Skip to main content

Personal Information Management for Intelligence Tasks

  • Chapter
  • 1063 Accesses

Part of the book series: Studies in Computational Intelligence ((SCI,volume 135))

Abstract

The Intelligence Cycle is one of information processing: data is gathered, organized, analyzed, and summarized. In the current environment, there is a large amount of data available for Intelligence Analysts (IAs); therefore, a considerable amount of time is spent in the gathering and organizing phases, leaving little time for analysis and summarization. Thus, software tools that help with acquiring and categorizing new data are extremely useful to IAs.

The concept of Personal Information Management (PIM) is currently a hot topic of research, although its basic ideas have a long history. In this chapter we argue that many of the goals of PIM research are highly relevant to tasks that gather and organize large amounts of data; in particular, to Intelligence tasks. Hence, the intelligence community should pay attention to the developments in this area. After providing some basic background on the Intelligence Cycle, we examine the concept of PIM, point out some issues that are relevant to intelligence work, and discuss some areas of research that PIMs should address in order to be even more relevant to the Intelligence Community.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. A Consumer’s Guide to Intelligence, Washington, DC, CIA Public Affairs Staff (1995)

    Google Scholar 

  2. A Compendium of Analytic Tradecraft Notes, Washington DC, CIA, Directorate of Intelligence (1997)

    Google Scholar 

  3. Badia, A.: Knowledge Management and Intelligence Work: A Promising Combination. In: Encyclopedia of Knowledge Management., Idea Group, USA (2005)

    Google Scholar 

  4. Brooks, C.C.: Knowledge Management and the Intelligence community. Defense Intelligence Journal 9(1), 15–24 (2000)

    MathSciNet  Google Scholar 

  5. Baeza-Yates, R., Ribeiro-Neto, B.: Modern Information Retrieval. Addison-Wesley, ACM Press (1995)

    Google Scholar 

  6. Cuttrell, E., Dumais, S., Teevan, J.: Searching to Eliminate Personal Information Systems. In: Personal Information Management, vol. 49(1), ACM Press, New York (2006)

    Google Scholar 

  7. Demers, A., Gehrke, J., Riedewald, M.: The Architecture of the Cornell Knowledge Broker. In: Proceedings of the Second Symposium on Intelligence and Security Informatics (ISI-2004) (2004)

    Google Scholar 

  8. Dobra, A., Garofalakis, M., Gehrke, J., Rastogi, R.: Processing Complex Aggregate Queries over Data Streams. In: Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data. ACM Press, New York (2002)

    Google Scholar 

  9. Dumais, S., Cuttrell, E., Sarin, R., Horvitz, E.: Implicit Queries for Contextualized Search. In: Proceedings of the International Conference on Research and Development in Information Retrieval. ACM Press, New York (2004)

    Google Scholar 

  10. Elmagarmid, A., Rusinkiewicz, M., Sheth, A. (eds.): Heterogeneous and Autonomous Database Systems. Morgan Kaufmann, San Francisco (1999)

    Google Scholar 

  11. Erickson, T.: From PIM to GIM: Personal Information Management in Group Contexts. In: Personal Information Management. Communications of the ACM, vol. 49(1). ACM Press, New York (2006)

    Google Scholar 

  12. Franklin, M., Halevy, A., Maier, D.: From Databases to Dataspaces: A New Abstraction for Information Management. SIGMOD Record 34(4), 27–33 (2005)

    Article  Google Scholar 

  13. Halevy, A.: Semex: A Platform for Personal Information Management and Integration (2005), http://www.cs.washington.edu/homes/alon/

  14. Jones, W.: A Review Of Personal Information Management, IS-TR-2005-11-01, The Information School Technical Repository, University of Washington (2005)

    Google Scholar 

  15. Karat, C.M., Brodie, C., Karat, J.: Usable Privacy and Security for Personal Information Management. In: Personal Information Management. Communications of the ACM, vol. 49(1). ACM Press, New York (2006)

    Google Scholar 

  16. Karger, D., Jones, W.: Data Unification in Personal Information Management. In: Personal Information Management. Communications of the ACM, vol. 49(1), ACM Press, New York (2006)

    Google Scholar 

  17. Krizan, L.: Intelligence Essentials for Everyone. Occasional Paper n. 6, Joint Military Intelligence College, Washington DC (1999)

    Google Scholar 

  18. Mena, J.: Homeland Security: Techniques and Technologies. Charles River Media (2004)

    Google Scholar 

  19. Popp, R., Armour, T., Senator, T., Numrych, K.: Countering Terrorism Through Information Technology. Communications of the ACM, special issue on Emerging Technologies for Homeland Security (2004)

    Google Scholar 

  20. Sageman, M.: Understanding Terror Networks. University of Pennsylvania Press (2004)

    Google Scholar 

  21. Teevan, J., Jones, W., Bederson, B.: Personal Information Management. In: Communications of the ACM, vol. 49(1). ACM Press, New York (2006)

    Google Scholar 

  22. Thuraisingham, B.: Web Data Mining and Applications in Business Intelligence and Counter-Terrorism. CRC Press, Boca Raton (2003)

    Google Scholar 

  23. Various, A Consumer’s Guide to Intelligence. Office of Public Affairs, Central Intelligence Agency (1998)

    Google Scholar 

  24. Waltz, E.: Knowledge Management in the Intelligence Enterprise. Artech House Information Warfare Library (2003)

    Google Scholar 

  25. Resource Description Framework (RDF) http://www.w3.org/RDF

Download references

Author information

Authors and Affiliations

Authors

Editor information

Hsinchun Chen Christopher C. Yang

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Badia, A. (2008). Personal Information Management for Intelligence Tasks. In: Chen, H., Yang, C.C. (eds) Intelligence and Security Informatics. Studies in Computational Intelligence, vol 135. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69209-6_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-69209-6_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69207-2

  • Online ISBN: 978-3-540-69209-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics