ENHANCING INTELLIGENCE SUCCESS: DATA CHARACTERIZATION Francine Forney, Senior Management Consultant, Fuel Consulting, LLC May 2013
|
|
- Denis Foster
- 7 years ago
- Views:
Transcription
1 ENHANCING INTELLIGENCE SUCCESS: DATA CHARACTERIZATION, Fuel Consulting, LLC May 2013 DATA AND ANALYSIS INTERACTION Understanding the content, accuracy, source, and completeness of data is critical to the successful analysis of intelligence information. Without a comprehensive and systematic documentation of all relevant data, an analyst will be incapable of creating effective search strategies and making accurate intelligence assessments. This problem is compounded exponentially by the use of automated tools and techniques, which essentially treat all data as equal. Although data sets are the foundation of all intelligence analysis, they are the least understood and the most overlooked aspects of the process. In part this phenomenon could be attributed to the assumption that all data acquired though legitimate sources are essentially the same, albeit influenced by bias due to the analyst s individual experience and knowledge of specific intelligence disciplines. The human tendency to favor that which we know and understand affects the intelligence analyst's choices at each stage of his or her analysis and therefore may impact the accuracy of the overall assessment. This paper presents insights regarding ways to improve data characterization and thus the accuracy of intelligence analysis. DATA: THE BEGINNING Data characterization begins long before the analyst even sees the data or any tool manipulates it: it starts at the source and continues throughout the transmission, ingest, formatting, standardization, processing, documentation, and methods of manipulation, presentation,
2 search, and analysis. It involves a myriad of skill disciplines, including those of the intelligence collection manager, data manager, software engineer, extract-transform-load technician, hardware engineer or architect, documentation specialist, infrastructure manager, analytic tools and techniques implementer, computer support specialist, and last but not least intelligence analyst. The multiple influences on the data set before the analyst even sees it are, in fact, part of the problem; there is an assumption that the analyst need only define his or her analytic requirements and tools and thereafter other specialists need only meet those specifications using best judgment. Understanding data is like analysis, however it is an interactive process. It is impossible to successfully define data requirements without analyzing and understanding the variety of potential sources of similar if not identical data, particularly given the ever-expanding worldwide global communications network infrastructure. As with data characterization, this is not a static process. Rather, it is an iterative process that involves all the various individuals who touch that data or make any decision that impacts the data available to the analyst. DATA CHARACTERIZATION PROCESS PHASES The first phase of data characterization involves determining what detailed information should be systematically retained for all acquired intelligence data. As noted, this is not an incidental phase, and it may be dynamic over time as techniques evolve and knowledge is gained about the value of specific data and relational correlations across data sets. This data documentation phase must include the participation of end users of that data--the intelligence analysts as well as the technical specialists. Also important is ensuring that the skill sets of the intelligence 2
3 analysts involved are representative of the types of analysis performed by the organization: current threat analysis; strategic or long term trend analysis; combat support; situational awareness or alerts for newest information; target watch listing; geo-locational or geospatial support; etc. Each organization will have a subset of these types of analytic functions, and while there will be an overlap of some data characterization documentation requirements, there will also be some of unique value for that function. As a result, the priority of what is most important will change accordingly. Examples of data documentation that should be retained include the following: date of data collection and date of data delivery source of data confidence factor for data source (direct observation, second or third hand, analytic assumption, document-derived, collection bias, etc.) dataset completeness size of data set data attributes contained in data (phone numbers, names, passport serials, etc.) standardization of specific data fields and if so, which standard employed countries or nationalities represented and quantities of each attribute specific restrictions on data handling (time limitations, U.S. person, etc.) classification of data analytic category of data (travel, financial, identity, biometric, etc.) potential redundancy of data source frequency of data delivery (live streaming, daily, weekly, etc.) any observed operational, system, or processing issues relevant to analysts graphical displays of data to enhance analyst s ability to grasp characteristics of large data volume quickly (heat maps, bar charts of geographical coverage, etc.) any other information that would help the analyst to accurately interpret data. 3
4 The second, but non-sequential, phase of data characterization consists of determining how the data may be manipulated by the analyst as well as what tool or technique will be employed to assist the analyst in deriving knowledge from the data. Ensuring that the data is being processed and maintained in a way that extracts the maximum intelligence value requires an understanding of how an analyst will search data repositories, correlate key data attributes across diverse data sets, identify new, timely data facts, or create relational linkages among a variety of attributes or data sets. While there are no guarantees that important intelligence facts will not be missed, the probability that intelligence assessments will be incomplete increases if data characterization is not comprehensive or if analytic functions and techniques and not tailored to the data. Methods of data manipulation include both manual and automated tools and techniques. An analyst manually creates a search query by determining how to structure a question to retrieve a subset of relevant data needed to contribute to an intelligence assessment. While the tool may be composed of algorithms that automatically process a search query, it is the analyst who must build that query to return all the relevant data. That process could include using variations in the spelling of a name or the use of wild card symbols. Some tools may return name spelling variations or minor misspelling errors via the use of fuzzy logic, but others will not. Consequently, it is important when first ingesting and processing data sets that contain personal or place names to determine how name variations will be handled and how much automation will be built into the capabilities. 4
5 Another important factor in these decisions is having a sound understanding of the level of risk acceptable to the organization. Is it critical to not miss any possibilities (false negatives) or more important to not have too many false positives when returning search query results to the analyst? For example, the former could result in missing a potential terrorist given a name misspelling, while the latter could return too many possible terrorist candidates for an analyst to sort through. Each judgment regarding risk has an associated cost, and these must be balanced in the data characterization and processing stages. An example of automated tool manipulation is the use of entity resolution tools to correlate similar attributes across diverse data sets. In this instance, the effectiveness of the correlation will be partially dependent on the standardization employed for the identical attributes incorporated into different data sets. Standardization or normalization should be as universal as possible and established when data is ingested and formatted. While software may compensate for some variations, it is best to establish normalization criteria as early as feasible to enhance the effectiveness of entity resolution tools; otherwise, legitimate correlations could be precluded (variation in calendars or formats of date events, for example) when trying to identify a set of activities within a set data timeframe. The use of relational tools will also pose some challenges for data specialists, not least of which is having some understanding of the reliability of the source of the data. Although it is optimal to have those closest to the actual data collection determine the likely validity of the "raw" data facts, too frequently this judgment is not made by the intelligence collector for a variety of reasons. Consequently, the analyst is left to sort out the validity of relationships made by 5
6 automated tools and deal with any obvious conflicts. An example is variations in a passport number; although only one is likely valid for the same country and date; in such a circumstance, knowing that one number may have been garbled in a long line of communications while another is derived from an actual scanned document is important. Finding ways to flag such data with accuracy indicators is critical to the determining the confidence level the analytic conclusions deserve. This principle also applies to the history of the data: an analyst may need to know whether the data are "raw"--not previously manipulated by tools, techniques, or other analysts or instead derived from either automatically created relationships (tool derived) or other analyst's assertions. The more this type of information can be tracked along with the data, the more likely the analyst will be able to make accurate intelligence assessments. KNOWLEDGE BASE As noted, analytic or tool-based assertions are different from actual "raw" data. The latter is what is generally subjected to data characterization; the former are derived data or intelligence assertions. These too should be stored given their value for other analysts, particularly when the analyst is looking for "non-obvious" personal or organizational relationships (connecting the dots), long term trend analysis, historical context, or a myriad of other analytic functions. Such derived data facts or assertions should be maintained in a knowledge data base that is as widely accessible as possible given clearances, accesses, and analytic roles across a broad spectrum of intelligence and law enforcement organizations. The ability of analysts to build on the knowledge acquired by their compatriots is essential to advancing analytic success against a highly dynamic and decentralized set of evolving intelligence targets. 6
7 CONCLUDING OBSERVATIONS Comprehensive data characterization for raw data combined with knowledge bases for derived data assertions will continue to grow in importance as data proliferate and analytic resources are constrained by budgets and relevant experience. Understanding and making sense of all that data ultimately contributes to the effectiveness of the analytic process. Data characterization is not the most exciting aspect of the analytic cycle, nor is it all that is necessary, but it is the basic foundation for all that is to come. The ongoing challenge in the intelligence world is not just to acquire all the relevant information, but to manage and track it once it is acquired, because we all understand the danger in potentially possessing the "golden nuggets" but being unable to find them or use them effectively to get the answers critical to thwarting national security threats and navigating dangerous environments. Data characterization alone is not enough, but it is a huge step forward and one that we cannot afford to minimize or overlook. 7
Data Discovery, Analytics, and the Enterprise Data Hub
Data Discovery, Analytics, and the Enterprise Data Hub Version: 101 Table of Contents Summary 3 Used Data and Limitations of Legacy Analytic Architecture 3 The Meaning of Data Discovery & Analytics 4 Machine
More informationHow To Create An Insight Analysis For Cyber Security
IBM i2 Enterprise Insight Analysis for Cyber Analysis Protect your organization with cyber intelligence Highlights Quickly identify threats, threat actors and hidden connections with multidimensional analytics
More informationINTRUSION PREVENTION AND EXPERT SYSTEMS
INTRUSION PREVENTION AND EXPERT SYSTEMS By Avi Chesla avic@v-secure.com Introduction Over the past few years, the market has developed new expectations from the security industry, especially from the intrusion
More information3D Interactive Information Visualization: Guidelines from experience and analysis of applications
3D Interactive Information Visualization: Guidelines from experience and analysis of applications Richard Brath Visible Decisions Inc., 200 Front St. W. #2203, Toronto, Canada, rbrath@vdi.com 1. EXPERT
More informationBusiness Case Outsourcing Information Security: The Benefits of a Managed Security Service
Business Case Outsourcing Information Security: The Benefits of a Managed Security Service seccuris.com (866) 644-8442 Contents Introduction... 3 Full- Time Experts vs. a Part- Time In- House Staff...
More informationTest Automation Architectures: Planning for Test Automation
Test Automation Architectures: Planning for Test Automation Douglas Hoffman Software Quality Methods, LLC. 24646 Heather Heights Place Saratoga, California 95070-9710 Phone 408-741-4830 Fax 408-867-4550
More informationCHAPTER SIX DATA. Business Intelligence. 2011 The McGraw-Hill Companies, All Rights Reserved
CHAPTER SIX DATA Business Intelligence 2011 The McGraw-Hill Companies, All Rights Reserved 2 CHAPTER OVERVIEW SECTION 6.1 Data, Information, Databases The Business Benefits of High-Quality Information
More information2 SYSTEM DESCRIPTION TECHNIQUES
2 SYSTEM DESCRIPTION TECHNIQUES 2.1 INTRODUCTION Graphical representation of any process is always better and more meaningful than its representation in words. Moreover, it is very difficult to arrange
More informationHow In-Memory Data Grids Can Analyze Fast-Changing Data in Real Time
SCALEOUT SOFTWARE How In-Memory Data Grids Can Analyze Fast-Changing Data in Real Time by Dr. William Bain and Dr. Mikhail Sobolev, ScaleOut Software, Inc. 2012 ScaleOut Software, Inc. 12/27/2012 T wenty-first
More informationStrategic HR Partner Assessment (SHRPA) Feedback Results
Strategic HR Partner Assessment (SHRPA) Feedback Results January 04 Copyright 997-04 Assessment Plus, Inc. Introduction This report is divided into four sections: Part I, The SHRPA TM Model, explains how
More informationIFS-8000 V2.0 INFORMATION FUSION SYSTEM
IFS-8000 V2.0 INFORMATION FUSION SYSTEM IFS-8000 V2.0 Overview IFS-8000 v2.0 is a flexible, scalable and modular IT system to support the processes of aggregation of information from intercepts to intelligence
More informationInputs and Outputs of the Intelligence Cycle: a highway to shared definitions and a knowledge base.
Inputs and Outputs of the Intelligence Cycle: a highway to shared definitions and a knowledge base. Introduction Gonçalo João, School of Economics and Management My first contact with competitive intelligence
More informationRoadmap for the Development of a Human Resources Management Information System for the Ukrainian civil service
1 Roadmap for the Development of a Human Resources Management Information System for the Ukrainian civil service Purpose of Presentation 2 To seek input on the draft document Roadmap for a Human Resources
More informationFoundations of Business Intelligence: Databases and Information Management
Foundations of Business Intelligence: Databases and Information Management Problem: HP s numerous systems unable to deliver the information needed for a complete picture of business operations, lack of
More informationBest Practices for Architecting Taxonomy and Metadata in an Open Source Environment
Best Practices for Architecting Taxonomy and Metadata in an Open Source Environment Zach Wahl President and Chief Executive Officer Enterprise Knowledge zwahl@enterprise-knowledge.com Twitter @EKConsulting
More informationFundamentals of Measurements
Objective Software Project Measurements Slide 1 Fundamentals of Measurements Educational Objective: To review the fundamentals of software measurement, to illustrate that measurement plays a central role
More informationData Management Implementation Plan
Appendix 8.H Data Management Implementation Plan Prepared by Vikram Vyas CRESP-Amchitka Data Management Component 1. INTRODUCTION... 2 1.1. OBJECTIVES AND SCOPE... 2 2. DATA REPORTING CONVENTIONS... 2
More informationEnterprise Resource Planning Analysis of Business Intelligence & Emergence of Mining Objects
Enterprise Resource Planning Analysis of Business Intelligence & Emergence of Mining Objects Abstract: Build a model to investigate system and discovering relations that connect variables in a database
More informationDelivering Smart Answers!
Companion for SharePoint Topic Analyst Companion for SharePoint All Your Information Enterprise-ready Enrich SharePoint, your central place for document and workflow management, not only with an improved
More informationPosition Classification Standard for Management and Program Clerical and Assistance Series, GS-0344
Position Classification Standard for Management and Program Clerical and Assistance Series, GS-0344 Table of Contents SERIES DEFINITION... 2 EXCLUSIONS... 2 OCCUPATIONAL INFORMATION... 3 TITLES... 6 EVALUATING
More informationHealthcare, transportation,
Smart IT Argus456 Dreamstime.com From Data to Decisions: A Value Chain for Big Data H. Gilbert Miller and Peter Mork, Noblis Healthcare, transportation, finance, energy and resource conservation, environmental
More informationINTERNATIONAL FRAMEWORK FOR ASSURANCE ENGAGEMENTS CONTENTS
INTERNATIONAL FOR ASSURANCE ENGAGEMENTS (Effective for assurance reports issued on or after January 1, 2005) CONTENTS Paragraph Introduction... 1 6 Definition and Objective of an Assurance Engagement...
More informationBottomline Healthcare. Privacy and Data Security
Bottomline Healthcare Privacy and Data Security Start Page 2 Table of Contents 03 The Patient Privacy Challenge 05 Bottomline Healthcare Privacy and Data Security 07 How it Works Features Data Capture
More informationForward Thinking for Tomorrow s Projects Requirements for Business Analytics
Seilevel Whitepaper Forward Thinking for Tomorrow s Projects Requirements for Business Analytics By: Joy Beatty, VP of Research & Development & Karl Wiegers, Founder Process Impact We are seeing a change
More informationWhite Paper April 2006
White Paper April 2006 Table of Contents 1. Executive Summary...4 1.1 Scorecards...4 1.2 Alerts...4 1.3 Data Collection Agents...4 1.4 Self Tuning Caching System...4 2. Business Intelligence Model...5
More informationExhibit F. VA-130620-CAI - Staff Aug Job Titles and Descriptions Effective 2015
Applications... 3 1. Programmer Analyst... 3 2. Programmer... 5 3. Software Test Analyst... 6 4. Technical Writer... 9 5. Business Analyst... 10 6. System Analyst... 12 7. Software Solutions Architect...
More informationBusiness Analytics for the Business User Thomas H. Davenport
Business Analytics for the Business User Thomas H. Davenport Many organizations are embracing business analytics as their processes and decisions become more data-intensive and require optimization. Successful
More informationRealize That Big Security Data Is Not Big Security Nor Big Intelligence
G00245789 Realize That Big Security Data Is Not Big Security Nor Big Intelligence Published: 19 April 2013 Analyst(s): Joseph Feiman Security intelligence's ultimate objective, enterprise protection, is
More informationMachine Data Analytics with Sumo Logic
Machine Data Analytics with Sumo Logic A Sumo Logic White Paper Introduction Today, organizations generate more data in ten minutes than they did during the entire year in 2003. This exponential growth
More informationAgile Manufacturing for ALUMINIUM SMELTERS
Agile Manufacturing for ALUMINIUM SMELTERS White Paper This White Paper describes how Advanced Information Management and Planning & Scheduling solutions for Aluminium Smelters can transform production
More informationAn ESRI White Paper May 2007 Mobile GIS for Homeland Security
An ESRI White Paper May 2007 Mobile GIS for Homeland Security ESRI 380 New York St., Redlands, CA 92373-8100 USA TEL 909-793-2853 FAX 909-793-5953 E-MAIL info@esri.com WEB www.esri.com Copyright 2007 ESRI
More informationTax data analytics A new era for tax planning and compliance
Tax data analytics A new era for tax planning and compliance 1 Like other business functions, tax departments face increasing demand to operate more efficiently. At the same time, expectations are growing
More informationData quality and metadata
Chapter IX. Data quality and metadata This draft is based on the text adopted by the UN Statistical Commission for purposes of international recommendations for industrial and distributive trade statistics.
More informationAN INTRODUCTION TO THE GLOBAL DOCUMENT TYPE IDENTIFIER (GDTI) TABLE OF CONTENTS
TABLE OF CONTENTS What Is a Global Document Type Identifier?... 3 What Is a GDTI Used For?... 3 Key Attributes of the GDTI... 3 Business Benefits of Using GDTIs... 4 How Is the GDTI Formed?... 4 Frequently
More informationIBM SPSS Direct Marketing
IBM Software IBM SPSS Statistics 19 IBM SPSS Direct Marketing Understand your customers and improve marketing campaigns Highlights With IBM SPSS Direct Marketing, you can: Understand your customers in
More informationIntroduction. A. Bellaachia Page: 1
Introduction 1. Objectives... 3 2. What is Data Mining?... 4 3. Knowledge Discovery Process... 5 4. KD Process Example... 7 5. Typical Data Mining Architecture... 8 6. Database vs. Data Mining... 9 7.
More informationShort-Term Forecasting in Retail Energy Markets
Itron White Paper Energy Forecasting Short-Term Forecasting in Retail Energy Markets Frank A. Monforte, Ph.D Director, Itron Forecasting 2006, Itron Inc. All rights reserved. 1 Introduction 4 Forecasting
More informationWhite Paper. Version 1.2 May 2015 RAID Incorporated
White Paper Version 1.2 May 2015 RAID Incorporated Introduction The abundance of Big Data, structured, partially-structured and unstructured massive datasets, which are too large to be processed effectively
More informationUSING DATA DISCOVERY TO MANAGE AND MITIGATE RISK: INSIGHT IS EVERYONE S JOB
USING DATA DISCOVERY TO MANAGE AND MITIGATE RISK: INSIGHT IS EVERYONE S JOB If you manage risk in your organization, you re probably surrounded by paper right now. After all, you need reports to help mitigate
More informationDATA MINING TECHNOLOGY. Keywords: data mining, data warehouse, knowledge discovery, OLAP, OLAM.
DATA MINING TECHNOLOGY Georgiana Marin 1 Abstract In terms of data processing, classical statistical models are restrictive; it requires hypotheses, the knowledge and experience of specialists, equations,
More information<no narration for this slide>
1 2 The standard narration text is : After completing this lesson, you will be able to: < > SAP Visual Intelligence is our latest innovation
More informationBest Practices in Data Mining. Executive Summary
Executive Summary Prepared by: Database & Marketing Technology Council Authors: Richard Boire, Paul Tyndall, Greg Carriere, Rob Champion Released: August 2003 Executive Summary Canadian marketers have
More informationUSING LOGISTIC REGRESSION TO PREDICT CUSTOMER RETENTION. Andrew H. Karp Sierra Information Services, Inc. San Francisco, California USA
USING LOGISTIC REGRESSION TO PREDICT CUSTOMER RETENTION Andrew H. Karp Sierra Information Services, Inc. San Francisco, California USA Logistic regression is an increasingly popular statistical technique
More informationCONTEXT AWARE CONTENT MARKETING
CONTEXT AWARE CONTENT MARKETING FOUR STEPS TO THE FUTURE OF CONTENT, CONTEXT AND MARKETING SUCCESS Introduction Managing, delivering and consuming web content has changed. Yes, again. The universe of options
More informationWhat is Windows Intune? The Windows Intune Administrator Console. System Overview
What is Windows Intune? Windows Intune helps you manage and secure computers in your environment through a combination of Windows cloud services and upgrade licensing. Windows Intune delivers cloud-based
More informationCOUNTY OF LOS ANGELES CHIEF INFORMATION OFFICE 500 West Temple Street 493 Kenneth Hahn Hall of Administration Los Angeles, CA 90012
COUNTY OF LOS ANGELES CHIEF INFORMATION OFFICE 500 West Temple Street 493 Kenneth Hahn Hall of Administration Los Angeles, CA 90012 RICHARD SANCHEZ ACTING CHIEF INFORMATION OFFICER Telephone: (213) 974-2008
More informationThreat intelligence visibility the way forward. Mike Adler, Senior Product Manager Assure Threat Intelligence
Threat intelligence visibility the way forward Mike Adler, Senior Product Manager Assure Threat Intelligence The modern challenge Today, organisations worldwide need to protect themselves against a growing
More informationAddressing the Challenges of Data Governance
Debbie Schmidt FIS Consulting Services www.fisglobal.com Executive Summary Addressing the Challenges of Sound bank management ceases to exist without reliable, accurate information. This paper will explore
More informationExtend Table Lens for High-Dimensional Data Visualization and Classification Mining
Extend Table Lens for High-Dimensional Data Visualization and Classification Mining CPSC 533c, Information Visualization Course Project, Term 2 2003 Fengdong Du fdu@cs.ubc.ca University of British Columbia
More informationBIM. the way we see it. Mastering Big Data. Why taking control of the little things matters when looking at the big picture
Mastering Big Data Why taking control of the little things matters when looking at the big picture 2 Big Data represents a big opportunity and a big reality Many industry analysts and advisors are looking
More informationIntroduction to Data Mining
Introduction to Data Mining Jay Urbain Credits: Nazli Goharian & David Grossman @ IIT Outline Introduction Data Pre-processing Data Mining Algorithms Naïve Bayes Decision Tree Neural Network Association
More informationSocial Media Monitoring, Planning and Delivery
Social Media Monitoring, Planning and Delivery G-CLOUD 4 SERVICES September 2013 V2.0 Contents 1. Service Overview... 3 2. G-Cloud Compliance... 12 Page 2 of 12 1. Service Overview Introduction CDS provide
More informationInternational Journal of Advanced Engineering Research and Applications (IJAERA) ISSN: 2454-2377 Vol. 1, Issue 6, October 2015. Big Data and Hadoop
ISSN: 2454-2377, October 2015 Big Data and Hadoop Simmi Bagga 1 Satinder Kaur 2 1 Assistant Professor, Sant Hira Dass Kanya MahaVidyalaya, Kala Sanghian, Distt Kpt. INDIA E-mail: simmibagga12@gmail.com
More informationAppendix B Data Quality Dimensions
Appendix B Data Quality Dimensions Purpose Dimensions of data quality are fundamental to understanding how to improve data. This appendix summarizes, in chronological order of publication, three foundational
More informationOBSERVATIONS FROM 2010 INSPECTIONS OF DOMESTIC ANNUALLY INSPECTED FIRMS REGARDING DEFICIENCIES IN AUDITS OF INTERNAL CONTROL OVER FINANCIAL REPORTING
1666 K Street, N.W. Washington, DC 20006 Telephone: (202) 207-9100 Facsimile: (202) 862-8430 www.pcaobus.org OBSERVATIONS FROM 2010 INSPECTIONS OF DOMESTIC ANNUALLY INSPECTED FIRMS REGARDING DEFICIENCIES
More informationitanalyzer Data Protection Module
itanalyzer Data Protection Module Pablo Horenstein, itanalyzer VP Pre-Sales phorenstein@itanalyzer.net Jan 2015 For further information please contact: Info@iTAnalyzer.net Module Description The module
More informationBusiness Information Systems. IT Enabled Services And Emerging Technologies. Chapter 4: Facilitated e-learning Part 1 of 2 CA M S Mehta, FCA
Business Information Systems IT Enabled Services And Emerging Technologies Chapter 4: Facilitated e-learning Part 1 of 2 CA M S Mehta, FCA 1 Business Information Systems Task Statements 1.6 Consider the
More informationEnterprise Data Quality
Enterprise Data Quality An Approach to Improve the Trust Factor of Operational Data Sivaprakasam S.R. Given the poor quality of data, Communication Service Providers (CSPs) face challenges of order fallout,
More informationRandom Forest Based Imbalanced Data Cleaning and Classification
Random Forest Based Imbalanced Data Cleaning and Classification Jie Gu Software School of Tsinghua University, China Abstract. The given task of PAKDD 2007 data mining competition is a typical problem
More informationSponsor-CRO Collaboration Study. Executive Summary
Sponsor-CRO Collaboration Study Executive Summary 2013 About Vantage Partners Vantage Partners, LLC is a global strategy and management consulting firm that specializes in helping companies achieve breakthrough
More informationEST.03. An Introduction to Parametric Estimating
EST.03 An Introduction to Parametric Estimating Mr. Larry R. Dysert, CCC A ACE International describes cost estimating as the predictive process used to quantify, cost, and price the resources required
More informationFoundations of Business Intelligence: Databases and Information Management
Chapter 6 Foundations of Business Intelligence: Databases and Information Management 6.1 2010 by Prentice Hall LEARNING OBJECTIVES Describe how the problems of managing data resources in a traditional
More informationRSA Adaptive Authentication For ecommerce
RSA Adaptive Authentication For ecommerce Risk-based 3D Secure for Credit Card Issuers SOLUTION BRIEF RSA FRAUD & RISK INTELLIGENCE The Threat of ecommerce Fraud ecommerce fraud is a threat to both issuers
More informationBusiness Architecture: a Key to Leading the Development of Business Capabilities
Business Architecture: a Key to Leading the Development of Business Capabilities Brent Sabean Abstract: Relatively few enterprises consider themselves to be agile, i.e., able to adapt what they do and
More informationINFO 1400. Koffka Khan. Tutorial 6
INFO 1400 Koffka Khan Tutorial 6 Running Case Assignment: Improving Decision Making: Redesigning the Customer Database Dirt Bikes U.S.A. sells primarily through its distributors. It maintains a small customer
More informationCOMPUTING DURATION, SLACK TIME, AND CRITICALITY UNCERTAINTIES IN PATH-INDEPENDENT PROJECT NETWORKS
Proceedings from the 2004 ASEM National Conference pp. 453-460, Alexandria, VA (October 20-23, 2004 COMPUTING DURATION, SLACK TIME, AND CRITICALITY UNCERTAINTIES IN PATH-INDEPENDENT PROJECT NETWORKS Ryan
More informationExecutive Summary of Mastering Business Growth & Change Made Easy
Executive Summary of Mastering Business Growth & Change Made Easy by David Matteson & Jeff Hansen, June 2008 You stand at a crossroads. A new division of your company is about to be launched, and you need
More informationBusiness information management software that moulds to your needs...
Business information software that moulds to your needs... Everything. In one place. In a nutshell. Sophisticated web development without the need for developers What is InfoMetrix? InfoMetrix is an Agile
More informationAdobe Insight, powered by Omniture
Adobe Insight, powered by Omniture Accelerating government intelligence to the speed of thought 1 Challenges that analysts face 2 Analysis tools and functionality 3 Adobe Insight 4 Summary Never before
More informationGovernment Technology Trends to Watch in 2014: Big Data
Government Technology Trends to Watch in 2014: Big Data OVERVIEW The federal government manages a wide variety of civilian, defense and intelligence programs and services, which both produce and require
More informationEPIC 1.08 Distribution System Safety and Reliability through New Data Analytics Techniques. John Carruthers, PG&E
EPIC 1.08 Distribution System Safety and Reliability through New Data Analytics Techniques John Carruthers, PG&E EPIC Innovation Symposium December 3, 2015 STAR What is it? STAR = System Tool for Asset
More informationUse of automated workflow systems in virtual teams
Use of automated workflow systems in virtual teams ZINNOV LLC 138 SOUTH QUEENSCLIFF CIRCLE, THE WOODLANDS, TEXAS - 77382 FAX 1 419 844 2583 PHONE (US) 1 832 326 3854 (INDIA) + 91 80 227 3130 EMAIL: PARI@ZINNOV.COM
More informationHow to Run a Successful Big Data POC in 6 Weeks
Executive Summary How to Run a Successful Big Data POC in 6 Weeks A Practical Workbook to Deploy Your First Proof of Concept and Avoid Early Failure Executive Summary As big data technologies move into
More informationPREPARATION OF TECHNICAL APPRAISAL REVIEW REPORTS
INTRODUCTION PREPARATION OF TECHNICAL APPRAISAL REVIEW REPORTS The reporting of the results of an appraisal review is one of the most critical efforts the professional review appraiser undertakes. The
More informationA Survey on Association Rule Mining in Market Basket Analysis
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 4 (2014), pp. 409-414 International Research Publications House http://www. irphouse.com /ijict.htm A Survey
More informationIntroduction to Systems Analysis and Design
Introduction to Systems Analysis and Design What is a System? A system is a set of interrelated components that function together to achieve a common goal. The components of a system are called subsystems.
More informationKeywords Big Data; OODBMS; RDBMS; hadoop; EDM; learning analytics, data abundance.
Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Analytics
More informationFFIEC Cybersecurity Assessment Tool
Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,
More informationHealthcare Information Technology
Healthcare Information Technology A DMG Federal ebook Keith Boyer Clinical Analytics A key goal for any healthcare organization is to improve population health while at the same time reducing costs overall.
More informationSpace project management
ECSS-M-ST-80C Space project management Risk management ECSS Secretariat ESA-ESTEC Requirements & Standards Division Noordwijk, The Netherlands Foreword This Standard is one of the series of ECSS Standards
More informationREFLECTIONS ON THE USE OF BIG DATA FOR STATISTICAL PRODUCTION
REFLECTIONS ON THE USE OF BIG DATA FOR STATISTICAL PRODUCTION Pilar Rey del Castillo May 2013 Introduction The exploitation of the vast amount of data originated from ICT tools and referring to a big variety
More informationHow To Manage A Network Security Risk
Scanless Vulnerability Assessment: Skybox Security whitepaper July 2014 1 Overview Vulnerability scanning, or the process of identifying a list of known security gaps in the network environment, is the
More informationMonte Carlo analysis used for Contingency estimating.
Monte Carlo analysis used for Contingency estimating. Author s identification number: Date of authorship: July 24, 2007 Page: 1 of 15 TABLE OF CONTENTS: LIST OF TABLES:...3 LIST OF FIGURES:...3 ABSTRACT:...4
More informationSTSG Methodologies and Support Structure
STSG Methodologies and Support Structure STSG Application Life Cycle Management STSG utilizes comprehensive lifecycle tools that are fully integrated and provide capabilities for most of the roles in its
More informationMaster of Science in Health Information Technology Degree Curriculum
Master of Science in Health Information Technology Degree Curriculum Core courses: 8 courses Total Credit from Core Courses = 24 Core Courses Course Name HRS Pre-Req Choose MIS 525 or CIS 564: 1 MIS 525
More informationThe integrated leadership system. ILS support tools. Leadership pathway: Individual profile EL1
The integrated leadership system ILS support tools Leadership pathway: Individual profile Executive Level 1 profile Shapes strategic thinking Achieves results Cultivates productive working relationships
More informationITIL, the CMS, and You BEST PRACTICES WHITE PAPER
ITIL, the CMS, and You BEST PRACTICES WHITE PAPER Table OF CONTENTS executive Summary............................................... 1 What Is a CMS?...................................................
More informationAperture VISTA and the CMDB: An Enterprise Best Practices Approach
W H I T E P A P E R Aperture VISTA and the CMDB: An Enterprise Best Practices Approach Seth Rachlin and John Kneiling TechPar Group 2 INTRODUCTION The last few years have seen significant interest and
More informationETCIC Internships Open to Sophomores:
ETCIC Internships Open to Sophomores: If interested in applying for any of these positions, please email emassey1@swarthmore.edu with your resume (and cover letter if required) by Sunday, 9/20 at 11:59pm.
More informationUsing big data in automotive engineering?
Using big data in automotive engineering? ETAS GmbH Borsigstraße 14 70469 Stuttgart, Germany Phone +49 711 3423-2240 Commentary by Friedhelm Pickhard, Chairman of the ETAS Board of Management, translated
More informationWHITE PAPER SPLUNK SOFTWARE AS A SIEM
SPLUNK SOFTWARE AS A SIEM Improve your security posture by using Splunk as your SIEM HIGHLIGHTS Splunk software can be used to operate security operations centers (SOC) of any size (large, med, small)
More informationwith Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief
RSA Solution Brief Streamlining Security Operations with Managing RSA the Lifecycle of Data Loss Prevention and Encryption RSA envision Keys with Solutions RSA Key Manager RSA Solution Brief 1 Who is asking
More informationSelect the right configuration management database to establish a platform for effective service management.
Service management solutions Buyer s guide: purchasing criteria Select the right configuration management database to establish a platform for effective service management. All business activities rely
More informationConcepts of digital forensics
Chapter 3 Concepts of digital forensics Digital forensics is a branch of forensic science concerned with the use of digital information (produced, stored and transmitted by computers) as source of evidence
More informationWhat a Vulnerability Assessment Scanner Can t Tell You. Leveraging Network Context to Prioritize Remediation Efforts and Identify Options
White paper What a Vulnerability Assessment Scanner Can t Tell You Leveraging Network Context to Prioritize Remediation Efforts and Identify Options november 2011 WHITE PAPER RedSeal Networks, Inc. 3965
More informationData Catalogs for Hadoop Achieving Shared Knowledge and Re-usable Data Prep. Neil Raden Hired Brains Research, LLC
Data Catalogs for Hadoop Achieving Shared Knowledge and Re-usable Data Prep Neil Raden Hired Brains Research, LLC Traditionally, the job of gathering and integrating data for analytics fell on data warehouses.
More information