Exploring the research in information technology implementation
Information and Management
Trust breaks down in electronic contexts but can be repaired by some initial face-to-face contact
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Role-based access control on the web
ACM Transactions on Information and System Security (TISSEC)
COPLINK: managing law enforcement data and knowledge
Communications of the ACM
A Secure Workflow System for Dynamic Collaboration
IFIP/Sec '01 Proceedings of the IFIP TC11 Sixteenth Annual Working Conference on Information Security: Trusted Information: The New Decade Challenge
Developing and Validating Trust Measures for e-Commerce: An Integrative Typology
Information Systems Research
A generalized model for network survivability
Proceedings of the 2003 conference on Diversity in computing
The development of initial trust in an online company by new customers
Information and Management
PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities
IEEE Transactions on Knowledge and Data Engineering
TrustBAC: integrating trust relationships into the RBAC model for access control in open systems
Proceedings of the eleventh ACM symposium on Access control models and technologies
Knowledge sharing in cross-boundary information system development in the public sector
Information Technology and Management
A grounded theory of information sharing behavior in a personal learning space
CSCW '06 Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work
dg.o '07 Proceedings of the 8th annual international conference on Digital government research: bridging disciplines & domains
Assessing capability for justice information sharing
dg.o '07 Proceedings of the 8th annual international conference on Digital government research: bridging disciplines & domains
dg.o '07 Proceedings of the 8th annual international conference on Digital government research: bridging disciplines & domains
A case study of G2G information sharing in the Chinese context
dg.o '07 Proceedings of the 8th annual international conference on Digital government research: bridging disciplines & domains
Evaluating the boundary conditions of the technology acceptance model: An exploratory investigation
ACM Transactions on Computer-Human Interaction (TOCHI)
The Journal of Strategic Information Systems
Guest Editorial: State of standards in the information systems security area
Computer Standards & Interfaces
Business to business interoperability: A current review of XML data integration standards
Computer Standards & Interfaces
Journal of Theoretical and Applied Electronic Commerce Research
Hi-index | 0.00 |
While millions of dollars have been invested in information technologies to improve intelligence information sharing among law enforcement agencies at the Federal, Tribal, State and Local levels, there remains a hesitation to share information between agencies. This lack of coordination hinders the ability to prevent and respond to crime and terrorism. Work to date has not produced solutions nor widely accepted paradigms for understanding the problem. Therefore, to enhance the current intelligence information sharing services between government entities, in this interdisciplinary research, we have identified three major areas of influence; Technical, Social, and Legal. Furthermore, we have developed a preliminary model and theory of intelligence information sharing through a literature review, experience and interviews with practitioners in the field. This model and theory should serve as a basic conceptual framework for further academic work and lead to further investigation and clarification of the identified factors and the degree of impact they exert on the system so that actionable solutions can be identified and implemented.