TY - GEN
T1 - Towards trusted intelligence information sharing
AU - Treglia, Joseph V.
AU - Park, Joon S.
PY - 2009
Y1 - 2009
N2 - While millions of dollars have been invested in information technologies to improve intelligence information sharing among law enforcement agencies at the Federal, Tribal, State and Local levels, there remains a hesitation to share information between agencies. This lack of coordination hinders the ability to prevent and respond to crime and terrorism. Work to date has not produced solutions nor widely accepted paradigms for understanding the problem. Therefore, to enhance the current intelligence information sharing services between government entities, in this interdisciplinary research, we have identified three major areas of influence; Technical, Social, and Legal. Furthermore, we have developed a preliminary model and theory of intelligence information sharing through a literature review, experience and interviews with practitioners in the field. This model and theory should serve as a basic conceptual framework for further academic work and lead to further investigation and clarification of the identified factors and the degree of impact they exert on the system so that actionable solutions can be identified and implemented.
AB - While millions of dollars have been invested in information technologies to improve intelligence information sharing among law enforcement agencies at the Federal, Tribal, State and Local levels, there remains a hesitation to share information between agencies. This lack of coordination hinders the ability to prevent and respond to crime and terrorism. Work to date has not produced solutions nor widely accepted paradigms for understanding the problem. Therefore, to enhance the current intelligence information sharing services between government entities, in this interdisciplinary research, we have identified three major areas of influence; Technical, Social, and Legal. Furthermore, we have developed a preliminary model and theory of intelligence information sharing through a literature review, experience and interviews with practitioners in the field. This model and theory should serve as a basic conceptual framework for further academic work and lead to further investigation and clarification of the identified factors and the degree of impact they exert on the system so that actionable solutions can be identified and implemented.
KW - Information sharing
KW - Intelligence sharing
KW - Security
UR - http://www.scopus.com/inward/record.url?scp=70449686568&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=70449686568&partnerID=8YFLogxK
U2 - 10.1145/1599272.1599283
DO - 10.1145/1599272.1599283
M3 - Conference contribution
AN - SCOPUS:70449686568
SN - 9781605586694
T3 - Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, CSI-KDD in Conjunction with SIGKDD'09
SP - 45
EP - 52
BT - Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, CSI-KDD in Conjunction with SIGKDD'09
T2 - ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, CSI-KDD in Conjunction with SIGKDD'09
Y2 - 28 June 2009 through 28 June 2009
ER -