Workshop Series on Open Source Research Methodology in Support of Non-Proliferation

Size: px
Start display at page:

Download "Workshop Series on Open Source Research Methodology in Support of Non-Proliferation"

Transcription

1 The International Centre for Security Analysis The Policy Institute at King s King s College London Workshop Series on Open Source Research Methodology in Support of Non-Proliferation Workshop 1: Exploiting Big Data in Support of Non-Proliferation Workshop Series Funded by the Carnegie Corporation of New York

2 Contents Executive Summary... 2 Introduction : Key Concepts... 4 Defining and Understanding the Concept of Big Data... 4 Big Data and Organisational Culture : Big Data Methodologies and Applications... 6 Quantitative Text Analysis... 6 Satellite Imagery... 7 Identifying Anomalies using Big Data : Legal and Ethical Considerations of Using Big Data : Breakout Group Discussions Breakout Session One: Big Data and Proliferation Networks Breakout Session Two: Big Data and Non-Proliferation Sentiment

3 Executive Summary The workshop discussed a wide-range of issues relating to the potential applications of big data analytics in non-proliferation. A summary of the key discussion points and issues that must be addressed in the future is given below: 1. Big data analytics may provide useful early indicators of anomalies and deviations from normal or expected behaviour with regards to nonproliferation. Detecting early indicators of irregularities or illicit activities can then provide the analyst with the opportunity to investigate these further. Assessing what is considered to be normal activity is a significant challenge. 2. Incorporating big data analytics for non-proliferation into existing analytical frameworks often results in organisational resistance. Organisational roadblocks remain a significant barrier to the implementation of big data methodologies. Demonstrating the value of big data analytics and open source research methodologies is important in overcoming organisational resistance. 3. The successful application of big data methodologies and approaches to nonproliferation issues rests on integrating a varied range of data sources. Collating data sources into a coherent and useful dataset for detailed analysis is vital for the effective use of big data and open source research methodologies. Understanding and effectively utilising existing datasets is as important as incorporating new sources of information. 4. New and underused sources of data may be of significant value for the nonproliferation community when combined with big data analytics. Satellite imagery is one such source of data that could be integrated into existing analytical frameworks. However, costs and processing capabilities remain substantial barriers to the effective adoption of new data sources and research methods. 5. Legal and ethical concerns must be addressed. Legality and ethics must be considered if the use of open source information and big data methodologies is to be fair and lawful in support of non-proliferation. The use of big data analytics and open source research methodologies in nonproliferation has legal and ethical implications which we must recognise. 2

4 Introduction The International Centre for Security Analysis at King s College London is running a four-part workshop series on open source research methodologies in support of nonproliferation. The series is funded by the Carnegie Corporation of New York. It is designed to stimulate discussion on how open source information and research methodologies can help tackle key issues in non-proliferation, including verification and monitoring by the nuclear safeguards community. The workshop series is as follows: 1. Workshop One: the exploitation of big data research methodologies and applications in support of non-proliferation; 2. Workshop Two: the exploitation of financial open source information in support of non-proliferation; 3. Workshop Three: the challenges and solutions to the effective collection and analysis of open source information on states nuclear-relevant scientific and technical capabilities; 4. Workshop Four: the challenges and solutions to the effective collection and analysis of open source information on both state and non-state nuclear nonproliferation strategies. The first workshop on the exploitation of big data in support of non-proliferation was held in Vienna on the 26 th -27 th January The workshop aimed to examine the role of big data analytical tools, research techniques and methodologies for non-proliferation efforts. The workshop approached this topic from a multi-disciplinary perspective drawing upon expertise from: academia, law enforcement, the law and the private sector. A multi-disciplinary approach was deliberately chosen to reflect the diverse approaches to big data which may be of relevance to non-proliferation activities. The workshop also aimed to facilitate the discussion of new open source research methodologies and approaches that may be of use for the non-proliferation community. To achieve this, the workshop was structured as a series of panel presentations and two breakout sessions. The panel presentations were designed to give insights into innovative and interesting applications of big data and open source research methodologies. The breakout sessions sought to stimulate discussion on the practical applications of big data methodologies in support of non-proliferation. The International Centre for Security Analysis would like to thank all the workshop participants for their contributions. 3

5 1: Key Concepts Defining and Understanding the Concept of Big Data Big data is a contested concept with no single overarching definition. Often definitions will refer to the 3Vs : Volume: intuitively, big data as a concept implies that the size of datasets is a key defining characteristic; Velocity: the speed of data generation and processing; Variety: the context of data and the wide range of forms it can take. Additional Vs have been added periodically in variations on the 3Vs definition, including: veracity (data quality) and variability (data inconsistencies). The workshop did not dwell on defining big data; instead, early discussions focussed on how to conceptualise big data in a practical and meaningful way. This enabled the workshop to focus on the more significant questions relating to how big data applications could support and enhance the activities of the non-proliferation community. One intuitive way of thinking about big data and big data methodologies that was discussed centred on conceptualising it as: a process to access, collect and analyse data that is out of reach with current tools and technologies. These tools and technologies have dramatically improved over the last 20 years, enabling more sophisticated processes to analyse ever larger and more complex datasets. However, developments in tools, technologies and methodologies encourage us to attempt to collect, process and analyse ever-larger, out of reach datasets. It is important to recognise that big data methodologies must be dynamic and flexible as datasets increase in size, scope and complexity. Furthermore, many of the discussions emphasised the importance of conceptualising big data not just from the perspective of the developer of capabilities but also from the perspective of end users. The aim should be to develop a clear and comprehensive understanding in the non-proliferation community about what we understand big data to mean and why it has become popular as a concept. Developing this understanding is critical as we are now in a world of exabyte data, a vast amount of information that is hard to comprehend. An intuitive way to grasp this volume of data is to consider the thickness of a note ( inches). An exa quantity of notes, stacked on top of each other, would stretch to the moon and back over 250,000 times. This fact clearly demonstrates that in big data disciplines we are increasingly moving far beyond the capacities of human analysis and testing the limits of computer processing. 4

6 Big Data and Organisational Culture The implementation of big data methodologies within organisations is often a significant challenge and one that a number of the workshop panellists addressed. Discussions throughout the workshop often returned to issues relating to organisational culture. Here a number of the most significant discussions are described, including issues relating to: Organisational control of information; Understanding existing data and integrating new sources of information; Development of big data and open source research methodologies. Existing datasets often exist in silos, controlled by individuals or analytical teams who may be reluctant to share information with their colleagues. Integrating disparate datasets into a single, coherent and intuitive platform is therefore both a technical and organisational challenge. It requires collaborating closely with technical developers to design and implement a platform that analysts can use effectively. It also requires demonstrating to analysts the value of sharing information across departments and analytical teams. A related issue is the procurement and development of big data capabilities; a common problem is an overemphasis on procurement rather than innovation and integration. This then feeds into the problems of big data analytics and technologies that fail to satisfy the requirements of the end user. It is a challenge that is further exacerbated by an institutional resistance or poor understanding of the benefits that effectively developed big data solutions could offer to existing processes. Access to the most interesting or potentially useful datasets is often difficult. Such big datasets are often controlled by organisations and not released due to a number of concerns including: commercial sensitivity or privacy concerns. Furthermore, datasets are not released because organisations find it extremely challenging to place a value on the data they control. Related to this is the concept that organisations should retain an effective control of their data while developing the necessary information technology infrastructure and analytical approaches to maximise the utility of big data methods. An understanding of what datasets are under an organisation s control is important in a rapidly evolving data environment. Developing this understanding will enable an organisation to effectively implement open source research and big data methodologies to unique research problems, for example specific issues in non-proliferation. 5

7 Quantitative Text Analysis Overview 2: Big Data Methodologies and Applications Quantitative text analysis is an expressly quantitative variant of content analysis that uses a statistical measure to monitor word frequency and relevance in a piece of text. The development of quantitative text analysis as a methodology has been fundamentally driven by the large, and growing, volumes of easily accessible and non-copyrighted text available online. The applications of this quantitative text analysis are varied, including: Fast annotation of large volumes of text; Discover associations between text features to shape insight and prediction; Perform event detection or sentiment analysis; Topic tracking in a large corpus of text to identify changes in behaviour over time; Almost limitless industry-specific applications. Applications for Non-Proliferation Quantitative text analysis offers a number of other practical applications that may be relevant to non-proliferation. These include: tracking public opinion on social media; measuring latent political positions or issues frames within political texts. In the second breakout session (see below), the groups discussed the use of sentiment analysis of textual data to predict behaviour and its possible application to provide indications of decision-maker intent and public opinion regarding nuclear security developments. Quantitative text analysis also facilitates more complex analyses of document features such as the frequency a word appears as the object or subject. This creates a document frequency matrix that can be weighted according to key input features and used as a basis for further analysis. Non-proliferation research and analysis often involves collecting, processing and analysing large volumes of unstructured text in a range of file formats. Applying quantitative text analysis methodologies could be used to create structure from unstructured text and enable analyses of keywords, latent political positions. It may also provide a framework for further evaluation by acting as an aid for the analyst faced with processing and analysing large volumes of text. Challenges The workshop addressed the main barriers to implementing quantitative text analysis as one big data approach to analysing large volumes of unstructured text. One of these challenges is the unique and highly technical lexicon of the non-proliferation community; 6

8 to overcome this, linguistics experts could work with non-proliferation analysts to develop a unique dictionary of words relating to non-proliferation. Another set of challenges relates to the practical means of processing and analysing large volumes of text. Primarily, this is not a problem of data storage but rather developing tools and techniques for extracting and structuring typically unstructured texts. A number of techniques have been developed to address this challenge. One such development is the use of natural language processing to extract and structure useful data from unstructured texts. Furthermore, assessing proliferation risks requires the analysis of large quantities of text in multiple languages. This poses an additional challenge to the application of quantitative text analysis methodologies which predominantly focus on languages written in the Roman script. Techniques often use the white spaces between words to parse sentences but this method will face challenges in other languages where sentences are constructed very differently in terms of grammar and non-roman scripts are used for written text. Satellite Imagery Overview The non-proliferation community already uses satellite imagery in support of its analysis and evaluation of proliferation issues. There are likely to be growing opportunities to capitalise on the falling cost, increased resolution and intra-daily monitoring capabilities of commercial satellite imagery. However, it is important to recognise that the integration of satellite imagery into existing analyses may pose unique legal and ethical challenges (see discussion on legal issues below). Applications for Non-Proliferation Although the non-proliferation community already uses satellite imagery to complement other information sources, further integration may be beneficial. In particular, the ability to monitor a particular area of interest over an extended period of time using satellite imagery will produce a time-series library of data. This library of information can then be cross-referenced against other sources of information to develop a more comprehensive understanding of activities. One particular area where satellite imagery may complement existing information sources is through the integration of time-series imagery with trade data collected from a range of sources. This could provide the analyst with not only a richer picture of activity in a given location but also a more detailed understanding of trade networks, supply chains and the movement of goods across the Earth s surface. Discussions again touched on whether satellite imagery, especially time-series imagery, may be able to provide indicators of anomalies or deviations from typical behaviour and activity. 7

9 Identifying Anomalies using Big Data Overview One of the most discussed concepts in the workshop was the potential applications of big data in identifying anomalies or early indicators of illicit non-proliferation activity. By identifying and flagging anomalies to the analyst, big data methodologies may be most useful as a guide for further analytical or investigative work. Methods to do this effectively rely on a thorough understanding of existing datasets within an organisation and integrating these across teams. Providing a single portal to search across all structured and unstructured documents will enable analysts to use existing data more effectively to identify anomalies, inconsistencies or suspicious activities. Applications for Non-Proliferation Using big data analytics to identify anomalies in activity or reporting may be a useful application for non-proliferation. In particular, an experienced analyst may benefit from a system that uses big data techniques to search across datasets to identify possible anomalies that the analyst can analyse further. This may become especially important as analysts face ever greater volumes of information to process and analyse most of which is likely to be noise rather than signal. Practical applications of big data in identifying anomalies, red flags or proliferation risk factors were discussed in the first breakout session which centred on analysing state and non-state actor proliferation networks (see below). The use of big data for anomaly detection is one avenue the workshop identified as a potentially useful area of further research in the non-proliferation community. Challenges Discussions on the applications of big data in this regard also identified potential limitations. Using big data analytics to identify anomalies in behaviour or activities may only be useful in specific contexts. For example, discussions during the workshop questioned how reliable or useful this approach would be in identifying anomalous behaviour by individuals or small groups of people, for example small proliferation networks. It was suggested that it may be more productive to integrate anomaly-seeking and behavioural approaches in the analysis of state activity and behaviour rather than nonstate actors. However, in both cases, a key challenge will be developing a process to accurately understand and articulating what is meant by normal behaviour or activity so that analysts may identify any deviations from this expected result. 8

10 3: Legal and Ethical Considerations of Using Big Data Introduction The use of big data analytics raises a host of legal and ethical concerns that, in recent years, have centred on the issue of privacy. All of the panels touched on the issue of privacy with a number of interesting points raised: Privacy is a critical issue but one which is difficult to assess. In particular, framing big data analytics in terms of privacy automatically primes privacy concerns in analysts which may affect the nature and output of research and analysis; The most interesting, valuable or useful datasets are often controlled and not released, in part because of concerns over privacy; There is a global debate, particularly evident in the European Union, regarding an individual s right to control how their personally identifiable data is used; The process of collecting, transferring and analysing datasets from across the globe is complex and involves the need to comply with different laws regarding data usage across multiple jurisdictions; Using insights gleaned from personal data captured by big data analytics could be problematic due to an individual s right to remain anonymous under EU law. Big Data and the Existing Non-Proliferation Legal Framework The non-proliferation legal regime rests on three key areas: 1. Treaties and agreements; 2. Export control laws; 3. Interruption and interdiction. These three are fundamental to the goal of preventing proliferation but efforts in these three areas tend to be disaggregated and further complicated by different international and domestic legal approaches. The problems posed by a disaggregated approach and different legal regimes makes integrating big data analytics and methodologies particularly challenging. More practically it may be very difficult to use big data techniques and methodologies to quantify or measure the intent of an individual to proliferate. Even if big data analytics can be used to identify proliferation activities the path to prosecution is difficult. The reliance on international agreements and the difficulty in securing extradition are significant barriers to effective prosecution. This has led to alternative legal and political approaches, especially economic sanctions, which have had some success in preventing companies and individuals from accessing the US market. 9

11 Implications for Non-Proliferation To effectively guide the use of big data by organisations requires the implementation of big ethics or big guidance principles. These must relate to the collection, retention and use of data as well as the protection of that data from external threats. The collection, analysis and retention of any data that can be considered personal data raise a number of legal and ethical challenges for the non-proliferation community to address. The retention of any such data must be fair and lawful; this means it must be upto-date, accurate and held for no longer than is necessary. This imposes additional costs on organisations which must institute effective and comprehensive safeguards to mitigate the risk of a data breach. The need to comply with local, national and international laws on data protection through the anonymisation or de-identification of personal data may, in some cases, be prohibitively time-consuming and expensive. Such costs must be weighed against the anticipated benefits offered by big data methodologies for nonproliferation. New forms of data that may be of use in non-proliferation analysis also pose new legal and ethical challenges. For instance, satellite imagery offers non-proliferation analysts the opportunity to monitor sites and facilities of interest. However, as the capabilities of commercial satellite companies develop, particularly in higher resolution imagery, legal concerns regarding surveillance and privacy could arise. Discussions during the workshop also focused on the dichotomy between technical and non-technical challenges. Significant time and research effort has centred on understanding and overcoming technological barriers to the application of big data methodologies. However, less attention has been paid to the non-material, non-technical challenges relating to the use of big data in support of non-proliferation, especially: Governance: current approaches tend to be focused on existing developments rather than anticipating future innovations and developments; Regulation: related to governance, regulation of 21 st century innovations and technological developments is typically carried out by 20 th century institutions, laws and norms; Fragmentation: big data analytics are seen as a solution to challenges across a multitude of disciplines; if true we require big data analytics to be simultaneously highly flexible and very context specific. Addressing these issues involves not only developing new technologies and approaches but also instituting new legal and organisational structures. 10

12 4: Breakout Group Discussions Breakout Session One: Big Data and Proliferation Networks Outline The first breakout session attempted to understand the applications of big data methodologies and analytics to the challenge of identifying and analysing proliferation networks. This was a broad starting point for a discussion on a range of topics, including: The differences between state and non-state proliferation networks and activities and how these differences affect the implementation of big data analytics; Whether big data analytics may be able to identify anomalies or suspicious proliferation activity that uses the avenues of legitimate commerce; The important distinction between using big data to assess the capability to carry out proliferation activities and its use in assessing the intent to proliferate. Discussion A key focus of the three breakout groups was the potential applications of big data analytics in pattern recognition and anomaly detection in large, disparate datasets. This approach requires not only the implementation of effective analytical approaches but also a comprehensive assessment of existing datasets and the integration of new sources of data as they arise. Discussions emphasised the important differences between state and non-state proliferation networks which affect the analyst s ability to identify anomalous behaviour or to even characterise what is considered to be normal behaviour. The discussion also identified practical steps to enable a more effective integration of big data into non-proliferation activities. Discussions focused on integrating a range of big data analytics where appropriate to analyse various stages of proliferation pathways. It is important to ensure that the integration of big data into current analytical methods is both relevant and useful. For example, free text extraction techniques may be useful in achieving understanding and clarity from large sets of proliferation-relevant scientific and technical data. There is already a wealth of information available on issues in relation to nonproliferation issues that could provide richer insights through the application of big data analytics. In particular, big data analytics could be applied to trade data, especially the trade mechanisms for the transfer of sensitive or dual-use technologies. However, there are also areas where the non-proliferation community has little insight. Examples include the dark web, which is a largely untapped resource, and visual data which is needs to be geo-tagged or labelled for analysis. 11

13 Breakout Session Two: Big Data and Non-Proliferation Sentiment Outline: The second breakout session attempted to understand how big data may be used to assess the attitudes of decision-makers and the wider public of a state towards proliferation. This issue formed the basis of a wide-ranging discussion on a number of topics, including: Developing conversational maps using big data analytics to assess change in attitudes and sentiment over time and possibly identify divergences that may indicated covert proliferation-related activities; Big data analytics also offer the ability to identify clusters of activity and sentiment towards specific topic within particular geographic locations to provide indicators of localised behaviour; Challenges to accurately assessing sentiment and attitudes include: language barriers, especially where we are reliant on machine translation; the questionable veracity of some open source information; and the problem of disinformation. Discussion Discussions within groups covered a range of opportunities and challenges to the application of big data methodologies in assessing decision-maker and public attitudes towards non-proliferation. A key focus of these discussions was the importance of assessing disparate pieces of information in conjunction with other sources rather than in isolation. In addition, the group discussions recognised that big data analytics are an aid for the analyst but are not yet sophisticated enough presently to replace human analysis. It is important to train analysts to make sense of, and draw meaningful conclusions from, results derived from big data analytics in the context of non-proliferation. The discussion was conducted with reference to another challenge: assessing the reliability of open source information. A particular point of discussion was the development of an analytical approach to recognise and filter active disinformation from any analysis of sentiment and trends. This is not a unique challenge to big data sentiment analysis and there already exists a developed literature on assessing the reliability, veracity and usefulness of open source information. It was recognised that big data analytics may not be useful in analysing decision-maker sentiment if the volume of non-proliferation relevant data, such as speeches, official statements, is small or subject to government filters. This raises the problem of inherent biases within the relevant dataset. Similar challenges may arise when attempting to assess public sentiment, especially in foreign languages, through the application of open source research methodologies and big data analytics. 12

OPEN SOURCE INFORMATION ACQUISITION, ANALYSIS, AND INTEGRATION IN THE IAEA DEPARTMENT OF SAFEGUARDS 1

OPEN SOURCE INFORMATION ACQUISITION, ANALYSIS, AND INTEGRATION IN THE IAEA DEPARTMENT OF SAFEGUARDS 1 JAMES MARTIN CENTER FOR NONPROLIFERATION STUDIES Twentieth Anniversary Celebration: The Power and Promise of Nonproliferation Education and Training December 3-5, 2009 OPEN SOURCE INFORMATION ACQUISITION,

More information

Data for the Public Good. The Government Statistical Service Data Strategy

Data for the Public Good. The Government Statistical Service Data Strategy Data for the Public Good The Government Statistical Service Data Strategy November 2013 1 Foreword by the National Statistician When I launched Building the Community - The Strategy for the Government

More information

Making Critical Connections: Predictive Analytics in Government

Making Critical Connections: Predictive Analytics in Government Making Critical Connections: Predictive Analytics in Improve strategic and tactical decision-making Highlights: Support data-driven decisions. Reduce fraud, waste and abuse. Allocate resources more effectively.

More information

Predicting the future of predictive analytics. December 2013

Predicting the future of predictive analytics. December 2013 Predicting the future of predictive analytics December 2013 Executive Summary Organizations are now exploring the possibilities of using historical data to exploit growth opportunities The proliferation

More information

Making critical connections: predictive analytics in government

Making critical connections: predictive analytics in government Making critical connections: predictive analytics in government Improve strategic and tactical decision-making Highlights: Support data-driven decisions using IBM SPSS Modeler Reduce fraud, waste and abuse

More information

Health Data Governance: Privacy, Monitoring and Research - Policy Brief

Health Data Governance: Privacy, Monitoring and Research - Policy Brief Health Data Governance: Privacy, Monitoring and Research - Policy Brief October 2015 www.oecd.org/health Highlights All countries can improve their health information systems and make better use of data

More information

Protecting betting integrity

Protecting betting integrity Protecting betting integrity October 2013 1 Introduction 1.1 The UK Gambling Commission (the Commission) was set up under the Gambling Act 2005 to regulate commercial gambling in Great Britain. We are

More information

Insightful Analytics: Leveraging the data explosion for business optimisation. Top Ten Challenges for Investment Banks 2015

Insightful Analytics: Leveraging the data explosion for business optimisation. Top Ten Challenges for Investment Banks 2015 Insightful Analytics: Leveraging the data explosion for business optimisation 09 Top Ten Challenges for Investment Banks 2015 Insightful Analytics: Leveraging the data explosion for business optimisation

More information

London School of Commerce. Programme Specification for the. Cardiff Metropolitan University. Bachelor of Arts (Hons) in Business Studies

London School of Commerce. Programme Specification for the. Cardiff Metropolitan University. Bachelor of Arts (Hons) in Business Studies London School of Commerce Programme Specification for the Cardiff Metropolitan University Bachelor of Arts (Hons) in Business Studies 1 Contents Page 1. Aims and Objectives 3 2. Programme Learning Outcomes

More information

Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire. P3M3 Project Management Self-Assessment

Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire. P3M3 Project Management Self-Assessment Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire P3M3 Project Management Self-Assessment Contents Introduction 3 User Guidance 4 P3M3 Self-Assessment Questionnaire

More information

ENGINEERING COUNCIL. Guidance on Risk for the Engineering Profession. www.engc.org.uk/risk

ENGINEERING COUNCIL. Guidance on Risk for the Engineering Profession. www.engc.org.uk/risk ENGINEERING COUNCIL Guidance on Risk for the Engineering Profession www.engc.org.uk/risk This guidance describes the role of professional engineers and technicians in dealing with risk, and their responsibilities

More information

Big Data Strategy Issues Paper

Big Data Strategy Issues Paper Big Data Strategy Issues Paper MARCH 2013 Contents 1. Introduction 3 1.1 Where are we now? 3 1.2 Why a big data strategy? 4 2. Opportunities for Australian Government agencies 5 2.1 What the future looks

More information

BEST PRACTICES PAPER SHARING AMONG DOMESTIC COMPETENT AUTHORITIES INFORMATION RELATED TO THE FINANCING OF PROLIFERATION

BEST PRACTICES PAPER SHARING AMONG DOMESTIC COMPETENT AUTHORITIES INFORMATION RELATED TO THE FINANCING OF PROLIFERATION BEST PRACTICES PAPER SHARING AMONG DOMESTIC COMPETENT AUTHORITIES INFORMATION RELATED TO THE FINANCING OF PROLIFERATION February 2012 FINANCIAL ACTION TASK FORCE The Financial Action Task Force (FATF)

More information

Roadmapping Discussion Summary. Social Media and Linked Data for Emergency Response

Roadmapping Discussion Summary. Social Media and Linked Data for Emergency Response Roadmapping Discussion Summary Social Media and Linked Data for Emergency Response V. Lanfranchi 1, S. Mazumdar 1, E. Blomqvist 2, C. Brewster 3 1 OAK Group, Department of Computer Science University of

More information

Neil Meikle, Associate Director, Forensic Technology, PwC

Neil Meikle, Associate Director, Forensic Technology, PwC Case Study: Big Data Forensics Neil Meikle, Associate Director, Forensic Technology, PwC 6 November 2012 About me Transferred to Kuala Lumpur from PwC s Forensic Technology practice in London, England

More information

Analyzing survey text: a brief overview

Analyzing survey text: a brief overview IBM SPSS Text Analytics for Surveys Analyzing survey text: a brief overview Learn how gives you greater insight Contents 1 Introduction 2 The role of text in survey research 2 Approaches to text mining

More information

EPSRC Cross-SAT Big Data Workshop: Well Sorted Materials

EPSRC Cross-SAT Big Data Workshop: Well Sorted Materials EPSRC Cross-SAT Big Data Workshop: Well Sorted Materials 5th August 2015 Contents Introduction 1 Dendrogram 2 Tree Map 3 Heat Map 4 Raw Group Data 5 For an online, interactive version of the visualisations

More information

Accountability: Data Governance for the Evolving Digital Marketplace 1

Accountability: Data Governance for the Evolving Digital Marketplace 1 Accountability: Data Governance for the Evolving Digital Marketplace 1 1 For the past three years, the Centre for Information Policy Leadership at Hunton & Williams LLP has served as secretariat for the

More information

Cleaned Data. Recommendations

Cleaned Data. Recommendations Call Center Data Analysis Megaputer Case Study in Text Mining Merete Hvalshagen www.megaputer.com Megaputer Intelligence, Inc. 120 West Seventh Street, Suite 10 Bloomington, IN 47404, USA +1 812-0-0110

More information

POWERFUL SOFTWARE. FIGHTING HIGH CONSEQUENCE CYBER CRIME. KEY SOLUTION HIGHLIGHTS

POWERFUL SOFTWARE. FIGHTING HIGH CONSEQUENCE CYBER CRIME. KEY SOLUTION HIGHLIGHTS ADVANCED CYBER THREAT ANALYTICS POWERFUL SOFTWARE. FIGHTING HIGH CONSEQUENCE CYBER CRIME. Wynyard Advanced Cyber Threat Analytics (ACTA) is a Pro-active Cyber Forensics solution that helps protect organisations

More information

JAMAL EL-HINDI DEPUTY DIRECTOR FINANCIAL CRIMES ENFORCEMENT NETWORK

JAMAL EL-HINDI DEPUTY DIRECTOR FINANCIAL CRIMES ENFORCEMENT NETWORK JAMAL EL-HINDI DEPUTY DIRECTOR FINANCIAL CRIMES ENFORCEMENT NETWORK REMARKS AT THE PARLIAMENTARY INTELLIGENCE SECURITY FORUM JUNE 20, 2016 VIENNA, AUSTRIA Good morning. I would like to thank Congressman

More information

NICE MULTI-CHANNEL INTERACTION ANALYTICS

NICE MULTI-CHANNEL INTERACTION ANALYTICS NICE MULTI-CHANNEL INTERACTION ANALYTICS Revealing Customer Intent in Contact Center Communications CUSTOMER INTERACTIONS: The LIVE Voice of the Customer Every day, customer service departments handle

More information

Basel Committee on Banking Supervision. Working Paper No. 17

Basel Committee on Banking Supervision. Working Paper No. 17 Basel Committee on Banking Supervision Working Paper No. 17 Vendor models for credit risk measurement and management Observations from a review of selected models February 2010 The Working Papers of the

More information

AUSTRAC. supervision strategy 2012 14

AUSTRAC. supervision strategy 2012 14 AUSTRAC supervision strategy 2012 14 Commonwealth of Australia 2012 This work is copyright. You may download, display, print and reproduce this material in unaltered form only (retaining this notice) for

More information

Sentiment Analysis on Big Data

Sentiment Analysis on Big Data SPAN White Paper!? Sentiment Analysis on Big Data Machine Learning Approach Several sources on the web provide deep insight about people s opinions on the products and services of various companies. Social

More information

Threat intelligence visibility the way forward. Mike Adler, Senior Product Manager Assure Threat Intelligence

Threat intelligence visibility the way forward. Mike Adler, Senior Product Manager Assure Threat Intelligence Threat intelligence visibility the way forward Mike Adler, Senior Product Manager Assure Threat Intelligence The modern challenge Today, organisations worldwide need to protect themselves against a growing

More information

Science and Engineering Professional Framework

Science and Engineering Professional Framework Contents: Introduction... 2 Who is the professional framework for?... 2 Using the science and engineering professional framework... 2 Summary of the Science and Engineering Professional Framework... 3

More information

Best practice. Corporate Governance. Financial Reporting Council. July 2013. Audit Tenders. Notes on best practice

Best practice. Corporate Governance. Financial Reporting Council. July 2013. Audit Tenders. Notes on best practice Best practice Corporate Governance Financial Reporting Council July 2013 Audit Tenders Notes on best practice The FRC is responsible for promoting high quality corporate governance and reporting to foster

More information

ICT Perspectives on Big Data: Well Sorted Materials

ICT Perspectives on Big Data: Well Sorted Materials ICT Perspectives on Big Data: Well Sorted Materials 3 March 2015 Contents Introduction 1 Dendrogram 2 Tree Map 3 Heat Map 4 Raw Group Data 5 For an online, interactive version of the visualisations in

More information

At a recent industry conference, global

At a recent industry conference, global Harnessing Big Data to Improve Customer Service By Marty Tibbitts The goal is to apply analytics methods that move beyond customer satisfaction to nurturing customer loyalty by more deeply understanding

More information

Data Refinery with Big Data Aspects

Data Refinery with Big Data Aspects International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 7 (2013), pp. 655-662 International Research Publications House http://www. irphouse.com /ijict.htm Data

More information

The big data dilemma an inquiry by the House of Commons Select Committee on Science and Technology

The big data dilemma an inquiry by the House of Commons Select Committee on Science and Technology The big data dilemma an inquiry by the House of Commons Select Committee on Science and Technology Evidence from the UK Computing Research Committee Definitive. 1 September 2015 The UK Computing Research

More information

Observations on international efforts to develop frameworks to enhance privacy while realising big data s benefits

Observations on international efforts to develop frameworks to enhance privacy while realising big data s benefits Big Data, Key Challenges: Privacy Protection & Cooperation Observations on international efforts to develop frameworks to enhance privacy while realising big data s benefits Seminar arranged by the Office

More information

Compliance Management Framework. Managing Compliance at the University

Compliance Management Framework. Managing Compliance at the University Compliance Management Framework Managing Compliance at the University Risk and Compliance Office Effective from 07-10-2014 Contents 1 Compliance Management Framework... 2 1.1 Purpose of the Compliance

More information

Exemplars. Research Report

Exemplars. Research Report Exemplars Research Report Every effort has been made to trace and contact the authors of these works, but this has not been possible in every case. If notified, we will undertake to rectify any errors

More information

P3M3 Portfolio Management Self-Assessment

P3M3 Portfolio Management Self-Assessment Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire P3M3 Portfolio Management Self-Assessment P3M3 is a registered trade mark of AXELOS Limited Contents Introduction

More information

A Spatial Data Infrastructure for a Spatially Enabled Government and Society

A Spatial Data Infrastructure for a Spatially Enabled Government and Society Chapter 1 A Spatial Data Infrastructure for a Spatially Enabled Government and Society Abbas Rajabifard Centre for Spatial Data Infrastructures and Land Administration, Department of Geomatics, University

More information

WHITEPAPER. Complying with the Red Flag Rules and FACT Act Address Discrepancy Rules

WHITEPAPER. Complying with the Red Flag Rules and FACT Act Address Discrepancy Rules WHITEPAPER Complying with the Red Flag Rules and FACT Act Address Discrepancy Rules May 2008 2 Table of Contents Introduction 3 ID Analytics for Compliance and the Red Flag Rules 4 Comparison with Alternative

More information

Call Recording and Speech Analytics Will Transform Your Business:

Call Recording and Speech Analytics Will Transform Your Business: Easily Discover the Conversations Call Recording and Speech Analytics Will Transform Your Business: Seven Common Business Goals and Speech Analytics Solutions Published January 2012 www.mycallfinder.com

More information

Middlesbrough Manager Competency Framework. Behaviours Business Skills Middlesbrough Manager

Middlesbrough Manager Competency Framework. Behaviours Business Skills Middlesbrough Manager Middlesbrough Manager Competency Framework + = Behaviours Business Skills Middlesbrough Manager Middlesbrough Manager Competency Framework Background Middlesbrough Council is going through significant

More information

UK Government Information Economy Strategy

UK Government Information Economy Strategy Industrial Strategy: government and industry in partnership UK Government Information Economy Strategy A Call for Views and Evidence February 2013 Contents Overview of Industrial Strategy... 3 How to respond...

More information

BIG DATA: PROMISE, POWER AND PITFALLS NISHANT MEHTA

BIG DATA: PROMISE, POWER AND PITFALLS NISHANT MEHTA BIG DATA: PROMISE, POWER AND PITFALLS NISHANT MEHTA Agenda Promise Definition Drivers of and for Big Data Increase revenue using Big Data Power Optimize operations and decrease costs Discover new revenue

More information

Introduction. Chapter 1

Introduction. Chapter 1 Chapter 1 Introduction The area of fault detection and diagnosis is one of the most important aspects in process engineering. This area has received considerable attention from industry and academia because

More information

The Real Questions about. Social Media Monitoring/Web Listening

The Real Questions about. Social Media Monitoring/Web Listening The Real Questions about Social Media Monitoring/Web Listening Should this new marketing discipline be called social media monitoring or web listening? Or any of the other 10 terms identified in this paper?

More information

NEW MEDIA TOOLS AND TECHNIQUES IN CIVILIAN CRISIS MANAGEMENT

NEW MEDIA TOOLS AND TECHNIQUES IN CIVILIAN CRISIS MANAGEMENT ENTRi EUROPE S NEW TRAINING INITIATIVE FOR CIVILIAN CRISIS MANAGEMENT COURSE CONCEPT* for the SPECIALISATION COURSE on: NEW MEDIA TOOLS AND TECHNIQUES IN CIVILIAN CRISIS MANAGEMENT *This Course Concept,

More information

The Australian Public Service Big Data Strategy

The Australian Public Service Big Data Strategy The Australian Public Service Big Data Strategy Improved understanding through enhanced data-analytics capability AIIA response March 2014 Contact for this submission: Suzanne Roche 39 Torrens St Braddon

More information

Text Analytics. A business guide

Text Analytics. A business guide Text Analytics A business guide February 2014 Contents 3 The Business Value of Text Analytics 4 What is Text Analytics? 6 Text Analytics Methods 8 Unstructured Meets Structured Data 9 Business Application

More information

Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning

Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning Niara Security Analytics Automatically detect attacks on the inside using machine learning Automatically detect attacks on the inside Supercharge analysts capabilities Enhance existing security investments

More information

CLOUD ANALYTICS: Empowering the Army Intelligence Core Analytic Enterprise

CLOUD ANALYTICS: Empowering the Army Intelligence Core Analytic Enterprise CLOUD ANALYTICS: Empowering the Army Intelligence Core Analytic Enterprise 5 APR 2011 1 2005... Advanced Analytics Harnessing Data for the Warfighter I2E GIG Brigade Combat Team Data Silos DCGS LandWarNet

More information

RESEARCH PAPER. Big data are we nearly there yet?

RESEARCH PAPER. Big data are we nearly there yet? RESEARCH PAPER Big data are we nearly there yet? A look at the degree to which big data solutions have become a reality and the barriers to wider adoption May 2013 Sponsored by CONTENTS Executive summary

More information

SPECIAL RECOMMENDATION IX: CASH COURIERS DETECTING AND PREVENTING THE CROSS-BORDER TRANSPORTATION OF CASH BY TERRORISTS AND OTHER CRIMINALS

SPECIAL RECOMMENDATION IX: CASH COURIERS DETECTING AND PREVENTING THE CROSS-BORDER TRANSPORTATION OF CASH BY TERRORISTS AND OTHER CRIMINALS )LQDQFLDO$FWLRQ7DVN)RUFH RQ0RQH\/DXQGHULQJ *URXSHGDFWLRQILQDQFLqUH VXUOHEODQFKLPHQWGHFDSLWDX[ '(7(&7,1*$1'35(9(17,1*7+(&5266%25'(5 75$163257$7,212)&$6+%

More information

MBA students develop, or already possess,

MBA students develop, or already possess, Master MBA Leadership of Business Specialisation Administration MBA students develop, or already possess, strong management skills; however the practice of effective leadership is essential for dedicated

More information

BIG DATA FUNDAMENTALS

BIG DATA FUNDAMENTALS BIG DATA FUNDAMENTALS Timeframe Minimum of 30 hours Use the concepts of volume, velocity, variety, veracity and value to define big data Learning outcomes Critically evaluate the need for big data management

More information

UTILIZING COMPOUND TERM PROCESSING TO ADDRESS RECORDS MANAGEMENT CHALLENGES

UTILIZING COMPOUND TERM PROCESSING TO ADDRESS RECORDS MANAGEMENT CHALLENGES UTILIZING COMPOUND TERM PROCESSING TO ADDRESS RECORDS MANAGEMENT CHALLENGES CONCEPT SEARCHING This document discusses some of the inherent challenges in implementing and maintaining a sound records management

More information

EXECUTIVE MASTER IN. Increasing corporate value in today s complex digital world through reputation management and communication with stakeholders.

EXECUTIVE MASTER IN. Increasing corporate value in today s complex digital world through reputation management and communication with stakeholders. EXECUTIVE MASTER IN CORPORATE COMMUNICATION Increasing corporate value in today s complex digital world through reputation management and communication with stakeholders. COURSE DESCRIPTION At a Glance

More information

Attitudes to Use of Social Networks in the Workplace and Protection of Personal Data

Attitudes to Use of Social Networks in the Workplace and Protection of Personal Data Attitudes to Use of Social Networks in the Workplace and Protection of Personal Data David Haynes, City University, School of Informatics, Department of Information Science August 2011 Background Two surveys

More information

Big Workflow: More than Just Intelligent Workload Management for Big Data

Big Workflow: More than Just Intelligent Workload Management for Big Data Big Workflow: More than Just Intelligent Workload Management for Big Data Michael Feldman White Paper February 2014 EXECUTIVE SUMMARY Big data applications represent a fast-growing category of high-value

More information

Find the signal in the noise

Find the signal in the noise Find the signal in the noise Electronic Health Records: The challenge The adoption of Electronic Health Records (EHRs) in the USA is rapidly increasing, due to the Health Information Technology and Clinical

More information

A WHITE PAPER By Silwood Technology Limited

A WHITE PAPER By Silwood Technology Limited A WHITE PAPER By Silwood Technology Limited Using Safyr to facilitate metadata transparency and communication in major Enterprise Applications Executive Summary Enterprise systems packages such as SAP,

More information

Full-time MSc in Retail Management Course structure and content

Full-time MSc in Retail Management Course structure and content Full-time MSc in Retail Management Course structure and content Course modules Term 1 Managing Brands and Consumer Equity Understanding and Managing People and Organisations Integrated Marketing Communications

More information

The Department of Business Innovation and Skills (BIS) Building a responsible payment culture

The Department of Business Innovation and Skills (BIS) Building a responsible payment culture The Chartered Institute of Building submission to The Department of Business Innovation and Skills (BIS) on the consultation Building a responsible payment culture 28 January 2014 Building a Responsible

More information

POSITION DESCRIPTION. Role Purpose. Key Challenges. Key Result Areas

POSITION DESCRIPTION. Role Purpose. Key Challenges. Key Result Areas POSITION DESCRIPTION Position Title Manager, Technical Services Support Position Number Reports to Manager Technology Services Functional Auth HRM Auth Region IT Services Centre Head Office Date Feb 2011

More information

Big Data for Law Firms DAMIAN BLACKBURN

Big Data for Law Firms DAMIAN BLACKBURN Big Data for Law Firms DAMIAN BLACKBURN PUBLISHED BY IN ASSOCIATION WITH Big data means big business By Simon Briskman, partner, technology & outsourcing group, Field Fisher Waterhouse LLP BIG DATA is

More information

Scholarly Use of Web Archives

Scholarly Use of Web Archives Scholarly Use of Web Archives Helen Hockx-Yu Head of Web Archiving British Library 15 February 2013 Web Archiving initiatives worldwide http://en.wikipedia.org/wiki/file:map_of_web_archiving_initiatives_worldwide.png

More information

Machine Data Analytics with Sumo Logic

Machine Data Analytics with Sumo Logic Machine Data Analytics with Sumo Logic A Sumo Logic White Paper Introduction Today, organizations generate more data in ten minutes than they did during the entire year in 2003. This exponential growth

More information

Privacy and Data Protection

Privacy and Data Protection Hewlett-Packard Company 3000 Hanover Street Palo Alto, CA 94304 hp.com HP Policy Position Privacy and Data Protection Current Global State of Privacy and Data Protection The rapid expansion and pervasiveness

More information

Niara Security Intelligence. Overview. Threat Discovery and Incident Investigation Reimagined

Niara Security Intelligence. Overview. Threat Discovery and Incident Investigation Reimagined Niara Security Intelligence Threat Discovery and Incident Investigation Reimagined Niara enables Compromised user discovery Malicious insider discovery Threat hunting Incident investigation Overview In

More information

Navigating Big Data business analytics

Navigating Big Data business analytics mwd a d v i s o r s Navigating Big Data business analytics Helena Schwenk A special report prepared for Actuate May 2013 This report is the third in a series and focuses principally on explaining what

More information

Programme Regulations 2015 16 Business Administration with pathways in Human Resource Management, International Business and Marketing.

Programme Regulations 2015 16 Business Administration with pathways in Human Resource Management, International Business and Marketing. Programme Regulations 2015 16 Business Administration with pathways in Human Resource Management, International Business and Marketing BSc Important document please read This document contains important

More information

Marketing Mix Modelling and Big Data P. M Cain

Marketing Mix Modelling and Big Data P. M Cain 1) Introduction Marketing Mix Modelling and Big Data P. M Cain Big data is generally defined in terms of the volume and variety of structured and unstructured information. Whereas structured data is stored

More information

WHITE PAPER. Five Steps to Better Application Monitoring and Troubleshooting

WHITE PAPER. Five Steps to Better Application Monitoring and Troubleshooting WHITE PAPER Five Steps to Better Application Monitoring and Troubleshooting There is no doubt that application monitoring and troubleshooting will evolve with the shift to modern applications. The only

More information

ViewerPro enables traders to automatically capture the impact of news on their trading portfolios

ViewerPro enables traders to automatically capture the impact of news on their trading portfolios ViewerPro enables traders to automatically capture the impact of news on their trading portfolios Integrate Emerging News into Trading Strategies With ViewerPro, you can automatically identify the impacts

More information

International Open Data Charter

International Open Data Charter International Open Data Charter September 2015 INTERNATIONAL OPEN DATA CHARTER Open data is digital data that is made available with the technical and legal characteristics necessary for it to be freely

More information

Better planning and forecasting with IBM Predictive Analytics

Better planning and forecasting with IBM Predictive Analytics IBM Software Business Analytics SPSS Predictive Analytics Better planning and forecasting with IBM Predictive Analytics Using IBM Cognos TM1 with IBM SPSS Predictive Analytics to build better plans and

More information

Big Data Analytics: 14 November 2013

Big Data Analytics: 14 November 2013 www.pwc.com CSM-ACE 2013 Big Data Analytics: Take it to the next level in building innovation, differentiation and growth 14 About me Data analytics in the UK Forensic technology and data analytics in

More information

RESEARCH REPORT January 2012 Pitney Bowes Software

RESEARCH REPORT January 2012 Pitney Bowes Software RESEARCH REPORT January 2012 Pitney Bowes Software Table of Contents Executive Summary...3 Customer Communications and Channels...4 Approaches to Customer Segmentation...5 Incorporating Social Media...6

More information

Implementation of a Quality Management System for Aeronautical Information Services -1-

Implementation of a Quality Management System for Aeronautical Information Services -1- Implementation of a Quality Management System for Aeronautical Information Services -1- Implementation of a Quality Management System for Aeronautical Information Services Chapter IV, Quality Management

More information

Where does the risk function fit with ethics and compliance Areas of convergence Practical implications and examples

Where does the risk function fit with ethics and compliance Areas of convergence Practical implications and examples The Convergence of Ethics, Compliance and Risk SCCE Annual Conference 2007 Terry Hancock CEO SAI Global Presentation summary 2 Where does the risk function fit with ethics and compliance Areas of convergence

More information

Programme Specification

Programme Specification Programme Specification Title: Accountancy and Finance Final Award: Bachelor of Arts with Honours (BA (Hons)) With Exit Awards at: Certificate of Higher Education (CertHE) Diploma of Higher Education (DipHE)

More information

CEOP Relationship Management Strategy

CEOP Relationship Management Strategy Making every child child matter matter... everywhere... everywhere CEOP Relationship Management Strategy Breaking down the barriers to understanding child sexual exploitation Child Exploitation and Online

More information

STAGE 1 COMPETENCY STANDARD FOR PROFESSIONAL ENGINEER

STAGE 1 COMPETENCY STANDARD FOR PROFESSIONAL ENGINEER STAGE 1 STANDARD FOR PROFESSIONAL ENGINEER ROLE DESCRIPTION - THE MATURE, PROFESSIONAL ENGINEER The following characterises the senior practice role that the mature, Professional Engineer may be expected

More information

E.33 SOI (2009-2014) Statement of Intent. Crown Law For the Year Ended 30 June 2010

E.33 SOI (2009-2014) Statement of Intent. Crown Law For the Year Ended 30 June 2010 E.33 SOI (2009-2014) Statement of Intent Crown Law For the Year Ended 30 June 2010 Contents Foreword: Attorney-General 3 Introduction from the Solicitor-General 4 Nature and Scope of Functions 6 Strategic

More information

National Standards for Disability Services. DSS 1504.02.15 Version 0.1. December 2013

National Standards for Disability Services. DSS 1504.02.15 Version 0.1. December 2013 National Standards for Disability Services DSS 1504.02.15 Version 0.1. December 2013 National Standards for Disability Services Copyright statement All material is provided under a Creative Commons Attribution-NonCommercial-

More information

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 Table of Contents Executive Summary 1 Introduction 2 Our Strategic Goals 2 Our Strategic Approach 3 The Path Forward 5 Conclusion 6 Executive

More information

Get the most value from your surveys with text analysis

Get the most value from your surveys with text analysis PASW Text Analytics for Surveys 3.0 Specifications Get the most value from your surveys with text analysis The words people use to answer a question tell you a lot about what they think and feel. That

More information

THE INFORMATION AUDIT AS A FIRST STEP TOWARDS EFFECTIVE KNOWLEDGE MANAGEMENT: AN OPPORTUNITY FOR THE SPECIAL LIBRARIAN * By Susan Henczel

THE INFORMATION AUDIT AS A FIRST STEP TOWARDS EFFECTIVE KNOWLEDGE MANAGEMENT: AN OPPORTUNITY FOR THE SPECIAL LIBRARIAN * By Susan Henczel INSPEL 34(2000)3/4, pp. 210-226 THE INFORMATION AUDIT AS A FIRST STEP TOWARDS EFFECTIVE KNOWLEDGE MANAGEMENT: AN OPPORTUNITY FOR THE SPECIAL LIBRARIAN * By Susan Henczel Introduction Knowledge is universally

More information

Apigee Insights Increase marketing effectiveness and customer satisfaction with API-driven adaptive apps

Apigee Insights Increase marketing effectiveness and customer satisfaction with API-driven adaptive apps White provides GRASP-powered big data predictive analytics that increases marketing effectiveness and customer satisfaction with API-driven adaptive apps that anticipate, learn, and adapt to deliver contextual,

More information

Data-driven government: Challenges and a path forward

Data-driven government: Challenges and a path forward IBM Analytics White Paper Government Data-driven government: Challenges and a path forward 2 Data-driven government: Challenges and a path forward Contents 2 Executive summary 2 What is data-driven government

More information

Do you have a private life at your workplace?

Do you have a private life at your workplace? Do you have a private life at your workplace? Privacy in the workplace in EC institutions and bodies Giovanni Buttarelli In the course of his supervisory activities, the EDPS has published positions on

More information

Can spreadsheets alone help your business performance excel? How business intelligence dashboards can overcome the issues inherent in spreadsheets

Can spreadsheets alone help your business performance excel? How business intelligence dashboards can overcome the issues inherent in spreadsheets Can spreadsheets alone help your business performance excel? How business intelligence dashboards can overcome the issues inherent in spreadsheets See the bigger picture with Business Intelligence dashboards

More information

OPERA SOLUTIONS CAPABILITIES. ACH and Wire Fraud: advanced anomaly detection to find and stop costly attacks

OPERA SOLUTIONS CAPABILITIES. ACH and Wire Fraud: advanced anomaly detection to find and stop costly attacks OPERA SOLUTIONS CAPABILITIES ACH and Wire Fraud: advanced anomaly detection to find and stop costly attacks 2 The information you need to fight fraud does exist You just have to know it when you see it

More information

Strategically Detecting And Mitigating Employee Fraud

Strategically Detecting And Mitigating Employee Fraud A Custom Technology Adoption Profile Commissioned By SAP and Deloitte March 2014 Strategically Detecting And Mitigating Employee Fraud Executive Summary Employee fraud is a universal concern, with detection

More information

AGIMO BIG DATA STRATEGY ISSUES PAPER. AIIA Response

AGIMO BIG DATA STRATEGY ISSUES PAPER. AIIA Response AGIMO BIG DATA STRATEGY ISSUES PAPER AIIA Response 5 APRIL 2013 2 INTRODUCTION The Australian Information Industry Association (AIIA) is the peak national body representing multinational and domestic suppliers

More information

Article 29 Working Party Issues Opinion on Cloud Computing

Article 29 Working Party Issues Opinion on Cloud Computing Client Alert Global Regulatory Enforcement If you have questions or would like additional information on the material covered in this Alert, please contact one of the authors: Cynthia O Donoghue Partner,

More information

European University Association Contribution to the Public Consultation: Science 2.0 : Science in Transition 1. September 2014

European University Association Contribution to the Public Consultation: Science 2.0 : Science in Transition 1. September 2014 European University Association Contribution to the Public Consultation: Science 2.0 : Science in Transition 1 September 2014 With 850 members across 47 countries, the European University Association (EUA)

More information

This document covers the AHRC s expectations in respect of support and development for Early Career Researchers (ECR).

This document covers the AHRC s expectations in respect of support and development for Early Career Researchers (ECR). 0BAHRC RESEARCH TRAINING FRAMEWORK EARLY CAREER RESEARCHERS 1BIntroduction This document covers the AHRC s expectations in respect of support and development for Early Career Researchers (ECR). AHRC s

More information

How to gather and evaluate information

How to gather and evaluate information 09 May 2016 How to gather and evaluate information Chartered Institute of Internal Auditors Information is central to the role of an internal auditor. Gathering and evaluating information is the basic

More information