Analysis of Intelligence and National Security in Latin America: Bibliometric Analysis

##plugins.themes.bootstrap3.article.main##

Marcelo Pimentel Bernal Jose Carlos Veliz Liliana Lazo

Resumen

Intelligence analysis (IA) consists of the collection, processing and analysis of classified information with the objective of identifying and preventing national security (NS) threats. NS encompasses a wide range of concerns related to sovereignty, homeland defense, and prevention of internal and external threats. While the use of IA in NS is valuable, it may have limitations by focusing on specific aspects and restricting addressing broader needs to ensure NS. This reveals a gap in the comprehensive understanding of the challenges and threats to a country, as the specific focus of IA does not encompass the broad vision needed in the NS. In this regard, bibliometric research was developed in which 416 articles from the Scopus and WOS database were analyzed using the WOSviewer and Biblioshiny tools. It was found that among the most cited authors were Schultze Ulrike and Choo Kim-Knag. In addition, among the most cited sources were the journal Information Visualization and Intelligence and National Security. Also, among the most frequently used keywords were "Intelligent Analysis" and "Artificial Intelligence". It was concluded that the study of AI is in development, the concern of which integrates artificial intelligence and cyber-attack threats

Palabras clave

National Security, Intelligence analysis, Latin America

##plugins.themes.bootstrap3.article.details##

Citas

Abhishek, T., & Srivastava, M. (2021). Mapping the influence of influencer marketing: a bibliometric analysis. Marketing Intelligence & Planning, 39(7), 979–1003. https://doi.org/10.1108/MIP-03-2021-0085
AlRyalat, S., Malkawi, L., & Momani, S. (2019). Comparing Bibliometric Analysis Using PubMed, Scopus, and Web of Science Databases. Journal of Visualized Experiments, 152, 1–18. https://doi.org/10.3791/58494
Baumgartner, H., & Pieters, R. (2003). The Structural Influence of Marketing Journals: A Citation Analysis of the Discipline and its Subareas over Time. Journal of Marketing, 67(2), 123–139. https://doi.org/10.1509/jmkg.67.2.123.18610
Blum, D., & Paté-Cornell, E. (2016). Probabilistic Warnings in National Security Crises: Pearl Harbor Revisited. Decision Analysis, 13(1), 1–25. https://doi.org/10.1287/deca.2015.0321
Bose, R. (2008). Competitive intelligence process and tools for intelligence analysis. Industrial Management & Data Systems, 108(4), 510–528. https://doi.org/10.1108/02635570810868362
Buhalis, D., & Leung, R. (2018). Smart hospitality—Interconnectivity and interoperability towards an ecosystem. International Journal of Hospitality Management, 71, 41–50. https://doi.org/10.1016/j.ijhm.2017.11.011
Callon, M., Courtial, J., & Laville, F. (1991). Co-word analysis as a tool for describing the network of interactions between basic and technological research: The case of polymer chemsitry. Scientometrics, 22(1), 155–205. https://doi.org/10.1007/BF02019280
Cobo, M., López-Herrera, A., Herrera-Viedma, E., & Herrera, F. (2011). An approach for detecting, quantifying, and visualizing the evolution of a research field: A practical application to the Fuzzy Sets Theory field. Journal of Informetrics, 5(1), 146–166. https://doi.org/10.1016/j.joi.2010.10.002
De Vergara, E. (2009). Las diferencias conceptuales entre seguridad y defensa. Instituto de Estudios Estratégicos de Buenos Aires–IEEBA.
Devanny, J., Dover, R., Goodman, M., & Omand, D. (2018). Why the British Government Must Invest in the Next Generation of Intelligence Analysts. The RUSI Journal, 163(6), 78–89. https://doi.org/10.1080/03071847.2018.1562027
Donthu, N., Kumar, S., Mukherjee, D., Pandey, N., & Lim, W. (2021). How to conduct a bibliometric analysis: An overview and guidelines. Journal of Business Research, 133, 285–296. https://doi.org/10.1016/j.jbusres.2021.04.070
Estévez, E. (2022). Desafíos actuales de inteligencia en América Latina: legados, democratización, prioridades y dimensiones estratégica y criminal. Revista de La Escuela Nacional de Inteligencia, 67–96. https://doi.org/10.58752/OMFMP22O
Jasso, L. (2017). Seguridad nacional, inteligencia militar y acceso a la información en México/ National security, military intelligence and access to information in Mexico. Revista Latinoamericana de Estudios de Seguridad, 21, 140–156. https://doi.org/10.17141/urvio.21.2017.2931
Koschade, S. (2006). A Social Network Analysis of Jemaah Islamiyah: The Applications to Counterterrorism and Intelligence. Studies in Conflict & Terrorism, 29(6), 559–575. https://doi.org/10.1080/10576100600798418
Mandel, D., & Irwin, D. (2021). Uncertainty, Intelligence, and National Security Decisionmaking. International Journal of Intelligence and CounterIntelligence, 34(3), 558–582. https://doi.org/10.1080/08850607.2020.1809056
Mandel, D., & Tetlock, P. (2018). Correcting Judgment Correctives in National Security Intelligence. Frontiers in Psychology, 9, 1–5. https://doi.org/10.3389/fpsyg.2018.02640
Marrin, S. (2007). Intelligence Analysis Theory: Explaining and Predicting Analytic Responsibilities. Intelligence and National Security, 22(6), 821–846. https://doi.org/10.1080/02684520701770634
Marrin, S. (2011). The 9/11 Terrorist Attacks: A Failure of Policy Not Strategic Intelligence Analysis. Intelligence and National Security, 26(2–3), 182–202. https://doi.org/10.1080/02684527.2011.559140
Marrin, S. (2017). Why strategic intelligence analysis has limited influence on American foreign policy. Intelligence and National Security, 32(6), 725–742. https://doi.org/10.1080/02684527.2016.1275139
Moral-Muñoz, J., Herrera-Viedma, E., Santisteban-Espejo, A., & Cobo, M. J. (2020). Software tools for conducting bibliometric analysis in science: An up-to-date review. El Profesional de La Información, 29(1), 1–20. https://doi.org/10.3145/epi.2020.ene.03
Moran, C., Burton, J., & Christou, G. (2023). The US Intelligence Community, Global Security, and AI: From Secret Intelligence to Smart Spying. Journal of Global Security Studies, 8(2), 1–14. https://doi.org/10.1093/jogss/ogad005
Parra-Martinez, F., Desmet, O., & Wai, J. (2023). The Evolution of Intelligence: Analysis of the Journal of Intelligence and Intelligence. Journal of Intelligence, 11(2), 35–52. https://doi.org/10.3390/jintelligence11020035
Phythian, M. (2017). Intelligence analysis and social science methods: exploring the potential for and possible limits of mutual learning. Intelligence and National Security, 32(5), 600–612. https://doi.org/10.1080/02684527.2017.1310972
Picard, R., Vyzas, E., & Healey, J. (2001). Toward machine emotional intelligence: analysis of affective physiological state. IEEE Transactions on Pattern Analysis and Machine Intelligence, 23(10), 1175–1191. https://doi.org/10.1109/34.954607
Qi, Q., Chen, G., Ye, F., Lin, Z., & Liu, Q. (2022). Intelligence Analysis of Crime of Helping Cybercrime Delinquency Based on Knowledge Ggraph. 2022 IEEE 5th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC), 690–695. https://doi.org/10.1109/IMCEC55388.2022.10019848
Quick, D., & Choo, K.-K. (2014). Impacts of increasing volume of digital forensic data: A survey and future research challenges. Digital Investigation, 11(4), 273–294. https://doi.org/10.1016/j.diin.2014.09.002
Ramos-Rodríguez, A.-R., & Ruíz-Navarro, J. (2004). Changes in the intellectual structure of strategic management research: a bibliometric study of theStrategic Management Journal, 1980–2000. Strategic Management Journal, 25(10), 981–1004. https://doi.org/10.1002/smj.397
Riehmann, P., Hanfler, M., & Froehlich, B. (2005). Interactive Sankey diagrams. IEEE Symposium on Information Visualization, 2005. INFOVIS 2005., 233–240. https://doi.org/10.1109/INFVIS.2005.1532152
Robles, P., & Mallinson, D. (2023). Artificial intelligence technology, public trust, and effective governance. Review of Policy Research, 1–18. https://doi.org/10.1111/ropr.12555
Romero, S. (2019). Inteligencia artificial como herramienta estratégica y seguridad para defensa de los Estados. Revista de La Escuela Superior de Guerra Naval, 16(1), 1–15. http://portal.amelica.org/ameli/jatsRepo/262/2621457007/html/index.html
Schultze, U. (2000). A Confessional Account of an Ethnography about Knowledge Work. MIS Quarterly, 24(1), 3. https://doi.org/10.2307/3250978
Schultze, U., & Boland, R. (2000). Knowledge management technology and the reproduction of knowledge work practices. The Journal of Strategic Information Systems, 9(2–3), 193–212. https://doi.org/10.1016/S0963-8687(00)00043-3
Serin, G., Sener, B., Ozbayoglu, A., & Unver, H. (2020). Review of tool condition monitoring in machining and opportunities for deep learning. The International Journal of Advanced Manufacturing Technology, 109(3–4), 953–974. https://doi.org/10.1007/s00170-020-05449-w
Singh-Manoux, A., Hillsdon, M., Brunner, E., & Marmot, M. (2005). Effects of Physical Activity on Cognitive Functioning in Middle Age: Evidence From the Whitehall II Prospective Cohort Study. American Journal of Public Health, 95(12), 2252–2258. https://doi.org/10.2105/AJPH.2004.055574
Srivastava, M., & Sivaramakrishnan, S. (2021). Mapping the themes and intellectual structure of customer engagement: a bibliometric analysis. Marketing Intelligence & Planning, 39(5), 702–727. 10.1108/MIP-11-2020- 0483
Stasko, J., Gorg, C., Liu, Z., & Singhal, K. (2007). Jigsaw: Supporting Investigative Analysis through Interactive Visualization. 2007 IEEE Symposium on Visual Analytics Science and Technology, 131–138. https://doi.org/10.1109/VAST.2007.4389006
Ugarte, J. (2016). Actividad de inteligencia en América Latina: características, fortalezas, debilidades y perspectivas de guturo. Revista Política y Estrategia, 127, 37–74. https://dialnet.unirioja.es/servlet/articulo?codigo=5753331
Vargas, A. (2008). ¿Cómo entender la seguridad y la defensa? Democracia, Seguridad y Defensa , 29, 2–4.
Vogel, K., Reid, G., Kampe, C., & Jones, P. (2021). The impact of AI on intelligence analysis: tackling issues of collaboration, algorithmic transparency, accountability, and management. Intelligence and National Security, 36(6), 827–848. https://doi.org/10.1080/02684527.2021.1946952