Technology has penetrated the social fabric of security practices so deeply that it is often used without much reflection on its role, significance and implications. This naturalisation of technology makes it difficult for practitioners to develop their own vision of technology. They may become subject to the coercive power of technology, and appropriate the narrow technological paradigm embodied in their tools. This, in turn, makes it difficult for technology developers to understand practitioner needs and to assess the transformative potential of technology. This paper aims to develop a conceptual framework for understanding the role of technology in intelligence. The focus is on the technological capabilities supporting an analysis of so...
Intelligence analysis in the 21st century, in the light of (post)modern security challenges, vulnera...
While the need for empirical investigations of cybersecurity analysts' collaborative work practices ...
The intelligence and security communities are in a constant state of evolution due to new technologi...
This book critically analyses the concept of the intelligence cycle, highlighting the nature and ext...
In the tasks facing the armed forces today there is a need for new and improved intelligence analysi...
Today's acceleration of technological innovations has transformed the use, behaviors, and practices ...
Technology Intelligence is one of the many ways of applying Competitive Intelligence. As CI, TI inte...
Artificial Intelligence (AI) is recognised as a disruptive technology that rapidly changes a wide ra...
In this chapter I engage in a broad discussion of the area of intelligence in the context of both fe...
A complex international environment, increased availability of information, simplified data manageme...
As society and business is becoming more complex, the creation and management of knowledge attracts ...
Nowadays, we are extensively feed up with technology of information all around us. Everything we ha...
In an era of rapidly increasing technical capability, the intelligence focus is often on the modes o...
What challenges does “Hybrid Threats” pose for the world of intelligence analysis and tradecraft, an...
Threat Intelligence (TI) is a field that has been gaining momentum as an answer to theexponential gr...
Intelligence analysis in the 21st century, in the light of (post)modern security challenges, vulnera...
While the need for empirical investigations of cybersecurity analysts' collaborative work practices ...
The intelligence and security communities are in a constant state of evolution due to new technologi...
This book critically analyses the concept of the intelligence cycle, highlighting the nature and ext...
In the tasks facing the armed forces today there is a need for new and improved intelligence analysi...
Today's acceleration of technological innovations has transformed the use, behaviors, and practices ...
Technology Intelligence is one of the many ways of applying Competitive Intelligence. As CI, TI inte...
Artificial Intelligence (AI) is recognised as a disruptive technology that rapidly changes a wide ra...
In this chapter I engage in a broad discussion of the area of intelligence in the context of both fe...
A complex international environment, increased availability of information, simplified data manageme...
As society and business is becoming more complex, the creation and management of knowledge attracts ...
Nowadays, we are extensively feed up with technology of information all around us. Everything we ha...
In an era of rapidly increasing technical capability, the intelligence focus is often on the modes o...
What challenges does “Hybrid Threats” pose for the world of intelligence analysis and tradecraft, an...
Threat Intelligence (TI) is a field that has been gaining momentum as an answer to theexponential gr...
Intelligence analysis in the 21st century, in the light of (post)modern security challenges, vulnera...
While the need for empirical investigations of cybersecurity analysts' collaborative work practices ...
The intelligence and security communities are in a constant state of evolution due to new technologi...