Scientific Information Research
Keywords
information chain, security intelligence, intelligence process, intelligence operations, security situation, se‐ curity incidents, security maintenance
Abstract
[Purpose/significance]The security intelligence process is the fundamental path for intelligence to support security governance and decision-making. The incompleteness and even deceptive nature of the information relied up‐ on in security intelligence activities, as well as the concealment and adversarial nature of security issues, determine significant differences in the scientific perspective and methodology of constructing security intelligence processes compared to other intelligence processes. [Method/process]Starting from the analysis of existing problems in the secu‐ rity intelligence process and optimization suggestions, this article constructs a security intelligence process model based on the conceptual model of the intelligence process, based on the information chain theory. [Result/conclusion] The constructed security intelligence process model emphasizes intelligence requirement management based on secu‐ rity event systems, strategic intelligence research oriented towards conceptualization of security event systems, and op‐ erational mechanisms such as the integration of intelligence business flow and security information flow. In addition, this article provides strategies for identifying intelligence requirements, evaluating the reliability of information sourc‐ es, iterating and upgrading information collection, understanding the meaning of information, protecting intelligence activities, and identifying proactive defense and opportunity creation, among other key questions of the security intelli‐ gence process.
Digital Object Identifier (DOI)
10.19809/j.cnki.kjqbyj.2025.03.012
Recommended Citation
YANG, Guoli
(2025)
"Research on the Construction and 0perating of Security Intelligence
Process Model,"
Scientific Information Research: Vol. 7:
Iss.
3, Article 12.
DOI: 10.19809/j.cnki.kjqbyj.2025.03.012
Available at:
https://eng.kjqbyj.com/journal/vol7/iss3/12