Advertisement

Personal Information Management (PIM) for Intelligence Analysis

  • Antonio Badia
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3975)

Abstract

The concept of Personal Information Management (PIM) is currently a hot topic of research. Some of the ideas being discussed under this topic have a long history, and they are relevant to the work of intelligence analysts. Hence, the intelligence community should pay attention to the developments in this area. In this position paper we examine the concept of PIM, point out some issues that are relevant to intelligence work, and discuss some areas of research that PIMs should address in order to be even more relevant to the Intelligence Community.

Keywords

Intelligence Community Intelligence Analysis Information Retrieval Technique Modern Information Retrieval Intelligence Analyst 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    A Consumer’s Guide to Intelligence, Washington, DC, CIA Public Affairs Staff (1995)Google Scholar
  2. 2.
    A Compendium of Analytic Tradecraft Notes, Washington DC, CIA, Directorate of Intelligence (1997)Google Scholar
  3. 3.
    Baeza-Yates, R., Ribeiro-Neto, B.: Modern Information Retrieval. Addison-Wesley, ACM Press (1999)Google Scholar
  4. 4.
    Cuttrell, E., Dumais, S., Teevan, J.: Searching to Eliminate Personal Information Systems, in [17]Google Scholar
  5. 5.
    Demers, A., Gehrke, J., Riedewald, M.: The architecture of the cornell knowledge broker. In: Chen, H., Moore, R., Zeng, D.D., Leavitt, J. (eds.) ISI 2004. LNCS, vol. 3073, pp. 146–162. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  6. 6.
    Dobra, A., Garofalakis, M., Gehrke, J., Rastogi, R.: Processing Complex Aggregate Queries over Data Streams. In: Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data (2002)Google Scholar
  7. 7.
    Dumais, S., Cuttrell, E., Sarin, R., Horvitz, E.: Implicit Queries for Contextualized Search. In: Proceedings of the International Conference on Research and Development in Information Retrieval. ACM Press, New York (2004)Google Scholar
  8. 8.
    Elmagarmid, A., Rusinkiewicz, M., Sheth, A. (eds.): Heterogeneous and Autonomous Database Systems. Morgan Kaufmann, San Francisco (1999)Google Scholar
  9. 9.
    Erickson, T.: From PIM to GIM: personal Information Management in Group Contexts, in [17]Google Scholar
  10. 10.
    Franklin, M., Halevy, A., Maier, D.: From Databases to Dataspaces: a New Abstraction for Information Management. SIGMOD Record 34(4), 27–33 (2005)CrossRefGoogle Scholar
  11. 11.
    Halevy, A.: Semex: a Platform for Personal Information Management and Integration, presentation available online at, http://www.cs.washington.edu/homes/alon/
  12. 12.
  13. 13.
    Jones, W.: A Review of Personal Information Management, IS-TR-2005-11-01, The Information School Technical Repository, University of WashingtonGoogle Scholar
  14. 14.
    Karat, C.M., Brodie, C., Karat, J.: Usable Privacy and Security for Personal Information Management, in [17]Google Scholar
  15. 15.
    Karger, D., Jones, W.: Data Unification in Personal Information Management, in [17]Google Scholar
  16. 16.
    Krizan, L.: Intelligence Essentials for Everyone, Occasional Paper n. 6. Joint Military Intelligence College, Washington DC (1999)Google Scholar
  17. 17.
    Teevan, J., Jones, W., Bederson, B (eds.): Personal Information Management, Communications of the ACM, vol. 49(1) (January 2006)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Antonio Badia
    • 1
  1. 1.University of LouisvilleLouisvilleUSA

Personalised recommendations