front |1 |2 |3 |4 |5 |6 |7 |8 |9 |10 |11 |12 |13 |14 |15 |16 |17 |18 |19 |20 |21 |22 |23 |24 |25 |26 |27 |28 |29 |30 |31 |32 |33 |34 |35 |36 |37 |38 |39 |40 |41 |42 |43 |44 |45 |46 |47 |48 |review |
For training personnel when facing an asymmetric threat the first step is the “definition of the need” this is where access to experts is critical because they can activate their implicit knowledge in a creative way to then extract or modify from, or generate new explicit knowledge for our knowledge base. |