Online Surveillance Awareness as Impact on Data Validity for Open-Source Intelligence?
|
|
|
- Jason Harris
- 10 years ago
- Views:
Transcription
1 Online Surveillance Awareness as Impact on Data Validity for Open-Source Intelligence? Petra Saskia Bayerl 1( ) and Babak Akhgar 2 1 Rotterdam School of Management, Erasmus University, Rotterdam, Netherlands [email protected] 2 CENTRIC, Sheffield Hallam University, Sheffield, UK [email protected] Abstract. Online surveillance, especially of open sources such as social media (OSINT/SOCMINT), has become a vital source of information for decisions made by public institutions such as law enforcement agencies. This keynote discusses the concept of online surveillance awareness (OSA) as a possible long-term threat to the quality of OSINT-relevant online sources. An interdisciplinary research agenda to systematically investigate the links of OSA to the reliability and validity of OSINT sources and thus the quality of OSINT more generally is outlined. Keywords: Online surveillance awareness Online surveilliance OSINT Data reliability Data validity Law enforcement agencies Research agenda 1 Introduction Open source Intelligence (OSINT) is increasingly being utilized by Law Enforcement Agencies (LEAs) and public authorities in order to enhance a wide range of their functions. These include investigative capabilities, situation awareness, the management of public disorder, responses against criminal threats, responses to crises, as well as understanding public perceptions of security and safety [1 3]. Examples of OSINT applications by LEAs can be found in their public announcements, news broadcasts and in the professional literature. Most prominent amongst them are cases such as the Arab spring in , the riots in London and other English cities in summer 2011, the 2012 London Olympics, FBI-hostage negotiations in Pittsburgh in 2012, the murder of British soldiers in the streets of London in 2013 or the abduction of Nigerian girls from their school by Boko Haram in early These events have seen a considerable reliance on the processing of OSINT, and more specifically social media intelligence (SOCMINT) by LEAs, security agencies and public authorities in particular. OSINT can support tasks such as the creation of situational awareness, intelligence gathering, sentiment analysis and communication with and from the public. LEAs gathering information from open sources depend on the monitoring, collection and analysis of often very large amounts of data. These are activities, which happen Springer International Publishing Switzerland 2015 H. Jahankhani et al. (Eds.): ICGS3 2015, CCIS 534, pp , DOI: / _2
2 16 P.S. Bayerl and B. Akhgar generally unbeknownst to the producers of the data, i.e., the citizens using the internet. However, since the Snowden revelations knowledge about online surveillance has become ubiquitous. Our question is what happens, when internet users are aware of the presence, type and degree of online surveillance? In what way does this influence their behaviors and in which ways and to what degree does this impact the quality of OSINT sources, if at all? Issues in the quality, i.e., reliability and validity of open data sources, threaten the dependability, effectiveness and efficiency of decisions made using it. These may result in critical mistakes for deployment of resources and actions by LEAs and other authorities, for instance, during a criminal investigation or the management of crises. We argue that online surveillance awareness (OSA), i.e., the knowledge or at least assumption of users that their behavior and information online is monitored, collected and analyzed, threatens the quality of OSINT and OSINT-based decisions. This issue has so far received little attention in discussions of OSINT, and even less empirical efforts have been undertaken to systematically investigate the concrete effects of OSA on OSINT quality for LEAs. In this keynote we will reduce introduce the concept of online surveillance awareness presenting a research framework and agenda to investigate the links of OSA to the reliability and validity of OSINT sources and thus the overall quality of OSINT. 2 Online Surveillance and OSINT Effectiveness Surveillance of online behavior is a vital aspect of efforts to fight crime as well as in the response to and management of crises. We argue that two elements affect the quality of OSINT: (1) awareness of online surveillance and (2) public attitudes towards surveillance. A first indication for this link can be found in a recent study by Marthew and Tucker, which investigated the shift in Google search patterns prior compared to after the Snowden revelations in ten different countries [4]. As they demonstrated, in most countries keywords became less contentious, i.e., users avoided searches they believe might get them in trouble with the [U.S.] government [4]. Although the study does not allow a direct causal link, it provides strong indications of OSA and subsequent modifications of online user behavior. In our own research, we have investigated assumptions of online surveillance and the tendency for falsification of personal information [5]. We found that OSA in the form of online surveillance assumptions increased the acceptance of falsification in others as well as the propensity to falsify our own personal information. Our study on information falsification introduces two possible contingencies to the effect of OSA on OSINT: perceived usefulness and acceptance of online surveillance and type of organization conducting the surveillance (in our case state agencies versus private companies). On a conceptual level this leads a possible Effects Model of OSA for falsification of personal information, which links online surveillance with falsification moderated by usefulness perceptions and user trust in the organizations conducting online surveillance (see Fig. 1). Together these studies provide first empirical indications that OSA can change user behavior on a large scale. This link between OSA and changes in online user behavior creates not only social, legal and political implications but also critical practical
3 Online Surveillance Awareness as Impact on Data Validity 17 Fig. 1. Suggested effects model for the link between online surveillance and falsification of personal information based on [2] implications for LEAs and other organizations basing operational decisions on OSINT, starting with the design and development of relevant tools and platforms. Similarly, OSA is also likely to affect citizens acceptance of the tools and applications put forward by LEAs for use during situations such as natural disasters or help and advice services (e.g., ask the police applications). As the debates and reactions in the aftermath of the Snowden revelations demonstrate, online surveillance awareness threatens citizens trusts in state authorities and LEAs. Critically, trust is one of the main factors that determine whether citizens use online services provided by LEAs [6]. In our opinion, it is thus crucial to systematically investigate the impact of online surveillance awareness on the multitude of sources and information types LEAs use in OSINT-based analyses and operations. In the following, we put forward a road map and agenda for future research efforts into this area. 3 A Research Road Map and Agenda In order to further explore the relationship between OSINT quality and online surveillance awareness and to create a reference architecture for the development of future OSINT applications, we sketch a research road map outlining possible topics and methodologies. Our agenda is based on the generic framework presented in Fig. 2. As demonstrated in Fig. 2, several areas require investigation to understand the link between OSA and possible implications for OSINT quality. Firstly, the features of online
4 18 P.S. Bayerl and B. Akhgar Fig. 2. Generic research framework for the link between online surveillance, online user behaviours and OSINT quality surveillance (e.g., type of information collected, implicated organizations, and collection process) may influence how intrusive or problematic online surveillance is perceived. We hypothesize that the more problematic the surveillance is considered, the stronger the relationship between OSA and behavioral changes will be. Connected to this is the perceived usefulness of the surveillance [5], which will also depend on personal variables such as perceived vulnerability to the threats address in the surveillance (cyber-grooming, financial fraud, terrorism, crises, etc.). Moreover, features of the individual may play a role in shaping the relationship between OSA and behavioral changes, for instance, in terms of gender, online experiences, political orientations, etc. For example, men seem more critical about online surveillance than women, while less experienced internet users seem less critical than users with longer online experience [5]. Individual features may also play a role in determining the impact of surveillance features on the OSA-behavioral link, in that demographics, personalities, national contexts, etc. may influence judgments about the what, who and how of the surveillance process. Of course the behavioral changes are only relevant in as far as they impact OSINT-relevant information. It is therefore also vital to determine which relevant behaviors may be more or less influenced by OSA. Our research agenda combines elements of big data analytics with psychological, organizational and criminological perspectives. We thus envision research on OSAimpacts as an interdisciplinary endeavor. Accordingly, methodologies will span the range from observations and experimentation to sentiment analysis and behavioral modelling. These methodologies will be adapted depending on the specific parts of the model under
5 Online Surveillance Awareness as Impact on Data Validity 19 investigation (e.g., investigation inter-individual differences versus investigating impacts of behavioral changes on different quality parameters). We propose this research framework as a possible road map to inform newly established, but also existing research projects. Below we use an example from the context of crises management to illustrate how it may be integrated into more traditional research efforts on OSINT applications. 4 Application Scenario: OSINT Quality in Crises Management One of the key elements for the management of crises is a clear understanding of the situation to enable decision makers to take appropriate actions in often volatile conditions. OSINT is one of the channels which can act as information source for decision makers. To avoid wrong decisions during fast developing critical situations, the reliability and validity of information is of special concern. The use of OSINT in crisis response and management is addressed in several research projects, among them the EU-security project ATHENA. ATHENA explores how the huge popularity of new communication media, particularly web-based social media such as Twitter and Facebook, and the use of OSINT can be harnessed to provide efficient and effective communication and enhance situational awareness during crises. Its aim is to enable and encourage users of social media to contribute to the security of citizens in crisis situations by developing a suite of software tools to enhance the decisionmaking capabilities of LEAs, crisis management command and control centers, first responders, and citizens during and in the aftermath of crises ( ATHENA platform ) [7]. Athena outputs will then feed into a Command and Control Centre for decision making authorities (e.g., LEAs and emergency planners).the effectiveness of the ATHNEA platform relies heavily on the quality of its source information, which is obtained from open sources in the public space [8]. Its success further depends on the trust between citizens, LEAs and other organizations involved in crisis management efforts. As part of our research agenda we will investigate the proposed framework (see Fig. 2) during the live exercise of Athena in collaboration with UK and European LEAs and other crisis management authorities. Amongst others, these exercises can focus on investigating in more detail the role of OSA for the willingness of citizens to provide information on social media during crises, the quality of this information (e.g., level of detail) and the role of trust in these situations. 5 Challenges to be Addressed in Current and Future Research on OSA-OSINT Links While we firmly believe that systematic research into the costs and benefits of online surveillance awareness is a vital addition to current discussions of OSINT-use and application design. In addition there are also challenges to develop a unified research agenda as suggested in this paper. We have identified the following closely interlinked challenges for the development and deployment of the research agenda:
6 20 P.S. Bayerl and B. Akhgar (1) The speed of technological change (2) The evolution of internet regulatory, societal and technological frameworks, which are and may remain scattered across EU and international regions and institutions (3) The lack of a clear strategy to address the multi-disciplinary dimension of online surveillance by member states and authorities. The OSINT domain is addressed by many different organizations, research disciplines and approaches. The dialogue among these stakeholders remains too localized and needs to be coordinated in order to identify consensus on what is consider to be OSINT from ethical and legal standpoints. (4) A lack of a common terminology across disciplines, which hampers the development of a multidisciplinary approach. All these challenges explain the need for a comprehensive, multidisciplinary research agenda elaborated through a citizen centered multidisciplinary and multifaceted methodological approach. Research on OSINT needs to evolve towards concrete solutions governed by citizens rights to freedom of speech and the full spectrum of ethical concerns while maintaining national security of each country. In this context we believe that the consequences of online surveillance and the awareness of online surveillance for citizens online behaviors and the relationships with each other as well as state authorities are of vital concern. In our research agenda we aim for a systematic investigation of these effects to create actionable knowledge for LEAs, designers of OSINTtools and platforms, and decision makers relying on the quality of their data. References 1. Akhgar, B., Yates, S.J.: Strategic intelligence management for combating crime and terrorism. In: Akhgar, B., Yates, S.J. (eds.) Intelligence Management, pp Springer, London (2011) 2. Bell, P., Congram, M.: Intelligence-Led Policing (ILP) as A Strategic Planning Resource in the Fight against Transnational Organized Crime (TOC). Int. J. Bus. Commer. 2(12), (2013) 3. Steele, R.D.: Open source intelligence. In: Johnson, L. (ed.) Handbook of Intelligence Studies, pp Routledge, New York (2007) 4. Marthews, A., Tucker, C.: Government surveillance and internet search behavior. In: SSRN (2014) 5. Bayerl, P.S., Akhgar, B.: Pitfalls for OSINT investigations: Surveillance and online falsification tendencies. Communications of the ACM, August Bayerl, P.S., Horton, K., Jacobs, G., Akhgar, B.: Who wants police on social media? In: Proceedings of the 1st European Conference on Social Media, pp (2014) 7. Andrews, S., Yates, S., Akhgar, B., Fortune, D.: The ATHENA project: using formal concept analysis to facilitate the actions of responders in a crisis situation. In: Akhgar, B., Yates, S. (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communication Technologies, pp Elsevier, Amsterdam (2013) 8. West Yorkshire Police: Athena Project: Latest News, 29 April 2014
7
Open Source Intelligence Dissemination Conference, Rome, Wednesday 8 th July 2015
Open Source Intelligence Dissemination Conference, Rome, Wednesday 8 th July 2015 A welcome from the Ministry of the Interior - National Fire Corps: We would like to formally welcome you to the Open Source
Big Data and Society: The Use of Big Data in the ATHENA project
Big Data and Society: The Use of Big Data in the ATHENA project Professor David Waddington CENTRIC Lead on Ethics, Media and Public Disorder [email protected] Helen Gibson CENTRIC Researcher [email protected]
COURSE DESCRIPTION FOR THE BACHELOR DEGREE IN INTERNATIONAL RELATIONS
COURSE DESCRIPTION FOR THE BACHELOR DEGREE IN INTERNATIONAL RELATIONS Course Code 2507205 Course Name International Relations of the Middle East In this course the student will learn an historical and
JIBC Intelligence Analysis and Tactical Criminal Analysis Graduate Certificate Program Overview
JIBC Intelligence Analysis and Tactical Criminal Analysis Graduate Certificate Program Overview Each graduate certificate program consists of five courses which are delivered entirely online in sequential
1 FOCUS Foresight Security Scenarios
New Security Studies Rachel Suissa (Ph.D) University of Haifa, Israel In today s globalised setting, the challenge of maintaining security is no longer limited to the traditional foreign-policy and military
EDS Innovation Research Programme DISCUSSION PAPER SERIES. No.005 Media, Connectivity, Literacies and Ethics
EDS Innovation Research Programme DISCUSSION PAPER SERIES No.005 Media, Connectivity, Literacies and Ethics Security Challenges of Networks: Cyber Trust and Cyber Crime Robin Mansell March 2006 EDS Innovation
2 Gabi Siboni, 1 Senior Research Fellow and Director,
Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,
The UK cyber security strategy: Landscape review. Cross-government
REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape
Cyber threat intelligence and the lessons from law enforcement. kpmg.com/cybersecurity
Cyber threat intelligence and the lessons from law enforcement kpmg.com/cybersecurity Introduction Cyber security breaches are rarely out of the media s eye. As adversary sophistication increases, many
Michael Yakushev PIR-Center, Moscow (Russia)
Michael Yakushev PIR-Center, Moscow (Russia) Terminological conflict: Cyber-Security, Internet Governance etc. Legal conflict (gap): lack of globally recognized legal instruments Organizational conflict:
Introduction to Marketing
Introduction to Marketing Theocharis Katranis Spring Semester 2013 1 Today s Lecture 1. We will explain the importance of information in gaining insights about the marketplace and customers. 2. We will
TURN BACK CRIME. Global awareness campaign
TURN BACK CRIME Global awareness campaign ABOUT THE CAMPAIGN Together, we can turn back crime Turn Back Crime is a global awareness campaign developed by INTERPOL. Using a variety of media channels including
Cloud Computing: A Comparison Between Educational Technology Experts' and Information Professionals' Perspectives
Noa Aharony 1 Cloud Computing: A Comparison Between Educational Technology Experts' and Information Professionals' Perspectives Noa Aharony Department of Information Science, Bar-Ilan University [email protected]
Comprehensive Emergency Management Education 604.528.5800 1.877.528.5591
Bachelor of Emergency & Security Management Studies prepare yourself and your team with the most accessible, customizable emergency management training from Canada s Leading Public Safety Educator Comprehensive
THE OPEN UNIVERSITY OF TANZANIA FACULTY OF BUSINESS MANAGEMENT OME 212: BUSINESS ENVIRONMENT AND STRATEGIES COURSE OUTLINE
THE OPEN UNIVERSITY OF TANZANIA FACULTY OF BUSINESS MANAGEMENT OME 212: BUSINESS ENVIRONMENT AND STRATEGIES COURSE OUTLINE 2010 1 INTRODUCTION This course focuses on the external and internal environment
SOCIAL MEDIA LISTENING AND ANALYSIS Spring 2014
SOCIAL MEDIA LISTENING AND ANALYSIS Spring 2014 EXECUTIVE SUMMARY In this digital age, social media has quickly become one of the most important communication channels. The shift to online conversation
School of Public Health. Academic Certificate Student Handbook 2012-2013
School of Public Health Academic Certificate Student Handbook 2012-2013 Revised August 2012 Page 2 TABLE OF CONTENTS ACADEMIC CERTIFICATE PROGRAM OVERVIEW... 3 BASIC COMMUNITY PUBLIC HEALTH PRACTICE...
Setting the Standard for Safe City Projects in the United States
Leading Safe Cities Setting the Standard for Safe City Projects in the United States Edge360 is a provider of Safe City solutions to State & Local governments, helping our clients ensure they have a secure,
Business Continuity Management
Business Continuity Management The Concept and Context of BCM Planning and Study Notes THE CONCEPT AND CONTEXT OF BUSINESS CONTINUITY Introduction Whilst it is important to recognise that there is a holistic
Module handbook. M.Sc. Sport Management [M.Sc. SMA] Valid for students who started: Winter term semester 2014/15
Module handbook M.Sc. Sport Management [M.Sc. SMA] s The M.Sc. Sport Management combines economic evaluation, analytics, conceptualization, and a strong international perspective. The program focuses on
School of Public Health
School of Public Health Academic Certificate Student Handbook 2014-2015 Revised August 2014 TABLE OF CONTENTS P a g e 2 TABLE OF CONTENTS ACADEMIC CERTIFICATE PROGRAM OVERVIEW... 3 BASIC COMMUNITY PUBLIC
How To Write A Book On Risk Management
National Center for Risk and Economic Analysis of Terrorism Events CREATE FY2015 (Year 11) Call for White Papers CREATE, the DHS-sponsored Center of Excellence at the University of Southern California,
INTELLIGENCE AND CYBERSECURITY SEMINAR SERIES. Transforming Your Research and Analytic Skills
INTELLIGENCE AND CYBERSECURITY SEMINAR SERIES Transforming Your Research and Analytic Skills Spring 2015 Contents A 21st Century Skillset 3 Course Dates 5 Course Fees 6 Open Source Intelligence 7 Advanced
Specialisation Psychology
Specialisation Psychology Semester 1 Semester 2 An Introduction to Doing Research Politics, Power and Governance I Philosophy of the Social Sciences Economics, Markets and Organisations I Rhetoric Law,
Research Topics in the National Cyber Security Research Agenda
Research Topics in the National Cyber Security Research Agenda Trust and Security for our Digital Life About this document: This document summarizes the research topics as identified in the National Cyber
Cyber Diplomacy A New Component of Foreign Policy 6
Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest [email protected] Abstract Nowadays, the boundary between virtual
Cyber Security Strategy for Germany
Cyber Security Strategy for Germany Contents Introduction 2 IT threat assessment 3 Framework conditions 4 Basic principles of the Cyber Security Strategy 4 Strategic objectives and measures 6 Sustainable
SOCIAL MEDIA LISTENING AND ANALYSIS Spring 2014
SOCIAL MEDIA LISTENING AND ANALYSIS Spring 2014 Our Understanding The rise of social media has transformed the way citizens engage with their government. Each day, nearly 2 billion people talk about and
Unit 4: Marketing Principles
Unit 4: Marketing Principles Unit code: F/601/0556 QCF level: 4 Credit value: 15 credits Aim This unit aims to provide learners with understanding and skills relating to the fundamental concepts and principles
FCT i H2020 Säkra samhällen 2016 Fight against Crime and Terrorism. [email protected]
FCT i H2020 Säkra samhällen 2016 Fight against Crime and Terrorism [email protected] Sammanställning FCT ID -deadline: Tänkt EUcontribution TRL Action 160825 Topic -mål -typ SEC-06-FCT- Developing
Preparing for and coping with a crisis online. White Paper 2 Crisis management in a digital world
Contents 3 6 11 16 19 Introduction Preparing for a crisis During a crisis After the crisis About The Partners Group 2 In the new world of social media and mobile technology, communication is instantaneous,
On the European experience in critical infrastructure protection
DCAF a centre for security, development and the rule of law On the European experience in critical infrastructure protection Valeri R. RATCHEV [email protected] @ratchevv DCAF/CSDM 1 This presentation
APPROVED VERSION. Centro de Estudios Estratégicos de la Defensa Consejo de Defensa Suramericano Unión de Naciones Suramericanas.
CEED S PRELIMINARY REPORT TO THE SOUTH AMERICAN DEFENSE COUNCIL ON THE TERMS OF REFERENCE FOR THE CONCEPTS OF SECURITY AND DEFENSE IN THE SOUTH AMERICAN REGION The Centre for Strategic Defense Studies
Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.
Cyber Security Personal and commercial information is the new commodity of choice for the virtual thief, argues Adrian Leppard, Commissioner for City of London Police, as he sets out the challenges facing
Internal Enablers for the Implementation of Sustainable Supply Chain Risk Management Systems
Internal Enablers for the Implementation of Sustainable Supply Chain Risk Management Systems Christina Tobescu and Stefan Seuring Abstract Continuous globalization and requirements for sustainable products
E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION
1. Introduction E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION Australia s national security and economic and social well-being rely upon the use and availability of a range of Information
School of Public Health
School of Public Health Academic Certificate Student Handbook 2015-2016 Revised August 2015 TABLE OF CONTENTS P a g e 2 TABLE OF CONTENTS ACADEMIC CERTIFICATE PROGRAM OVERVIEW... 3 BASIC COMMUNITY PUBLIC
CYSPA - EC projects supporting NIS
CYSPA - EC projects supporting NIS Nina Olesen, EOS March 2014 Athens, Greece www.cyspa.eu CYSPA the European project The European Cyber Security Protection Alliance, or CYSPA, is an initiative by 17 organisationsfrom
ITU National Cybersecurity/CIIP Self-Assessment Tool
ITU National Cybersecurity/CIIP Self-Assessment Tool ICT Applications and Cybersecurity Division Policies and Strategies Department ITU Telecommunication Development Sector April 2009 Revised Draft For
JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.
JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President
A REVIEW OF FINANCIAL ADVICE MODELS AND THE TAKE-UP OF FINANCIAL ADVICE
CFS Research Brief (FLRC 10-5) September 2010 A REVIEW OF FINANCIAL ADVICE MODELS AND THE TAKE-UP OF FINANCIAL ADVICE By J. Michael Collins Financial advice may be an important complement to educational
Inter-American Police Training Program (PICAP) International Training Course: Management of Police Intelligence
Inter-American Police Training Program (PICAP) International Training Course: Management of Police Intelligence City of Bogota, Colombia, September 26-30, 2011 DURATION: 5 days CLASS TIME: 34 hours LOCATION:
Utilizing Social Media Data for Enhancing Decision Making during Emergencies
Utilizing Social Media Data for Enhancing Decision Making during Emergencies Ioannis Kotsiopoulos European Dynamics S.A., Marousi, Greece [email protected] Lemi Baruh College of Social Sciences
Council of the European Union Brussels, 24 November 2014 (OR. en)
Council of the European Union Brussels, 24 November 2014 (OR. en) 15701/1/14 REV 1 "I/A" ITEM NOTE From: To: General Secretariat of the Council No. prev. doc.: 11153/2/14 REV 2 Subject: JAI 897 DAPIX 175
Executive summary. Today s researchers require skills beyond their core competencies
EXECUTIVE SUMMARY 9 Executive summary Today s researchers require skills beyond their core competencies The formation and careers of researchers are important policy issues and training for transferable
THE ALIGNMENT BETWEEN CUSTOMER RELATIONSHIP MANAGEMENT AND IT STRATEGY: A PROPOSED RESEARCH MODEL
THE ALIGNMENT BETWEEN CUSTOMER RELATIONSHIP MANAGEMENT AND IT STRATEGY: A PROPOSED RESEARCH MODEL Durand Aurelie The University of Lyon 3 [email protected] Bouzidi Laïd The University of Lyon
Soft Skills Requirements in Software Architecture s Job: An Exploratory Study
Soft Skills Requirements in Software Architecture s Job: An Exploratory Study 1 Faheem Ahmed, 1 Piers Campbell, 1 Azam Beg, 2 Luiz Fernando Capretz 1 Faculty of Information Technology, United Arab Emirates
Graduate Business Programs SDSU College of Business Administration. MBA Program of Study Worksheet. Marketing Specialization
Graduate Business Programs SDSU College of Business Administration MBA Program of Study Worksheet Marketing Specialization MBA Program of Study Worksheet: Marketing Specialization The MBA requires a 30-48
Social Media Study in European Police Forces: First Results on Usage and Acceptance
Social Media Study in European Police Forces: First Results on Usage and Acceptance P. Saskia Bayerl, Ph.D., Erasmus University Rotterdam, the Netherlands September 29 th, 2012 Table of Contents Main Findings...
MULTI ANNUAL WORK PLAN 2013 2015
MULTI ANNUAL WORK PLAN 2013 2015 Translation into English: Elena Arrebola 1. CONTEXT a) Mandate The Council promotes the principle of equal treatment and non-discrimination of persons on racial or ethnic
such as loneliness and computer/ict illiteracy. (see also the staff working paper Ageing well in the information Society )
Contribution of the European Network of Occupational Therapy in Higher Education to the Debate around the Consultation Paper Europe s Social Reality by Roger Liddle and Fréderic Lerais ENOTHE The European
Business Plan 2012/13
Business Plan 2012/13 Contents Introduction 3 About the NFA..4 Priorities for 2012/13 4 Resources.6 Reporting Arrangements.6 Objective 1 7 To raise the profile and awareness of fraud among individuals,
Trading Forum 2013 Geneva, 12 th March 2013 Financial market regulation and commodity markets
Federal Department of Finance FDF State Secretariat for International Financial Matters SIF Multilateral Affairs Trading Forum 2013 Geneva, 12 th March 2013 Financial market regulation and commodity markets
Accreditation Application Forms
The Institute of Risk Management The Institute of Risk Management Accreditation Application Forms Universities and Professional Associations The Institute of Risk Management Accreditation Application Forms
Concept and Project Objectives
3.1 Publishable summary Concept and Project Objectives Proactive and dynamic QoS management, network intrusion detection and early detection of network congestion problems among other applications in the
IRM CERTIFICATE AND DIPLOMA OUTLINE SYLLABUS
IRM CERTIFICATE AND DIPLOMA OUTLINE SYLLABUS 1 Module 1: Principles of Risk and Risk Management Module aims The aim of this module is to provide an introduction to the principles and concepts of risk and
The global challenge
The global challenge CYBERCRIME The global challenge Cybercrime has developed from an emerging crime to a serious manifestation of crime with great practical relevance With the emerging use of computer
HB 292 2006 A Practitioners Guide to Business Continuity Management
HB 292 2006 A Practitioners Guide to Business Continuity Management HB HB 292 2006 Handbook A practitioners guide to business continuity management First published as HB 292 2006. COPYRIGHT Standards Australia
OPEN SOURCE INTELLIGENCE SEMINAR SERIES. Transforming Your Research and Analytic Skills
OPEN SOURCE INTELLIGENCE SEMINAR SERIES Transforming Your Research and Analytic Skills Winter 2015 Contents A 21st Century Skillset 3 Course Dates 5 Course Fees 5 Open Source Intelligence 6 Advanced OSINT
Grade 12 Psychology (40S) Outcomes Unedited Draft 1
Grade 12 Psychology (40S) Outcomes Unedited Draft 1 Theme 1: Introduction and Research Methods Topic 1: Introduction 1.1.1 Define psychology, and list and explain its goals. 1.1.2 Describe and compare
Background paper to the Lund Declaration 2015
Background paper to the Lund Declaration 2015 content Lund Declaration 2009...1 State of play and progress since 2009...1 A robust challenge-based approach for real solutions...2 Alignment...3 Frontier
PROJECT FICHE 3.2.1.2
PROJECT FICHE 3.2.1.2 TO ACTION PROGRAMME 2005 FOR THE FORMER YUGOSLAV REPUBLIC OF MACEDONIA Title Combating money laundering (phase II) Total cost EC contribution: 1.5 million (approx) Aid Method Project
CRIMINAL JUSTICE, BACHELOR OF SCIENCE (B.S.) WITH A CONCENTRATION IN FORENSIC CRIME SCENE INVESTIGATION
VCU 1 CRIMINAL JUSTICE, BACHELOR OF SCIENCE (B.S.) WITH A CONCENTRATION IN FORENSIC CRIME SCENE INVESTIGATION The major objective of this degree program is to prepare students for effective professional
TURKEY BUSINESS ANALYSIS REPORT 2015. Thinking Like the Business
TURKEY BUSINESS ANALYSIS REPORT 2015 Thinking Like the Business CONTENT Foreword Respondent Profiles Business Partnering Business Priorities Driving Change and Innovation Efficiency of Business Analysis
THE STRATEGIC POLICING REQUIREMENT. July 2012
THE STRATEGIC POLICING REQUIREMENT July 2012 Contents Foreward by the Home Secretary...3 1. Introduction...5 2. National Threats...8 3. Capacity and contribution...9 4. Capability...11 5. Consistency...12
CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES
CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer
5. The Model Strategies and Practical Measures are aimed at providing de jure and de
MODEL STRATEGIES AND PRACTICAL MEASURES ON THE ELIMINATION OF VIOLENCE AGAINST WOMEN IN THE FIELD OF CRIME PREVENTION AND CRIMINAL JUSTICE 1. The multifaceted nature of violence against women suggests
Management Information Systems Role in Decision-Making During Crises: Case Study
Journal of Computer Science 6 (11): 1247-1251, 2010 ISSN 1549-3636 2010 Science Publications Management Information Systems Role in Decision-Making During Crises: Case Study Saleh Al-Zhrani Department
K - 12 Principal & Superintendent
BOSA COMPETENCY MATRIX Minnesota Administrative Licensure K - 12 Principal & Superintendent WINONA STATE UNIVERSITY COLLEGE OF EDUCATION DEPARTMENT OF EDUCATIONAL LEADERSHIP Name: Place of Employment Mailing
Meeting the degree requirements is the student s responsibility.
ACADEMIC REQUIREMENTS Please note that these requirements apply to students entering Vesalius College during the academic year 2014/15. Students who entered in previous years are bound by the requirements
Graduate Business Programs SDSU College of Business Administration. MBA Program of Study Worksheet. Entrepreneurship Specialization
Graduate Business Programs SDSU College of Business Administration MBA Program of Study Worksheet Entrepreneurship Specialization MBA Program of Study Worksheet: Entrepreneurship Specialization The MBA
International Diploma in Risk Management Syllabus
International Diploma in Risk Management Syllabus Module 1: Principles of Risk and Risk Management The aim of this module is to provide an introduction to the principles and concepts of risk and risk management.
Foresight Security Scenarios for Prepared Response to the Unplanned: Results from an EU Security Research Project and its Transatlantic Dimension
Foresight Security Scenarios for Prepared Response to the Unplanned: Results from an EU Security Research Project and its Transatlantic Dimension National Homeland Security Conference 2014, Philadelphia,
ICS for LAUSD EOC and DOC Operation
ICS for LAUSD EOC and DOC Operation Below is some background information on the Incident Command System (used at our schools and in other field operations) and how it applies in an EOC environment. From
What will I study? Year One core modules currently include:
What will I study? Year One core modules currently include: Introduction to Psychology You will examine how psychology research is conducted and interpreted; a range of perspectives in psychology, including
Executive Leadership MBA Course Descriptions
Executive Leadership MBA Course Descriptions MBA 608: Interpersonal Leadership and Managing Organizational Behavior (3 credits) This course provides rising stars learning opportunities to take the next
OPTIMUS SBR. Optimizing Results with Business Intelligence Governance CHOICE TOOLS. PRECISION AIM. BOLD ATTITUDE.
OPTIMUS SBR CHOICE TOOLS. PRECISION AIM. BOLD ATTITUDE. Optimizing Results with Business Intelligence Governance This paper investigates the importance of establishing a robust Business Intelligence (BI)
Exploring the Antecedents of Electronic Service Acceptance: Evidence from Internet Securities Trading
Exploring the Antecedents of Electronic Service Acceptance: Evidence from Internet Securities Trading Siriluck Rotchanakitumnuai Department of Management Information Systems Faculty of Commerce and Accountancy
Reputational risk and crisis management
Reputational risk and crisis management Reputational risk and crisis management The nightmare scenario for a CEO might be a tainted product, a deadly accident or a humiliating scandal. Within days, or
How Social Media will Change the Future of Banking Services
DOI: 10.7763/IPEDR. 2013. V65. 1 How Social Media will Change the Future of Banking Services Iwa Kuchciak 1 1 University of Lodz Abstract. Parallel with the growth of importance of social media there is
