Achieving Actionable Intelligence: Legacy Information Technology Systems and the Improvised Explosive Device Global Threat

dc.contributor.authorPlemmons, Paul R. Jr.
dc.date.accessioned2016-12-06T18:55:10Z
dc.date.available2016-12-06T18:55:10Z
dc.date.issued2016-05
dc.description43 Pagesen_US
dc.description.abstractThe expanding use of the improvised explosive device (IED) around the globe requires Department of Defense (DoD) government and military organizational leaders and associated support staff to focus on achieving actionable intelligence aimed at successfully countering this enduring and evolving threat. This annotated bibliography focuses on literature published between 2012 and 2016 and discusses the use of decentralized legacy information technologies by the DoD and the impact on gathering, analyzing and sharing of critical IED exploitation data.en_US
dc.identifier.urihttps://hdl.handle.net/1794/21967
dc.language.isoen_USen_US
dc.publisherUOen_US
dc.rightsCreative Commons BY-NC-ND 4.0-USen_US
dc.subjectActionable intelligenceen_US
dc.subjectImprovised explosive device (IED)en_US
dc.subjectCounter-improvised explosive device (C-IED) operationsen_US
dc.subjectLegacy information systemsen_US
dc.subjectDepartment of Defense (DoD)en_US
dc.subjectExploitationen_US
dc.subjectIntelligence dataen_US
dc.titleAchieving Actionable Intelligence: Legacy Information Technology Systems and the Improvised Explosive Device Global Threaten_US
dc.typeTerminal Projecten_US

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Plemmons2016.pdf
Size:
520.18 KB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
Name:
license.txt
Size:
2.23 KB
Format:
Item-specific license agreed upon to submission
Description: