This term refers mainly to” an assessment is made of what intelligence is required”, CI should only focus on those issues of the highest importance to senior management (Saayman, et al., (2008)). In this phase the company’s define their requirements in terms of what information is needed? Why is it needed? When is it proper? Effective Intelligence processes do not try to collect all possible information or researches or everything related to a subject ((Saayman, et al., (2008)).Some scholars call this phase ‘planning and focus’. In other scholars’ CI process models, this is the first phase, while it is the second in the others. It involves working with decision makers to discover their intelligence requirements and then translating those …show more content…
For some researchers, this is the second phase of the CI process, whereas it is the third phase in other models. This phase is assigned to different titles, such as ‘information collection’, ‘collecting raw data’, ‘researching and gathering information’, ‘data collection’, ‘collection’, ‘gathering’ and ‘monitoring business environment’. The confirmation is in the set of publicly available information (Botha & Boon 2008). This is to ensure the compatibility with the code of ethics that evolved by SCIP. The information to be collected must be related to the key intelligence topics. In this phase the required information is collected from a variety of sources (primary and secondary) using several techniques (Viviers et al, 2005). Some common primary sources include government agencies, employees, suppliers, customers, conferences, etc. Some common secondary sources include magazines, TV, radio, analyst reports, and professional reports. The choice of a particular source is related to the type of data or information needed; such factors as ease of access , ease of processing the source, cost, availability, quantity and quality of information will possibly impact on the selection (Wanderley …show more content…
The Actionable Intelligence is distributed to decision-makers in this phase. Some practitioners called this phase ‘communication’, ‘intelligence dissemination’, ‘disseminating information’, ‘communicating the finished intelligence’ and ‘filtering and disseminating intelligence’. The final product, which is Actionable Intelligence, is communicated back to the decision-makers in a format that is easy to understand. The communication is in the form of a report, dashboard or meetings , Face-to-face, email and intranet communication are also used (Nasri 2011). This phase includes also the assessment of the Competitive Intelligence process, the identification of its benefit and the assessment of its effectiveness in the decision making process (Santo, 2010). Feedback from the users is also important in the development and improvement of future Competitive Intelligence plans, as well as the review and reassessment of the organizational strategy (Fleisher
Data retrieved from the Intelligence cycle is actionable intelligence. If the objective is criminal activities, actionable intelligence will pave a way for solutions. The use of actionable intelligence is necessary in today’s world of mass information growth. It embraces the ramification that it is important to implement counter measurements. Significant awareness about criminal intent is giving. It recognizes suspicious people associated with the crime.
In addition to acquiring data in varying formats, (as outlined above), data from a range of stakeholders will also be
Data and information sources are of both an individual and authoritative nature. Associations commonly gather a wide range of data amid the ordinary course of business.
Analyze and then synthesize all secondary data sources. Utilize a minimum of ten different sources to be used in the presentation and final document.
One of the main reasons why the choice was based to pick most of the facts from secondary data was because it’s always saved a lot of time and money on gathering the information (Ghauri, 2005). Nonetheless, the usage of Internet age has assisted in lowering the burden and made it a lot easier and convenient to research on information.
The intelligence cycle consist of five different steps. They are Planning, Collection, Processing, Analysis, and Dissemination [1]. Each one of these steps are critical and are always in motion because they working in conjunction with each other. The planning step is where decisions are made concerning several important factors to include, what to collect on, what are the current issues, and how to utilize limited intelligence resources. The collection step is where assets are put in place to gather raw data. The collection phase can be from multiple types of collection and the data is from multiple sources. The Processing phase is where the information that is collected is turned into data that is useable via translation or decryption. The
Intelligence gathering provides the investigator with as much information as possible about the victim, the business, the suspect, and the alleged crime. All of that information will help the investigator to proceed to the next step of the investigation process.
Primary and secondary sources are ways in which data can be retrieved. As Serakan (2006) stated, “Primary data refer to information obtained by the researcher on the variables of interest for the specific purpose of the study”. Various evidence suggesting to what methods of primary research can be conducted and which are most effective for the previously mentioned problem description are stated in this chapter.
Within the United States Intelligence Community (IC) there are a variety of sources and means with which intelligence information can be collected. Jeffrey T. Richelson, the author of The U.S. Intelligence Community states that ?Collection activity can take any of several overlapping forms: open source collection, clandestine collection, human source collection and interrogation, and technical collection.? 1 These areas that Richelson refers to can be broken down into the following disciplines: open source intelligence (OSINT), Human Intelligence (HUMINT), Imagery Intelligence (IMINT), Signals Intelligence (SIGINT) and Measurement and Signature Intelligence (MASINT). OSINT is the collection of intelligence
Intelligence is the result of a process or a cycle as identified by the intelligence community. This cycle involves five or six steps based on the agency’s needs. These steps include planning and direction, collection, processing, analysis and dissemination. Planning and direction step it is an important part of the process because the essential elements of the intelligence cycle are identified especially the collection requirements. To produce an intelligence product the information collected from the multitude of sources available to analysts or the collections assets must be analyzed and must be disseminated to the consumers of intelligence, so they can make the decisions. There are many types of sources important to intelligence analyst and these are only some of them: HUMINT, SIGINT, IMINIT, OSINT, MASINT, and COMINT
LO1. Be able to use a variety of sources for the collection of data, both primary and secondary
Strategic intelligence provides accurate and timely intelligence to national policy and decision makers. Policy and decision
Setting the context of Military or Governmental Intelligence aside, it is important to grasp that the word Intelligence is a word commonly used to define a mental process. Intelligence is a term, when used on a person, that is complimentary and often implies that the person has a substantial amount of knowledge and knows how to express it in a productive manner. This having been said, it is perhaps simpler to take the words ‘information’ and ‘analysis’ and see how they are associated with the term ‘intelligence’.
This must be relevant data that is cost effective to help us answer the research questions stated in the introductory part.
Generally, two sources of data are in existence: primary and secondary. In my research project, I intent to utilize both sources. The rationale for my choice of both sources is that in research work, there is a need that one use almost all available secondary data sources before undertaking to complete a primary study (Sappleton, 2013). In addition, secondary data is readily available and will give insight into the development of a hypothesis for my study. Therefore, I will check all the available data sources from peer reviewed journals both at the university library and online through google scholar and other search engines. Accessing sources from the library will need permission from the librarians while completion of the primary study will need an informed consent of the participants.