Information sharing in intelligence cycle has become a crucial subject in security field. The main objective of this paper is to understand the information sharing and intelligence failure in handling terrorism among the intelligence community. The role of intelligence community is to obtain information, analyses, and process the information for their clients. However, the terrorist attacks still occur resulting from intelligence cycle. Realizing information sharing in intelligence cycle requires efforts from the community.
Ahmed, U., Khalid, N., Ammar, A., & Shah, M. H. (2017). Assessing moderation of employee engagement on the relationship between work discretion, job clarity and business performance in the banking sector of Pakistan. Asian Economic and Financial Review, 7(12), 1197-121. https://doi.org/10.18488/journal.aefr.2017.712.1197.1210
Ahmed, U., Majid, A. H. A., & Zin, M. M. (2016). Moderation of meaningful work on the relationship of supervisor support and coworker support with work engagement. The Journal of Business, Economics, and Environmental Studies (JBEES), 6(3), 15-20.
Aydin, B., & Ozleblebici, Z. (2015). Is Intelligence Cycle Still Viable?? In International Conference on Military and Security Studies-2015 (pp. 1–6). Istanbul.
Best (Jnr), R. A. J. (2011). Intelligence Information: Need-to-Know vs. Need-to-Share. Congressional Research Service. Retrieved from https://www.fas.org/sgp/crs/intel/R41848.pdf
Bickers, P., Hopkins-burns, V., Bennett, A., & Namay, R. (2015). Information sharing by government agencies?: The effect on the integrity of the tax system, 13(1), 183–201.
Brisard, J.-C., & Jackson, K. (2016). The Islamic State’s External Operations and the French-Belgian Nexus. CTC Sentinel, (Nov/Dec), 1–8.
Brunsden, J., Chassany, A. S., & Jones, S. (2016, April 4). Europe’s failure to share intelligence hampers terror fight. Financial Times. Retrieved from https://www.ft.com/content/f9baf7e8-f975-11e5-b3f6-11d5706b613b
Department of Homeland Security. (2017). Homeland Security Information Network (HSIN). Retrieved August 17, 2017, from http://hsin.dhs.gov
Duarte, N. (2007). Unleashing our untapped domestic collection is key to prevention. Naval Postgraduate School.
Finley, J. P. (1994). Nobody likes to be surprised: Intelligence failures. Military Intelligence Professional Bulletin, 20(1), 7–15. Retrieved from http://web.b.ebscohost.com.ezaccess.library.uitm.edu.my/ehost/detail/detail?vid=4&sid=c2c44c49-4525-4339-a9e2-5c876bba233c%40sessionmgr103&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#db=aph&AN=9706170978
Folker, R. D. (2000). Intelligence Analysis in Theater Joint Intelligence Centers: An Experiment in Applying Structured Methods. Intelligence, (January), 45.
George, A. (1979). International violence?: terrorism , surprise , and control. (Y. Evron, Ed.). Jerusalem: Leonard Davis Institute for International Relations, Hebrew University of Jerusalem.
Gookins, A. J. (2008). The Role of Intelligence in Policy Making, 28(1), 65–73. https://doi.org/10.1353/sais.2008.0025
Hollywood, J. S., & Winkelman, Z. (2010). Improving Information-Sharing Across Law Enforcement: Why Can’t We Know? Police Executve Research Forum.
Hurtado, L. A. V. (2016). Colombia and the intelligence cycle in the 21st century , the digital age. University of Tartu.
Johnson, L. K. (2006). A Framework for Strengthening U.S. Intelligence. Yale Journal of International Affairs, 1(2), 116–131.
Johnson, L. K. (2007). Strategic Intelligence. In A. S. Hulnick (Ed.), Strategic Intelligence (Vol. 1–5). Westport: Praeger Security International.
Johnston, R. (2005). Analytic Culture in the US Intelligence Community: An Ethnographic Study. The Center for the Study of Intelligence (Vol. 160). Retrieved from http://scholar.google.com/scholar?q=related:LPH9g5ubT4YJ:scholar.google.com/&hl=en&num=30&as_sdt=1,5%5Cnpapers2://publication/uuid/A603D066-21F1-480D-8EB7-2E9052410D01
Lederman, G. N. (2004). Restructuring the Intelligence Community.
Lucas, J. W. (1995). Organizing the Precidency: the Role of the Director of Central Intelligence, 1947-1977. Gearge Mason University.
Mesmer-magnus, J. R., & Dechurch, L. A. (2009). Information Sharing and Team Performance?: A Meta-Analysis, 94(2), 535–546. https://doi.org/10.1037/a0013773
Yasid, M. A. F. (2016). Peranan Pasukan Cawangan Khas Polis. Sejarah, 25(2), 23–39.
National Security Council. (2017). National Security Council. Retrieved July 26, 2017, from https://www.mkn.gov.my
O’Connell, A. J. (2006). The ar
In-Text Citation: (Mohamed & Yaacob, 2019)
To Cite this Article: Mohamed, S. N. Q. S., & Yaacob, M. (2019). Understanding the Intelligence Failure and Information Sharing in Handling Terrorism among Intelligence Community. International Journal of Academic Research in Business and Social Sciences, 9(9), 1201–1213.
Copyright: © 2019 The Author(s)
Published by Human Resource Management Academic Research Society (www.hrmars.com)
This article is published under the Creative Commons Attribution (CC BY 4.0) license. Anyone may reproduce, distribute, translate and create derivative works of this article (for both commercial and non-commercial purposes), subject to full attribution to the original publication and authors. The full terms of this license may be seen at: http://creativecommons.org/licences/by/4.0/legalcode