Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Personal Information Management (PIM) for Intelligence Analysis

  • Conference paper
Intelligence and Security Informatics (ISI 2006)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3975))

Included in the following conference series:

  • 1933 Accesses

Abstract

The concept of Personal Information Management (PIM) is currently a hot topic of research. Some of the ideas being discussed under this topic have a long history, and they are relevant to the work of intelligence analysts. Hence, the intelligence community should pay attention to the developments in this area. In this position paper we examine the concept of PIM, point out some issues that are relevant to intelligence work, and discuss some areas of research that PIMs should address in order to be even more relevant to the Intelligence Community.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. A Consumer’s Guide to Intelligence, Washington, DC, CIA Public Affairs Staff (1995)

    Google Scholar 

  2. A Compendium of Analytic Tradecraft Notes, Washington DC, CIA, Directorate of Intelligence (1997)

    Google Scholar 

  3. Baeza-Yates, R., Ribeiro-Neto, B.: Modern Information Retrieval. Addison-Wesley, ACM Press (1999)

    Google Scholar 

  4. Cuttrell, E., Dumais, S., Teevan, J.: Searching to Eliminate Personal Information Systems, in [17]

    Google Scholar 

  5. Demers, A., Gehrke, J., Riedewald, M.: The architecture of the cornell knowledge broker. In: Chen, H., Moore, R., Zeng, D.D., Leavitt, J. (eds.) ISI 2004. LNCS, vol. 3073, pp. 146–162. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  6. Dobra, A., Garofalakis, M., Gehrke, J., Rastogi, R.: Processing Complex Aggregate Queries over Data Streams. In: Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data (2002)

    Google Scholar 

  7. Dumais, S., Cuttrell, E., Sarin, R., Horvitz, E.: Implicit Queries for Contextualized Search. In: Proceedings of the International Conference on Research and Development in Information Retrieval. ACM Press, New York (2004)

    Google Scholar 

  8. Elmagarmid, A., Rusinkiewicz, M., Sheth, A. (eds.): Heterogeneous and Autonomous Database Systems. Morgan Kaufmann, San Francisco (1999)

    Google Scholar 

  9. Erickson, T.: From PIM to GIM: personal Information Management in Group Contexts, in [17]

    Google Scholar 

  10. Franklin, M., Halevy, A., Maier, D.: From Databases to Dataspaces: a New Abstraction for Information Management. SIGMOD Record 34(4), 27–33 (2005)

    Article  Google Scholar 

  11. Halevy, A.: Semex: a Platform for Personal Information Management and Integration, presentation available online at, http://www.cs.washington.edu/homes/alon/

  12. Haystack project, http://haystack.csail.mit.edu/home.html

  13. Jones, W.: A Review of Personal Information Management, IS-TR-2005-11-01, The Information School Technical Repository, University of Washington

    Google Scholar 

  14. Karat, C.M., Brodie, C., Karat, J.: Usable Privacy and Security for Personal Information Management, in [17]

    Google Scholar 

  15. Karger, D., Jones, W.: Data Unification in Personal Information Management, in [17]

    Google Scholar 

  16. Krizan, L.: Intelligence Essentials for Everyone, Occasional Paper n. 6. Joint Military Intelligence College, Washington DC (1999)

    Google Scholar 

  17. Teevan, J., Jones, W., Bederson, B (eds.): Personal Information Management, Communications of the ACM, vol. 49(1) (January 2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Badia, A. (2006). Personal Information Management (PIM) for Intelligence Analysis. In: Mehrotra, S., Zeng, D.D., Chen, H., Thuraisingham, B., Wang, FY. (eds) Intelligence and Security Informatics. ISI 2006. Lecture Notes in Computer Science, vol 3975. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11760146_49

Download citation

  • DOI: https://doi.org/10.1007/11760146_49

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-34478-0

  • Online ISBN: 978-3-540-34479-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics