How analysts think: how do criminal intelligence analysts recognise and manage significant information?
Conference paper
Groenewald, C., Wong, B., Attfield, S., Passmore, P. and Kodagoda, N. 2017. How analysts think: how do criminal intelligence analysts recognise and manage significant information? 2017 European Intelligence and Security Informatics Conference (EISIC 2017). Athens, Greece 11 - 13 Sep 2017 Institute of Electrical and Electronics Engineers (IEEE). pp. 47-53 https://doi.org/10.1109/EISIC.2017.15
Type | Conference paper |
---|---|
Title | How analysts think: how do criminal intelligence analysts recognise and manage significant information? |
Authors | Groenewald, C., Wong, B., Attfield, S., Passmore, P. and Kodagoda, N. |
Abstract | The Criminal Intelligence Analyst's role is to create exhibits which are relevant, accurate and unbiased. Exhibits can be used as input to assist decision-making in intelligence-led policing. It may also be used as evidence in a court of law. The aim of this study was to determine how Criminal Intelligence Analysts recognise and manage significant information as a method to determine what is relevant for their attention and for the creation of exhibits. This in turn may provide guidance on how to design and incorporate loose and flexible argumentation schemas into sense-making software. The objective is to be informed on how to design software, which affords Criminal Intelligence Analysts with the ability to effortlessly determine the relevance of information, which subsequently could assist with the process of assessing and defending the quality of exhibits. |
Conference | 2017 European Intelligence and Security Informatics Conference (EISIC 2017) |
Page range | 47-53 |
ISBN | |
Hardcover | 9781538623855 |
Publisher | Institute of Electrical and Electronics Engineers (IEEE) |
Publication dates | |
11 Sep 2017 | |
Online | 28 Dec 2017 |
Publication process dates | |
Deposited | 07 Mar 2018 |
Accepted | 03 Aug 2017 |
Output status | Published |
Accepted author manuscript | |
Copyright Statement | © 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. |
Digital Object Identifier (DOI) | https://doi.org/10.1109/EISIC.2017.15 |
Language | English |
Book title | 2017 European Intelligence and Security Informatics Conference (EISIC) |
https://repository.mdx.ac.uk/item/877z6
Download files
48
total views15
total downloads0
views this month1
downloads this month