메뉴 건너뛰기




Volumn , Issue , 2009, Pages 45-52

Towards trusted intelligence information sharing

Author keywords

Information sharing; Intelligence sharing; Security

Indexed keywords

ACADEMIC WORK; CONCEPTUAL FRAMEWORKS; GOVERNMENT ENTITIES; INFORMATION SHARING; INTELLIGENCE SHARING; INTERDISCIPLINARY RESEARCH; LAW-ENFORCEMENT AGENCIES; LITERATURE REVIEWS; PRELIMINARY MODEL;

EID: 70449686568     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1599272.1599283     Document Type: Conference Paper
Times cited : (7)

References (56)
  • 1
    • 70449695856 scopus 로고    scopus 로고
    • Communicating Across State and County Lines: The Piedmont Regional Voice over Internet Protocol Project
    • Retrieved February 22, 2009, from
    • Bulman, P. (2008). Communicating Across State and County Lines: The Piedmont Regional Voice over Internet Protocol Project. NIJ Journal, 261. Retrieved February 22, 2009, from http://www.ojp.usdoj.gov/nij/journals/261/ piedmont-voip.htm.
    • (2008) NIJ Journal , vol.261
    • Bulman, P.1
  • 2
    • 70449689920 scopus 로고    scopus 로고
    • Bureau of Justice Statistics Law Enforcement Statistics, August 8, Retrieved May 9, 2008, from
    • Bureau of Justice Statistics Law Enforcement Statistics. (2007, August 8). . Retrieved May 9, 2008, from http://www.ojp.usdoj.gov/bjs/lawenf.htm.
    • (2007)
  • 3
    • 70449678057 scopus 로고    scopus 로고
    • Carter, D. L., & United States. (2004). Law Enforcement Intelligence a Guide for State, Local, and Tribal Law Enforcement Agencies. Washington, D.C.: U.S. Dept. of Justice, Office of Community Oriented Policing Services.
    • Carter, D. L., & United States. (2004). Law Enforcement Intelligence a Guide for State, Local, and Tribal Law Enforcement Agencies. Washington, D.C.: U.S. Dept. of Justice, Office of Community Oriented Policing Services.
  • 5
    • 34548411714 scopus 로고    scopus 로고
    • Evaluating the boundary conditions of the technology acceptance model: An exploratory investigation
    • doi: 10.1145/1275511.1275515
    • Chan, H. C., & Teo, H. (2007). Evaluating the boundary conditions of the technology acceptance model: An exploratory investigation. ACM Trans. Comput.-Hum. Interact., 14(2), 9. doi: 10.1145/1275511.1275515.
    • (2007) ACM Trans. Comput.-Hum. Interact , vol.14 , Issue.2 , pp. 9
    • Chan, H.C.1    Teo, H.2
  • 8
    • 70449680126 scopus 로고    scopus 로고
    • Clark, J. (2008, September 18). Remarks by Director John Clark at the Operation Orange Crush Press Conference. USMarshals.gov. Government Agency. Retrieved November 27, 2008, from http://www.usmarshals.gov/news/chron/2008/ 091808.htm.
    • Clark, J. (2008, September 18). Remarks by Director John Clark at the Operation Orange Crush Press Conference. USMarshals.gov. Government Agency. Retrieved November 27, 2008, from http://www.usmarshals.gov/news/chron/2008/ 091808.htm.
  • 9
    • 70049083026 scopus 로고    scopus 로고
    • Assessing capability for justice information sharing
    • Philadelphia, Pennsylvania: Digital Government Society of North America. Retrieved September 18, 2008, from
    • Cresswell, A. M., Pardo, T. A., & Hassan, S. (2007). Assessing capability for justice information sharing. In Proceedings of the 8th annual international conference on Digital government research: bridging disciplines & domains (pp. 122-130). Philadelphia, Pennsylvania: Digital Government Society of North America. Retrieved September 18, 2008, from http://portal.acm.org/citation.cfm?id=1248460.1248479&coll=ACM&dl= ACM&CFID=3249028&CFTOKEN=78511360
    • (2007) Proceedings of the 8th annual international conference on Digital government research: Bridging disciplines & domains , pp. 122-130
    • Cresswell, A.M.1    Pardo, T.A.2    Hassan, S.3
  • 10
    • 0442322891 scopus 로고    scopus 로고
    • Information Sharing in and Across Government Agencies: The Role and Influence of Scientist, Politician, and Bureaucrat Subcultures
    • doi: 10.1177/0894439303259889
    • Drake, D., Steckler, N. A., & Koch, M. J. (2004). Information Sharing in and Across Government Agencies: The Role and Influence of Scientist, Politician, and Bureaucrat Subcultures. Social Science Computer Review, 22(1), 67-84. doi: 10.1177/0894439303259889.
    • (2004) Social Science Computer Review , vol.22 , Issue.1 , pp. 67-84
    • Drake, D.1    Steckler, N.A.2    Koch, M.J.3
  • 11
    • 70449678055 scopus 로고    scopus 로고
    • Federal Assistance from Department of Justice, FY 2008, summary. (n.d.). . Retrieved February 22, 2009, from http://www.usaspending.gov/faads/faads.php? datype=T&detail=-1&database=faads&fiscal-year=2008&maj-agency- cat=15.
    • Federal Assistance from Department of Justice, FY 2008, summary. (n.d.). . Retrieved February 22, 2009, from http://www.usaspending.gov/faads/faads.php? datype=T&detail=-1&database=faads&fiscal-year=2008&maj-agency- cat=15.
  • 12
    • 45149092231 scopus 로고    scopus 로고
    • State of standards in the information systems security area
    • August, doi:10.1016/j.csi.2008.03. 001
    • Eduardo Fernández-Medina and Mariemma I. Yagüe, "State of standards in the information systems security area," Computer Standards & Interfaces 30, no. 6 (August 2008): 339-340, doi:10.1016/j.csi.2008.03. 001.
    • (2008) Computer Standards & Interfaces , vol.30 , Issue.6 , pp. 339-340
    • Fernández-Medina, E.1    Yagüe, M.I.2
  • 14
    • 34248672574 scopus 로고    scopus 로고
    • Occupational culture as determinant of knowledge sharing and performance in police investigations
    • doi: 10.1016/j.ijsl.2007.03.003
    • Glomseth, R., Gottschalk, P., & Solli-Saether, H. (2007). Occupational culture as determinant of knowledge sharing and performance in police investigations. International Journal of the Sociology of Law, 35(2), 96-107. doi: 10.1016/j.ijsl.2007.03.003.
    • (2007) International Journal of the Sociology of Law , vol.35 , Issue.2 , pp. 96-107
    • Glomseth, R.1    Gottschalk, P.2    Solli-Saether, H.3
  • 15
    • 33744776618 scopus 로고    scopus 로고
    • Kinship in the Shadow of the Corporation: The Interbuilder Network in Clyde River Shipbuilding, 17111990
    • Ingram, P., & Lifschitz, A. (2006). Kinship in the Shadow of the Corporation: The Interbuilder Network in Clyde River Shipbuilding, 17111990. American Sociological Review, 71, 334-352.
    • (2006) American Sociological Review , vol.71 , pp. 334-352
    • Ingram, P.1    Lifschitz, A.2
  • 16
    • 70449678056 scopus 로고    scopus 로고
    • ISAC White Paper. (2004). Vetting and trust for communication among ISACs and government entities. Retrieved October 23, 2008, from http://www. isaccouncil.org/pub/Vetting-and-Trust-013104.pdf.
    • ISAC White Paper. (2004). Vetting and trust for communication among ISACs and government entities. Retrieved October 23, 2008, from http://www. isaccouncil.org/pub/Vetting-and-Trust-013104.pdf.
  • 17
    • 34247661091 scopus 로고    scopus 로고
    • The Bosnian Police and Police Integrity: A Continuing Story
    • doi: 10.1177/1477370805056057
    • Ivkovic, S. K., & Shelley, T. O. (2005). The Bosnian Police and Police Integrity: A Continuing Story. European Journal of Criminology, 2(4), 428-464. doi: 10.1177/1477370805056057.
    • (2005) European Journal of Criminology , vol.2 , Issue.4 , pp. 428-464
    • Ivkovic, S.K.1    Shelley, T.O.2
  • 18
    • 70449678054 scopus 로고    scopus 로고
    • A case study of G2G information sharing in the Chinese context
    • Philadelphia, Pennsylvania: Digital Government Society of North America. Retrieved September 18, 2008, from
    • Jing, F., & Pengzhu, Z. (2007). A case study of G2G information sharing in the Chinese context. In Proceedings of the 8th annual international conference on Digital government research: bridging disciplines & domains (pp. 234-235). Philadelphia, Pennsylvania: Digital Government Society of North America. Retrieved September 18, 2008, from http://portal.acm.org/citation.cfm? id=1248460.1248496&coll=ACM&dl=ACM&CFID=3249028&CFTOKEN=78511360
    • (2007) Proceedings of the 8th annual international conference on Digital government research: Bridging disciplines & domains , pp. 234-235
    • Jing, F.1    Pengzhu, Z.2
  • 19
    • 33746575004 scopus 로고    scopus 로고
    • A generalized model for network survivability
    • Atlanta, Georgia, USA: ACM. doi: 10.1145/948542.948552
    • Koroma, J., Li, W., & Kazakos, D. (2003). A generalized model for network survivability. In Proceedings of the 2003 conference on Diversity in computing (pp. 47-51). Atlanta, Georgia, USA: ACM. doi: 10.1145/948542.948552.
    • (2003) Proceedings of the 2003 conference on Diversity in computing , pp. 47-51
    • Koroma, J.1    Li, W.2    Kazakos, D.3
  • 20
    • 0348042908 scopus 로고    scopus 로고
    • The development of initial trust in an online company by new customers
    • Koufaris, M., & Hampton-Sosa, W. (2004). The development of initial trust in an online company by new customers. Inf. Manage., 41(3), 377-397.
    • (2004) Inf. Manage , vol.41 , Issue.3 , pp. 377-397
    • Koufaris, M.1    Hampton-Sosa, W.2
  • 21
    • 38049100294 scopus 로고    scopus 로고
    • Kulik, C. T., Bainbridge, H. T. J., & Cregan, C. (2008). KNOWN BY THE COMPANY WE KEEP: STIGMA-BY-ASSOCIATION EFFECTS IN THE WORKPLACE. Academy of Management Review, 33(1), 216-230. doi: Article.
    • Kulik, C. T., Bainbridge, H. T. J., & Cregan, C. (2008). KNOWN BY THE COMPANY WE KEEP: STIGMA-BY-ASSOCIATION EFFECTS IN THE WORKPLACE. Academy of Management Review, 33(1), 216-230. doi: Article.
  • 22
    • 0031125237 scopus 로고    scopus 로고
    • Exploring the research in information technology implementation
    • Lai, V. S., & Mahapatra, R. K. (1997). Exploring the research in information technology implementation. Inf. Manage., 32(4), 187-201.
    • (1997) Inf. Manage , vol.32 , Issue.4 , pp. 187-201
    • Lai, V.S.1    Mahapatra, R.K.2
  • 25
    • 70449692916 scopus 로고    scopus 로고
    • Cyber crime and challenges for crime investigation in the information era. In Intelligence and Security Informatics, 2008. ISI 2008
    • doi: 10.1109/ISI.2008.4565011
    • Lee, H. (2008). Cyber crime and challenges for crime investigation in the information era. In Intelligence and Security Informatics, 2008. ISI 2008. IEEE International Conference on (pp. xxv-xxvi). doi: 10.1109/ISI.2008.4565011.
    • (2008) IEEE International Conference on (pp
    • Lee, H.1
  • 26
    • 70449664114 scopus 로고    scopus 로고
    • Lee, J., & Rao, H. R. (2007). Exploring the causes and effects of inter-agency information sharing systems adoption in the anti/counter-terrorism and disaster management domains. In Proceedings of the 8th annual international conference on Digital government research: bridging disciplines \& domains (pp. 155-163). Philadelphia, Pennsylvania: Digital Government Research Center.
    • Lee, J., & Rao, H. R. (2007). Exploring the causes and effects of inter-agency information sharing systems adoption in the anti/counter-terrorism and disaster management domains. In Proceedings of the 8th annual international conference on Digital government research: bridging disciplines \& domains (pp. 155-163). Philadelphia, Pennsylvania: Digital Government Research Center.
  • 27
    • 3142738238 scopus 로고    scopus 로고
    • PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities. Knowledge and Data Engineering
    • doi: 10.1109/TKDE.2004.1318566
    • Li Xiong, & Ling Liu. (2004). PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities. Knowledge and Data Engineering, IEEE Transactions on, 16(7), 843-857. doi: 10.1109/TKDE.2004.1318566.
    • (2004) IEEE Transactions on , vol.16 , Issue.7 , pp. 843-857
    • Xiong, L.1    Liu, L.2
  • 28
    • 42649109355 scopus 로고    scopus 로고
    • Why do we trust new technology? A study of initial trust formation with organizational information systems
    • doi: 10.1016/j.jsis.2008.01.001
    • Li, X., Hess, T. J., & Valacich, J. S. (2008). Why do we trust new technology? A study of initial trust formation with organizational information systems. The Journal of Strategic Information Systems, 17(1), 39-71. doi: 10.1016/j.jsis.2008.01.001.
    • (2008) The Journal of Strategic Information Systems , vol.17 , Issue.1 , pp. 39-71
    • Li, X.1    Hess, T.J.2    Valacich, J.S.3
  • 29
    • 70449689919 scopus 로고    scopus 로고
    • Lieberman, J. (2007). Confronting the Terrorist Threat to the Homeland: Six Years After 9/11. 342 DIRKSEN SENATE OFFICE BUILDING, WASHINGTON, D.C.: Federal News Service. Retrieved May 8, 2008, from http://www.fas.org/irp/ congress/2007-hr/091007transcript.pdf.
    • Lieberman, J. (2007). Confronting the Terrorist Threat to the Homeland: Six Years After 9/11. 342 DIRKSEN SENATE OFFICE BUILDING, WASHINGTON, D.C.: Federal News Service. Retrieved May 8, 2008, from http://www.fas.org/irp/ congress/2007-hr/091007transcript.pdf.
  • 30
    • 70449634639 scopus 로고    scopus 로고
    • Luna-Reyes, L. F., Andersen, D. F., Richardson, G. P., Pardo, T. A., & Cresswell, A. M. (2007). Emergence of the governance structure for information integration across governmental agencies: a system dynamics approach. In Proceedings of the 8th annual international conference on Digital government research: bridging disciplines \& domains (pp. 47-56). Philadelphia, Pennsylvania: Digital Government Society of North America. Retrieved October 16, 2008, from http://portal.acm.org/citation.cfm?id=1248460. 1248468&coll=GUIDE&dl=GUIDE&type=series&idx=SERIES10714& part=series&WantType=Proceedings&title=AICPS&CFID= 6749952&CFTOKEN=77254060#.
    • Luna-Reyes, L. F., Andersen, D. F., Richardson, G. P., Pardo, T. A., & Cresswell, A. M. (2007). Emergence of the governance structure for information integration across governmental agencies: a system dynamics approach. In Proceedings of the 8th annual international conference on Digital government research: bridging disciplines \& domains (pp. 47-56). Philadelphia, Pennsylvania: Digital Government Society of North America. Retrieved October 16, 2008, from http://portal.acm.org/citation.cfm?id=1248460. 1248468&coll=GUIDE&dl=GUIDE&type=series&idx=SERIES10714& part=series&WantType=Proceedings&title=AICPS&CFID= 6749952&CFTOKEN=77254060#.
  • 31
    • 34247255462 scopus 로고    scopus 로고
    • The impact of 9/11 on organizational development among state and local law enforcement agencies
    • Marks, D. E., & Sun, I. Y. (2007). The impact of 9/11 on organizational development among state and local law enforcement agencies. Journal of Contemporary Criminal Justice, 23(2), 159-173.
    • (2007) Journal of Contemporary Criminal Justice , vol.23 , Issue.2 , pp. 159-173
    • Marks, D.E.1    Sun, I.Y.2
  • 32
    • 70449655949 scopus 로고    scopus 로고
    • Information Sharing And Terrorism Risk Assessment Committee on Homeland Security United States House of Representatives Washington, D.C, Retrieved October 18, 2008, from
    • Mckay, J. (2008). Statement of John McKay, Former United States Attorney For the Western District of Washington, Before the Subcommittee on Intelligence, Information Sharing And Terrorism Risk Assessment Committee on Homeland Security United States House of Representatives (Washington, D.C., 2008), Retrieved October 18, 2008, from http://webdev.maxwell.syr.edu/insct/Research/ IS%20Page/McKay%20Testimony.pdf.
    • (2008) Statement of John McKay, Former United States Attorney For the Western District of Washington, Before the Subcommittee on Intelligence
    • Mckay, J.1
  • 33
    • 0036737236 scopus 로고    scopus 로고
    • Developing and Validating Trust Measures for e-Commerce: An Integrative Typology. Info. Sys. Research
    • McKnight, D. H., Choudhury, V., & Kacmar, C. (2002). Developing and Validating Trust Measures for e-Commerce: An Integrative Typology. Info. Sys. Research, 13(3), 334-359.
    • (2002) , vol.13 , Issue.3 , pp. 334-359
    • McKnight, D.H.1    Choudhury, V.2    Kacmar, C.3
  • 35
    • 33750738592 scopus 로고    scopus 로고
    • Knowledge sharing in cross-boundary information system development in the public sector
    • doi: 10.1007/s10799-006-0278-6
    • Pardo, Cresswell, Thompson, & Zhang. (2006). Knowledge sharing in cross-boundary information system development in the public sector. Information Technology and Management, 7(4), 293-313. doi: 10.1007/s10799-006-0278-6.
    • (2006) Information Technology and Management , vol.7 , Issue.4 , pp. 293-313
    • Pardo, C.1    Thompson2    Zhang3
  • 38
    • 84904250889 scopus 로고    scopus 로고
    • Park, J., Kang, M., and Froscher, J. (2001). A secure workflow system for dynamic cooperation. In Michel Dupuy and Pierre Paradinas, editors, Trusted Information: The New Decade Challenge, pages167-182. Kluwer Academic Publishers, 2001. Proceedings of the 16th IFIP TC11 International Conference on Information Security (IFIP/SEC), Paris, France, June 11-13.
    • Park, J., Kang, M., and Froscher, J. (2001). A secure workflow system for dynamic cooperation. In Michel Dupuy and Pierre Paradinas, editors, Trusted Information: The New Decade Challenge, pages167-182. Kluwer Academic Publishers, 2001. Proceedings of the 16th IFIP TC11 International Conference on Information Security (IFIP/SEC), Paris, France, June 11-13.
  • 40
    • 50249119553 scopus 로고    scopus 로고
    • A framework of multiple-aspect component-testing for trusted collaboration in mission-critical systems
    • Atlanta, Georgia, November 17-20. IEEE Computer Society
    • Park, J., Suresh, A., An, G., and Giordano, J. (2006). A framework of multiple-aspect component-testing for trusted collaboration in mission-critical systems. In Proceedings of the IEEE Workshop on Trusted Collaboration (TrustCol), Atlanta, Georgia, November 17-20. IEEE Computer Society.
    • (2006) Proceedings of the IEEE Workshop on Trusted Collaboration (TrustCol)
    • Park, J.1    Suresh, A.2    An, G.3    Giordano, J.4
  • 41
    • 35048832496 scopus 로고    scopus 로고
    • A vector model of trust for developing trustworthy systems
    • P. Samarati et al. editors, Computer Security- ESORICS, Proceedings of the 9th European Symposium on Research in Computer Security, September 13-15, Sophia Antipolis, France, Springer
    • Ray, Indrajit and Chakraborty, Sudip (2004). A vector model of trust for developing trustworthy systems. In P. Samarati et al. editors, Computer Security- ESORICS, Proceedings of the 9th European Symposium on Research in Computer Security, September 13-15, 2004, Sophia Antipolis, France. LNCS 3193, Springer.
    • (2004) LNCS , vol.3193
    • Ray, I.1    Chakraborty, S.2
  • 42
    • 34547169479 scopus 로고    scopus 로고
    • A grounded theory of information sharing behavior in a personal learning space
    • Banff, Alberta, Canada: ACM. doi: 10.1145/1180875.1180946
    • Razavi, M. N., & Iverson, L. (2006). A grounded theory of information sharing behavior in a personal learning space. In Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work (pp. 459-468). Banff, Alberta, Canada: ACM. doi: 10.1145/1180875.1180946.
    • (2006) Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work , pp. 459-468
    • Razavi, M.N.1    Iverson, L.2
  • 43
    • 0031632337 scopus 로고    scopus 로고
    • Trust breaks down in electronic contexts but can be repaired by some initial face-to-face contact
    • Los Angeles, California, United States: ACM Press/Addison-Wesley Publishing Co
    • Rocco, E. (1998). Trust breaks down in electronic contexts but can be repaired by some initial face-to-face contact. In Proceedings of the SIGCHI conference on Human factors in computing systems (pp. 496-502). Los Angeles, California, United States: ACM Press/Addison-Wesley Publishing Co.
    • (1998) Proceedings of the SIGCHI conference on Human factors in computing systems , pp. 496-502
    • Rocco, E.1
  • 44
    • 33744747110 scopus 로고    scopus 로고
    • e-Commerce: The Roles of Trust, Security, and Type of e-Commerce Involvement
    • Ruppel, C., Underwood-Queen, L., & Harrington, S. J. (2003). e-Commerce: The Roles of Trust, Security, and Type of e-Commerce Involvement. e-Service Journal, 2(2), 25-45.
    • (2003) e-Service Journal , vol.2 , Issue.2 , pp. 25-45
    • Ruppel, C.1    Underwood-Queen, L.2    Harrington, S.J.3
  • 45
    • 70449689918 scopus 로고    scopus 로고
    • Schooley, B. L. (2007). Inter-organizational systems analysis to improve time-critical public services: The case of mobile emergency medical services. Retrieved from http://proquest.umi.com/pqdweb?did=1390309161&Fmt= 7&clientId=3739&RQT=309&VName=PQD.
    • Schooley, B. L. (2007). Inter-organizational systems analysis to improve time-critical public services: The case of mobile emergency medical services. Retrieved from http://proquest.umi.com/pqdweb?did=1390309161&Fmt= 7&clientId=3739&RQT=309&VName=PQD.
  • 46
    • 34247525112 scopus 로고    scopus 로고
    • Schoorman, F. D., Mayer, R. C., & Davis, J. H. (2007). AN INTEGRATIVE MODEL OF ORGANIZATIONAL TRUST: PAST, PRESENT, AND FUTURE. Academy of Management Review, 32(2), 344-354. doi: Article.
    • Schoorman, F. D., Mayer, R. C., & Davis, J. H. (2007). AN INTEGRATIVE MODEL OF ORGANIZATIONAL TRUST: PAST, PRESENT, AND FUTURE. Academy of Management Review, 32(2), 344-354. doi: Article.
  • 48
    • 70449660793 scopus 로고    scopus 로고
    • Using Explicit Control Processes in Distributed Workflows to Gather Provenance
    • Retrieved February 22, 2009, from
    • Serra da Cruz, S., Chirigati, F., Dahis, R., Campos, M., & Mattoso, M. (2008). Using Explicit Control Processes in Distributed Workflows to Gather Provenance. In Provenance and Annotation of Data and Processes (pp. 186-199). Retrieved February 22, 2009, from http://dx.doi.org/10.1007/978-3-540-89965-5- 20.
    • (2008) Provenance and Annotation of Data and Processes , pp. 186-199
    • Serra da Cruz, S.1    Chirigati, F.2    Dahis, R.3    Campos, M.4    Mattoso, M.5
  • 49
    • 0031481660 scopus 로고    scopus 로고
    • Intervening in the shadow systems of organizations Consulting from a complexity perspective
    • Shaw, P. (1997). Intervening in the shadow systems of organizations Consulting from a complexity perspective. Journal of Organizational Change Management, 10(3), 235.
    • (1997) Journal of Organizational Change Management , vol.10 , Issue.3 , pp. 235
    • Shaw, P.1
  • 51
    • 0022200670 scopus 로고
    • Force field analysis: A new way to evaluate your strategy
    • doi: 10.1016/0024-6301(85)90064-0
    • Thomas, J. (1985). Force field analysis: A new way to evaluate your strategy. Long Range Planning, 18(6), 54-59. doi: 10.1016/0024-6301(85)90064-0.
    • (1985) Long Range Planning , vol.18 , Issue.6 , pp. 54-59
    • Thomas, J.1
  • 52
    • 70449678053 scopus 로고    scopus 로고
    • United States. (2007b). Building the Information Sharing Environment: Addressing the Challenges of Implementation: Hearing Before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security, U.S. House of Representatives, One Hundred Ninth Congress, Second Session, May 10, 2006 (p. 27). Washington: U.S. G.P.O.
    • United States. (2007b). Building the Information Sharing Environment: Addressing the Challenges of Implementation: Hearing Before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security, U.S. House of Representatives, One Hundred Ninth Congress, Second Session, May 10, 2006 (p. 27). Washington: U.S. G.P.O.
  • 53
    • 70449662403 scopus 로고    scopus 로고
    • United States. (2007c). Federal Support for Homeland Security Information Sharing: Role of the Information Sharing Program Manager: Hearing Before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security, House of Representatives, One Hundred Ninth Congress, First Session, November 8, 2005 (p. 58). Washington: U.S. G.P.O. Retrieved from http://www.gpoaccess.gov/congress/index.html.
    • United States. (2007c). Federal Support for Homeland Security Information Sharing: Role of the Information Sharing Program Manager: Hearing Before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security, House of Representatives, One Hundred Ninth Congress, First Session, November 8, 2005 (p. 58). Washington: U.S. G.P.O. Retrieved from http://www.gpoaccess.gov/congress/index.html.
  • 54
    • 70449665746 scopus 로고    scopus 로고
    • U.S. Dept. of Justice, Bureau of Justice Statistics (2006). Law Enforcement Management and Administrative Statistics (LEMAS): 2003 Sample Survey of Law Enforcement Agencies [Computer file]. ICPSR04411-v1. Ann Arbor, MI: Inter-university Consortium for Political and Social Research [producer and distributor], 2006.
    • U.S. Dept. of Justice, Bureau of Justice Statistics (2006). Law Enforcement Management and Administrative Statistics (LEMAS): 2003 Sample Survey of Law Enforcement Agencies [Computer file]. ICPSR04411-v1. Ann Arbor, MI: Inter-university Consortium for Political and Social Research [producer and distributor], 2006.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.