as Identified Through Cognitive Task Analysis]]></article-title>
<source><![CDATA[Proceedings of International Conference on Intelligence Analysis]]></source>
<year>2005</year>
<volume>5</volume>
</nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rose]]></surname>
<given-names><![CDATA[Stuart]]></given-names>
</name>
<name>
<surname><![CDATA[Engel]]></surname>
<given-names><![CDATA[Dave]]></given-names>
</name>
<name>
<surname><![CDATA[Cramer]]></surname>
<given-names><![CDATA[Nick]]></given-names>
</name>
<name>
<surname><![CDATA[Cowley]]></surname>
<given-names><![CDATA[Wendy]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Automatic keyword extraction from individual documents]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Berry]]></surname>
<given-names><![CDATA[Michael W.]]></given-names>
</name>
<name>
<surname><![CDATA[Kogan]]></surname>
<given-names><![CDATA[Jacob]]></given-names>
</name>
</person-group>
<source><![CDATA[Text Mining: Applications and Theory]]></source>
<year>2010</year>
<page-range>3-20</page-range><publisher-loc><![CDATA[New York ]]></publisher-loc>
<publisher-name><![CDATA[John Wiley and Sons]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Schmidt]]></surname>
<given-names><![CDATA[Benjamin]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Stable Random Projection: Lightweight, General-Purpose Dimensionality Reduction for Digitized Libraries]]></article-title>
<source><![CDATA[Journal of Cultural Analytics]]></source>
<year>2018</year>
</nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Steury]]></surname>
<given-names><![CDATA[Donald P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Sherman Kent and the Board of National Estimates: Collected Essays]]></source>
<year>1994</year>
<publisher-name><![CDATA[CIA Center for the Study of Intelligence]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Turkel]]></surname>
<given-names><![CDATA[William J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[How To]]></article-title>
<source><![CDATA[WilliamJTurkel.net]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Unsworth]]></surname>
<given-names><![CDATA[John]]></given-names>
</name>
</person-group>
<source><![CDATA[Scholarly Primitives: What Methods Do Humanities Researchers Have in Common, and How Might Our Tools Reflect This?]]></source>
<year>2000</year>
<conf-name><![CDATA[ Symposium on &#8220;Humanities Computing: formal methods, experimental practice&#8221;]]></conf-name>
<conf-loc>London </conf-loc>
</nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[van der Heijden]]></surname>
<given-names><![CDATA[Kees]]></given-names>
</name>
</person-group>
<source><![CDATA[Scenarios: The Art of Strategic Conversation]]></source>
<year>2005</year>
<edition>2nd</edition>
<publisher-loc><![CDATA[New York ]]></publisher-loc>
<publisher-name><![CDATA[John Wiley &amp; Sons]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wilkinson]]></surname>
<given-names><![CDATA[Angela]]></given-names>
</name>
<name>
<surname><![CDATA[Kupers]]></surname>
<given-names><![CDATA[Ronald]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Living in the Futures]]></article-title>
<source><![CDATA[Harvard Business Review]]></source>
<year>2013</year>
</nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Winks]]></surname>
<given-names><![CDATA[Robin W.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cloak and Gown: Scholars in the Secret War, 1939-61]]></source>
<year>1987</year>
<publisher-loc><![CDATA[New York ]]></publisher-loc>
<publisher-name><![CDATA[William Morrow and Company]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yi]]></surname>
<given-names><![CDATA[Ji Soo]]></given-names>
</name>
<name>
<surname><![CDATA[Melton]]></surname>
<given-names><![CDATA[Rachel]]></given-names>
</name>
<name>
<surname><![CDATA[Stasko]]></surname>
<given-names><![CDATA[John]]></given-names>
</name>
<name>
<surname><![CDATA[Jacko]]></surname>
<given-names><![CDATA[Julie A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Dust &amp; Magnet: Multivariate Information Visualization Using a Magnet Metaphor]]></article-title>
<source><![CDATA[Information Visualization]]></source>
<year>2005</year>
<page-range>1-18</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
