time in its most basic form. Symbols and signal readings are recorded, collected, and
saved as data. The components of communication-text or verbal, numbers, diagrams,
photos, and video-are always included in the symbols. Sensor or sensory readings of
light, sound, smell, taste, and touch are examples of signals. Data is simply a
representation of fundamental meaning stored as symbols. According to Liew (2007), the
primary goal of data is to record activities or situations in an effort to capture the truth
or the actual occurrence. It captures a moment in time. That occurrence could be a
discussion, a deal, or an interaction. Data is a collection of results from those events that
are quantifiably documented and then used to analyse security conditions. They are
unquestionably expressions of fact.
According to Hoppe, Seising, Nurnberger, and Wenzel (2011), data is provided through
straightforward sign and symbol sequences. In a similar spirit, Bierly, Kessler, and
Christensen (2000) observe that, data are representations whose meanings depend on
the representation system, including symbols and language utilised. Information is a
straightforward method of combining data. When you incorporate data from an event
into a story, you will have information rather than just data. The context of the data is
what enables you to provide simple answers. Information is created as a result of the
responses to those questions. It ultimately comes down to transforming data points into
information that alerts you to security concerns. Intelligence goes a step farther and
makes decisions based on the data.
Intelligence involves the capacity to perceive the environment, form judgments, and
manage behaviour. Higher levels of intelligence may include the capacity for object and
event recognition, information presentation using a world model, and future planning
reasoning. Advanced forms of intelligence have the ability to see, comprehend, make
sensible decisions, and act successfully in a wide range of situations in order to live,
thrive, and reproduce in a challenging and frequently hostile environment (Albus, 1991;
Kekela, & Jana, 2019; McCall, Bowers, & Westaway, 2019).
However, intelligence is the timely and accurate dissemination of information, and
accurate knowledge before a crisis occurs is a vital asset. Such proactive intelligence
enables the close monitoring of developing events and the proactive formulation of
adaptive tactics based on current observations in the field of intelligence and early
warning. Giambastiani and Jones (2004) note that intelligence failure occurs when
intelligence agencies provide inaccurate or misleading information or when actionable
intelligence is not obtained on time. Intelligence collection, analysis, dissemination, and
sharing will be critical in reducing the decision time between recognizing a security risk
and executing the desired course of action. The frequency and scope of crimes are
evolving along with the rest of the world. The procedure of obtaining intelligence must
constantly be improved due to the shifting patterns of crimes. The five steps of the
intelligence cycle, which has also historically been used to describe the intelligence
process, include planning and direction, collecting, processing, analysis, and
dissemination.
Intelligence systems are information networks that provide useful intelligence for national
security. They are built on data, information, and intelligence, involving people,
processes, and technologies. The intelligence doctrine, which includes concepts like