Although more information than ever before is available to support the intelligence
analyst, the vast proliferation of types of data, devices, and protocols makes it increasingly
difficult to ensure that the right information is received by the right people at the right time.
Analysts struggle to balance information overload and an information vacuum depending on
their location and available equipment. The ability to securely manage and deliver critical
knowledge and actionable intelligence to the analyst regardless of device configuration,
classification level or location in a reliable manner, would provide the analyst 24/7 access to
useable information. There are several important components to an intuitive system that can
provide timely information in a user-preferred manner. Two of these components: information
presentation based on the user's preference and requirements and the identification of solutions
to the problem of secure information delivery across multiple security levels, will be discussed in
this paper.
Although more information than ever before is available to support the intelligence analyst, the vast proliferation of types of data, devices, and protocols makes it increasingly
difficult to ensure that the right information is received by the right people at the right time. Analysts can rapidly shift between information overload and an information vacuum depending on their location and available equipment. The ability to securely manage and deliver critical knowledge and actionable intelligence to the analyst regardless of device configuration (bandwidth, processing speed, etc.), classification level or location in a reliable manner, would provide the analyst 24/7 access to useable information. There are several important components to an intuitive system that can provide timely information in a user-preferred manner. Two of these components: formatting information to accommodate the user's profiles and the identification of solutions to the problem of secure information delivery across multiple security
levels, will be discussed in this paper.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.