Abstract
The Intelligence Cycle is one of information processing: data is gathered, organized, analyzed, and summarized. In the current environment, there is a large amount of data available for Intelligence Analysts (IAs); therefore, a considerable amount of time is spent in the gathering and organizing phases, leaving little time for analysis and summarization. Thus, software tools that help with acquiring and categorizing new data are extremely useful to IAs.
The concept of Personal Information Management (PIM) is currently a hot topic of research, although its basic ideas have a long history. In this chapter we argue that many of the goals of PIM research are highly relevant to tasks that gather and organize large amounts of data; in particular, to Intelligence tasks. Hence, the intelligence community should pay attention to the developments in this area. After providing some basic background on the Intelligence Cycle, we examine the concept of PIM, point out some issues that are relevant to intelligence work, and discuss some areas of research that PIMs should address in order to be even more relevant to the Intelligence Community.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
A Consumer’s Guide to Intelligence, Washington, DC, CIA Public Affairs Staff (1995)
A Compendium of Analytic Tradecraft Notes, Washington DC, CIA, Directorate of Intelligence (1997)
Badia, A.: Knowledge Management and Intelligence Work: A Promising Combination. In: Encyclopedia of Knowledge Management., Idea Group, USA (2005)
Brooks, C.C.: Knowledge Management and the Intelligence community. Defense Intelligence Journal 9(1), 15–24 (2000)
Baeza-Yates, R., Ribeiro-Neto, B.: Modern Information Retrieval. Addison-Wesley, ACM Press (1995)
Cuttrell, E., Dumais, S., Teevan, J.: Searching to Eliminate Personal Information Systems. In: Personal Information Management, vol. 49(1), ACM Press, New York (2006)
Demers, A., Gehrke, J., Riedewald, M.: The Architecture of the Cornell Knowledge Broker. In: Proceedings of the Second Symposium on Intelligence and Security Informatics (ISI-2004) (2004)
Dobra, A., Garofalakis, M., Gehrke, J., Rastogi, R.: Processing Complex Aggregate Queries over Data Streams. In: Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data. ACM Press, New York (2002)
Dumais, S., Cuttrell, E., Sarin, R., Horvitz, E.: Implicit Queries for Contextualized Search. In: Proceedings of the International Conference on Research and Development in Information Retrieval. ACM Press, New York (2004)
Elmagarmid, A., Rusinkiewicz, M., Sheth, A. (eds.): Heterogeneous and Autonomous Database Systems. Morgan Kaufmann, San Francisco (1999)
Erickson, T.: From PIM to GIM: Personal Information Management in Group Contexts. In: Personal Information Management. Communications of the ACM, vol. 49(1). ACM Press, New York (2006)
Franklin, M., Halevy, A., Maier, D.: From Databases to Dataspaces: A New Abstraction for Information Management. SIGMOD Record 34(4), 27–33 (2005)
Halevy, A.: Semex: A Platform for Personal Information Management and Integration (2005), http://www.cs.washington.edu/homes/alon/
Jones, W.: A Review Of Personal Information Management, IS-TR-2005-11-01, The Information School Technical Repository, University of Washington (2005)
Karat, C.M., Brodie, C., Karat, J.: Usable Privacy and Security for Personal Information Management. In: Personal Information Management. Communications of the ACM, vol. 49(1). ACM Press, New York (2006)
Karger, D., Jones, W.: Data Unification in Personal Information Management. In: Personal Information Management. Communications of the ACM, vol. 49(1), ACM Press, New York (2006)
Krizan, L.: Intelligence Essentials for Everyone. Occasional Paper n. 6, Joint Military Intelligence College, Washington DC (1999)
Mena, J.: Homeland Security: Techniques and Technologies. Charles River Media (2004)
Popp, R., Armour, T., Senator, T., Numrych, K.: Countering Terrorism Through Information Technology. Communications of the ACM, special issue on Emerging Technologies for Homeland Security (2004)
Sageman, M.: Understanding Terror Networks. University of Pennsylvania Press (2004)
Teevan, J., Jones, W., Bederson, B.: Personal Information Management. In: Communications of the ACM, vol. 49(1). ACM Press, New York (2006)
Thuraisingham, B.: Web Data Mining and Applications in Business Intelligence and Counter-Terrorism. CRC Press, Boca Raton (2003)
Various, A Consumer’s Guide to Intelligence. Office of Public Affairs, Central Intelligence Agency (1998)
Waltz, E.: Knowledge Management in the Intelligence Enterprise. Artech House Information Warfare Library (2003)
Resource Description Framework (RDF) http://www.w3.org/RDF
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Badia, A. (2008). Personal Information Management for Intelligence Tasks. In: Chen, H., Yang, C.C. (eds) Intelligence and Security Informatics. Studies in Computational Intelligence, vol 135. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69209-6_12
Download citation
DOI: https://doi.org/10.1007/978-3-540-69209-6_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-69207-2
Online ISBN: 978-3-540-69209-6
eBook Packages: EngineeringEngineering (R0)