986 resultados para Intelligence process


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Tämä diplomityö määrittelee teknologiaseurantaprosessin, jolla korkean teknologian yritys voi ohjata toimintaansa. Korkean teknologian yrityksille on olennaista seurata teknologian kehitystä. Tällaiset yritykset tarvitsevat hyvin määritellyn järjestelmän, jolla ne voivat seurata ja ennustaa teknologista kehitystä.Työssä esitetään, että teknologiaseuranta ja kilpailuseuranta (competitive intelligence) ovat business intelligencen osa-alueita, jotka täydentävät ja tukevat toisiaan. Tärkeä havainto on, että business intelligence -prosessi on ennen kaikkea organisaation oppimisprosessi. Tästä seuraa, että minkä tahansa BI-prosessin tulisi perustua niihin prosesseihin, joiden avulla organisaatiot oppivat. Työssä esitetään myös, miten business intelligence, tietojohtaminen (knowledge management) ja organisaatioiden oppiminen liittyvät toisiinsa.Teknologiaseuranta on elintärkeä toiminto korkean teknologian yritykselle; sitä tarvitaan monella strategisen johtamisen osa-alueella, ainakin teknologia-, markkinointi- ja henkilöstöjohtamisessa. Teknologiaseurannan havaitaan myös olevan korkean teknologian yritykselle erittäin tärkeä ydinosaamisalue, jota ei voi kokonaan ulkoistaa.Työssä esitellään teknologiaseurantaprosessi, joka perustuu yleiselle business intelligence -prosessille ja siitä johdetulle kilpailuseurantaprosessille. Työssä myös esitetään ehdotus siitä, kuinka teknologiaseuranta voitaisiin järjestää korkean teknologian yrityksessä. Esitetty ratkaisu perustuu Community of practice -käsitteeseen. Community of practice on vapaaehtoisuuteen perustuva tiimi, jonka jäseniä yhdistää kiinnostus johonkin asiaan ja oppimishalu. Esimerkkiyrityksessä on tunnistettu selkeä tarve yhtenäiseen ja koordinoituun teknologiaseurantaan. Työssä esitetään alustava teknologiaseurantaprosessi esimerkkiyritykselle ja tunnistetaan teknologiaseurantaprosessin asiakkaat ja tekijät.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Dissertação apresentada como requisito parcial para obtenção do grau de Mestre em Estatística e Gestão de Informação

Relevância:

70.00% 70.00%

Publicador:

Resumo:

There is an increasing awareness that the articulation of forensic science and criminal investigation is critical to the resolution of crimes. However, models and methods to support an effective collaboration between these partners are still poorly expressed or even lacking. Three propositions are borrowed from crime intelligence methods in order to bridge this gap: (a) the general intelligence process, (b) the analyses of investigative problems along principal perspectives: entities and their relationships, time and space, quantitative aspects and (c) visualisation methods as a mode of expression of a problem in these dimensions. Indeed, in a collaborative framework, different kinds of visualisations integrating forensic case data can play a central role for supporting decisions. Among them, link-charts are scrutinised for their abilities to structure and ease the analysis of a case by describing how relevant entities are connected. However, designing an informative chart that does not bias the reasoning process is not straightforward. Using visualisation as a catalyser for a collaborative approach integrating forensic data thus calls for better specifications.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

False identity documents represent a serious threat through their production and use in organized crime and by terrorist organizations. The present-day fight against this criminal problem and threats to national security does not appropriately address the organized nature of this criminal activity, treating each fraudulent document on its own during investigation and the judicial process, which causes linkage blindness and restrains the analysis capacity. Given the drawbacks of this case-by-case approach, this article proposes an original model in which false identity documents are used to inform a systematic forensic intelligence process. The process aims to detect links, patterns, and tendencies among false identity documents in order to support strategic and tactical decision making, thus sustaining a proactive intelligence-led approach to fighting identity document fraud and the associated organized criminality. This article formalizes both the model and the process, using practical applications to illustrate its powerful capabilities. This model has a general application and can be transposed to other fields of forensic science facing similar difficulties.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Deliberate fires appear to be borderless and timeless events creating a serious security problem. There have been many attempts to develop approaches to tackle this problem, but unfortunately acting effectively against deliberate fires has proven a complex challenge. This article reviews the current situation relating to deliberate fires: what do we know, how serious is the situation, how is it being dealt with, and what challenges are faced when developing a systematic and global methodology to tackle the issues? The repetitive nature of some types of deliberate fires will also be discussed. Finally, drawing on the reality of repetition within deliberate fires and encouraged by successes obtained in previous repetitive crimes (such as property crimes or drug trafficking), we will argue that the use of the intelligence process cycle as a framework to allow a follow-up and systematic analysis of fire events is a relevant approach. This is the first article of a series of three articles. This first part is introducing the context and discussing the background issues in order to provide a better underpinning knowledge to managers and policy makers planning on tackling this issue. The second part will present a methodology developed to detect and identify repetitive fire events from a set of data, and the third part will discuss the analyses of these data to produce intelligence.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Intelligence from a human source, that is falsely thought to be true, is potentially more harmful than a total lack of it. The veracity assessment of the gathered intelligence is one of the most important phases of the intelligence process. Lie detection and veracity assessment methods have been studied widely but a comprehensive analysis of these methods’ applicability is lacking. There are some problems related to the efficacy of lie detection and veracity assessment. According to a conventional belief an almighty lie detection method, that is almost 100% accurate and suitable for any social encounter, exists. However, scientific studies have shown that this is not the case, and popular approaches are often over simplified. The main research question of this study was: What is the applicability of veracity assessment methods, which are reliable and are based on scientific proof, in terms of the following criteria? o Accuracy, i.e. probability of detecting deception successfully o Ease of Use, i.e. easiness to apply the method correctly o Time Required to apply the method reliably o No Need for Special Equipment o Unobtrusiveness of the method In order to get an answer to the main research question, the following supporting research questions were answered first: What kinds of interviewing and interrogation techniques exist and how could they be used in the intelligence interview context, what kinds of lie detection and veracity assessment methods exist that are reliable and are based on scientific proof and what kind of uncertainty and other limitations are included in these methods? Two major databases, Google Scholar and Science Direct, were used to search and collect existing topic related studies and other papers. After the search phase, the understanding of the existing lie detection and veracity assessment methods was established through a meta-analysis. Multi Criteria Analysis utilizing Analytic Hierarchy Process was conducted to compare scientifically valid lie detection and veracity assessment methods in terms of the assessment criteria. In addition, a field study was arranged to get a firsthand experience of the applicability of different lie detection and veracity assessment methods. The Studied Features of Discourse and the Studied Features of Nonverbal Communication gained the highest ranking in overall applicability. They were assessed to be the easiest and fastest to apply, and to have required temporal and contextual sensitivity. The Plausibility and Inner Logic of the Statement, the Method for Assessing the Credibility of Evidence and the Criteria Based Content Analysis were also found to be useful, but with some limitations. The Discourse Analysis and the Polygraph were assessed to be the least applicable. Results from the field study support these findings. However, it was also discovered that the most applicable methods are not entirely troublefree either. In addition, this study highlighted that three channels of information, Content, Discourse and Nonverbal Communication, can be subjected to veracity assessment methods that are scientifically defensible. There is at least one reliable and applicable veracity assessment method for each of the three channels. All of the methods require disciplined application and a scientific working approach. There are no quick gains if high accuracy and reliability is desired. Since most of the current lie detection studies are concentrated around a scenario, where roughly half of the assessed people are totally truthful and the other half are liars who present a well prepared cover story, it is proposed that in future studies lie detection and veracity assessment methods are tested against partially truthful human sources. This kind of test setup would highlight new challenges and opportunities for the use of existing and widely studied lie detection methods, as well as for the modern ones that are still under development.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

A forensic intelligence process was conducted over cross-border seizures of false identity documents whose sources were partly known to be the same. Visual features of 300 counterfeit Portuguese and French identity cards seized in France and Switzerland were observed and integrated in a structured database developed to detect and analyze forensic links. Based on a few batches of documents known to come from common sources, the forensic profiling method could be validated and its performance evaluated. The method also proved efficient and complementary to conventional means of detecting connections between cases. Cross-border links were detected, highlighting the need for more collaboration. Forensic intelligence could be produced, uncovering the structure of counterfeits' illegal trade, the concentration of their sources and the evolution of their quality over time. In addition, two case examples illustrated how forensic profiling may support specific investigations. The forensic intelligence process and its results will underline the need to develop such approaches to support the fight against fraudulent documents and organized crime.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Data mining can be defined as the extraction of previously unknown and potentially useful information from large datasets. The main principle is to devise computer programs that run through databases and automatically seek deterministic patterns. It is applied in different fields of application, e.g., remote sensing, biometry, speech recognition, but has seldom been applied to forensic case data. The intrinsic difficulty related to the use of such data lies in its heterogeneity, which comes from the many different sources of information. The aim of this study is to highlight potential uses of pattern recognition that would provide relevant results from a criminal intelligence point of view. The role of data mining within a global crime analysis methodology is to detect all types of structures in a dataset. Once filtered and interpreted, those structures can point to previously unseen criminal activities. The interpretation of patterns for intelligence purposes is the final stage of the process. It allows the researcher to validate the whole methodology and to refine each step if necessary. An application to cutting agents found in illicit drug seizures was performed. A combinatorial approach was done, using the presence and the absence of products. Methods coming from the graph theory field were used to extract patterns in data constituted by links between products and place and date of seizure. A data mining process completed using graphing techniques is called ``graph mining''. Patterns were detected that had to be interpreted and compared with preliminary knowledge to establish their relevancy. The illicit drug profiling process is actually an intelligence process that uses preliminary illicit drug classes to classify new samples. Methods proposed in this study could be used \textit{a priori} to compare structures from preliminary and post-detection patterns. This new knowledge of a repeated structure may provide valuable complementary information to profiling and become a source of intelligence.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Under the influence of intelligence-led policing models, crime analysis methods have known of important developments in recent years. Applications have been proposed in several fields of forensic science to exploit and manage various types of material evidence in a systematic and more efficient way. However, nothing has been suggested so far in the field of false identity documents.This study seeks to fill this gap by proposing a simple and general method for profiling false identity documents which aims to establish links based on their visual forensic characteristics. A sample of more than 200 false identity documents including French stolen blank passports, counterfeited driving licenses from Iraq and falsified Bulgarian driving licenses was gathered from nine Swiss police departments and integrated into an ad hoc developed database called ProfID. Links detected automatically and systematically through this database were exploited and analyzed to produce strategic and tactical intelligence useful to the fight against identity document fraud.The profiling and intelligence process established for these three types of false identity documents has confirmed its efficiency, more than 30% of documents being linked. Identity document fraud appears as a structured and interregional criminality, against which material and forensic links detected between false identity documents might serve as a tool for investigation.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Thisthesis supplements the systematic approach to competitive intelligence and competitor analysis by introducing an information-processing perspective on management of the competitive environment and competitors therein. The cognitive questions connected to the intelligence process and also the means that organizational actors use in sharing information are discussed. The ultimate aim has been to deepen knowledge of the different intraorganizational processes that are used in acorporate organization to manage and exploit the vast amount of competitor information that is received from the environment. Competitor information and competitive knowledge management is examined as a process, where organizational actorsidentify and perceive the competitive environment by using cognitive simplification, make interpretations resulting in learning and finally utilize competitor information and competitive knowledge in their work processes. The sharing of competitive information and competitive knowledge is facilitated by intraorganizational networks that evolve as a means of developing a shared, organizational level knowledge structure and ensuring that the right information is in the right place at the right time. This thesis approaches competitor information and competitive knowledge management both theoretically and empirically. Based on the conceptual framework developed by theoretical elaboration, further understanding of the studied phenomena is sought by an empirical study. The empirical research was carried out in a multinationally operating forest industry company. This thesis makes some preliminary suggestions of improving the competitive intelligence process. It is concluded that managing competitor information and competitive knowledge is not simply a question of managing information flow or improving sophistication of competitor analysis, but the crucial question to be solved is rather, how to improve the cognitive capabilities connected to identifying and making interpretations of the competitive environment and how to increase learning. It is claimed that competitive intelligence can not be treated like an organizational function or assigned solely to a specialized intelligence unit.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

La fabrication, la distribution et l'usage de fausses pièces d'identité constituent une menace pour la sécurité autant publique que privée. Ces faux documents représentent en effet un catalyseur pour une multitude de formes de criminalité, des plus anodines aux formes les plus graves et organisées. La dimension, la complexité, la faible visibilité, ainsi que les caractères répétitif et évolutif de la fraude aux documents d'identité appellent des réponses nouvelles qui vont au-delà d'une approche traditionnelle au cas par cas ou de la stratégie du tout technologique dont la perspective historique révèle l'échec. Ces nouvelles réponses passent par un renforcement de la capacité de comprendre les problèmes criminels que posent la fraude aux documents d'identité et les phénomènes qui l'animent. Cette compréhension est tout bonnement nécessaire pour permettre d'imaginer, d'évaluer et de décider les solutions et mesures les plus appropriées. Elle requière de développer les capacités d'analyse et la fonction de renseignement criminel qui fondent en particulier les modèles d'action de sécurité les plus récents, tels que l'intelligence-led policing ou le problem-oriented policing par exemple. Dans ce contexte, le travail doctoral adopte une position originale en postulant que les fausses pièces d'identité se conçoivent utilement comme la trace matérielle ou le vestige résultant de l'activité de fabrication ou d'altération d'un document d'identité menée par les faussaires. Sur la base de ce postulat fondamental, il est avancé que l'exploitation scientifique, méthodique et systématique de ces traces au travers d'un processus de renseignement forensique permet de générer des connaissances phénoménologiques sur les formes de criminalité qui fabriquent, diffusent ou utilisent les fausses pièces d'identité, connaissances qui s'intègrent et se mettent avantageusement au service du renseignement criminel. A l'appui de l'épreuve de cette thèse de départ et de l'étude plus générale du renseignement forensique, le travail doctoral propose des définitions et des modèles. Il décrit des nouvelles méthodes de profilage et initie la constitution d'un catalogue de formes d'analyses. Il recourt également à des expérimentations et des études de cas. Les résultats obtenus démontrent que le traitement systématique de la donnée forensique apporte une contribution utile et pertinente pour le renseignement criminel stratégique, opérationnel et tactique, ou encore la criminologie. Combiné aux informations disponibles par ailleurs, le renseignement forensique produit est susceptible de soutenir l'action de sécurité dans ses dimensions répressive, proactive, préventive et de contrôle. En particulier, les méthodes de profilage des fausses pièces d'identité proposées permettent de révéler des tendances au travers de jeux de données étendus, d'analyser des modus operandi ou d'inférer une communauté ou différence de source. Ces méthodes appuient des moyens de détection et de suivi des séries, des problèmes et des phénomènes criminels qui s'intègrent dans le cadre de la veille opérationnelle. Ils permettent de regrouper par problèmes les cas isolés, de mettre en évidence les formes organisées de criminalité qui méritent le plus d'attention, ou de produire des connaissances robustes et inédites qui offrent une perception plus profonde de la criminalité. Le travail discute également les difficultés associées à la gestion de données et d'informations propres à différents niveaux de généralité, ou les difficultés relatives à l'implémentation du processus de renseignement forensique dans la pratique. Ce travail doctoral porte en premier lieu sur les fausses pièces d'identité et leur traitement par les protagonistes de l'action de sécurité. Au travers d'une démarche inductive, il procède également à une généralisation qui souligne que les observations ci-dessus ne valent pas uniquement pour le traitement systématique des fausses pièces d'identité, mais pour celui de tout type de trace dès lors qu'un profil en est extrait. Il ressort de ces travaux une définition et une compréhension plus transversales de la notion et de la fonction de renseignement forensique. The production, distribution and use of false identity documents constitute a threat to both public and private security. Fraudulent documents are a catalyser for a multitude of crimes, from the most trivial to the most serious and organised forms. The dimension, complexity, low visibility as well as the repetitive and evolving character of the production and use of false identity documents call for new solutions that go beyond the traditional case-by-case approach, or the technology-focused strategy whose failure is revealed by the historic perspective. These new solutions require to strengthen the ability to understand crime phenomena and crime problems posed by false identity documents. Such an understanding is pivotal in order to be able to imagine, evaluate and decide on the most appropriate measures and responses. Therefore, analysis capacities and crime intelligence functions, which found the most recent policing models such as intelligence-led policing or problem-oriented policing for instance, have to be developed. In this context, the doctoral research work adopts an original position by postulating that false identity documents can be usefully perceived as the material remnant resulting from the criminal activity undertook by forgers, namely the manufacture or the modification of identity documents. Based on this fundamental postulate, it is proposed that a scientific, methodical and systematic processing of these traces through a forensic intelligence approach can generate phenomenological knowledge on the forms of crime that produce, distribute and use false identity documents. Such knowledge should integrate and serve advantageously crime intelligence efforts. In support of this original thesis and of a more general study of forensic intelligence, the doctoral work proposes definitions and models. It describes new profiling methods and initiates the construction of a catalogue of analysis forms. It also leverages experimentations and case studies. Results demonstrate that the systematic processing of forensic data usefully and relevantly contributes to strategic, tactical and operational crime intelligence, and also to criminology. Combined with alternative information available, forensic intelligence may support policing in its repressive, proactive, preventive and control activities. In particular, the proposed profiling methods enable to reveal trends among extended datasets, to analyse modus operandi, or to infer that false identity documents have a common or different source. These methods support the detection and follow-up of crime series, crime problems and phenomena and therefore contribute to crime monitoring efforts. They enable to link and regroup by problems cases that were previously viewed as isolated, to highlight organised forms of crime which deserve greatest attention, and to elicit robust and novel knowledge offering a deeper perception of crime. The doctoral research work discusses also difficulties associated with the management of data and information relating to different levels of generality, or difficulties associated with the implementation in practice of the forensic intelligence process. The doctoral work focuses primarily on false identity documents and their treatment by policing stakeholders. However, through an inductive process, it makes a generalisation which underlines that observations do not only apply to false identity documents but to any kind of trace as soon as a profile is extracted. A more transversal definition and understanding of the concept and function of forensic intelligence therefore derives from the doctoral work.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Tämän päivän metsäteollisuusyrityksillä on käynnissä kova kansainvälinen kilpailu. Prosessijohtamisen soveltamisella toimintaan mahdollistetaan menesty-minen kiristyvillä markkinoilla. Prosessijohtamista pidetään kilpailukyvyn parantamisen keinona, koska sitä soveltamalla voidaan tehostaa omaa toimintaa ja parantaa asiakaslähtöisyyttä. Tässä työssä esitellään prosessijohtamisen periaatteet ja terminologia yleisesti sekä sovelletaan sitä järjestelmällisesti sanomalehtipaperitehtaan toimintaan. Lisäksi työssä käydään läpi kohdeyrityksen harjoittama Business Intelligence-toiminta (BI) prosessijohtamisen keinoin. Tärkeimpänä tavoitteena työssä on selkeyttää ja lisätä tietoutta prosessijohtamisen toteuttamisesta metsä-teollisuudessa. Tutkimus antaa selkeän kuvan prosessijohtamisesta ja sen käytöstä sanomalehtipaperitehtaan toiminnassa. Diplomityö voi toimia mallina prosessijohtamisen toteuttamisesta toisenlaisessakin toimintaympäristössä yleistettävyytensä ansiosta. Kokonaisvaltainen prosessijohtamisen saattaminen yhtiön toimintaan on yksi työn kohdeyrityksen johdon asettamista tavoitteista ja strategioista toimintansa jatkuvassa kehittämisessä. Prosessijohtamisen soveltamisen hyödyt yhtiölle ovat kiistattomia.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Tämän tutkimuksen tavoitteena oli selvittää miten liiketoimintatiedon hallinnalla voidaan tukea yrityksen strategisen tason johtamista. Lisäksi tavoitteena oli selvittää minkälaisia tietotarpeita yritysjohdolla on liittyen liiketoimintojen johtamiseen ja päätöksentekoon sekä kuinka tietoa tulee tarjota ja esittää, jotta tietoa voitaisiin hyödyntää yrityksen johtamisessa mahdollisimman tehokkaasti. Liiketoimintatiedon hallinta on monitahoinen käsite ja se sisältää sekä prosessit, teknologiat, menetelmät, tietotuotteet ja työkalut liiketoimintaan ja liiketoimintaympäristöön liittyvän tiedon hallintaan, tavoitteena päätöstenteon tukeminen ja kilpailuedun saavuttaminen. Jotta tiedosta olisi mahdollisimman paljon hyötyä yritykselle, tulee sitä hallinnoida ja johtaa päämäärätietoisesti. Tiedon arvo tulee ymmärtää ja tietoa tulee käyttää tavoitteellisesti. Tiedon tulee myös olla merkityksellistä, luotettavaa ja oikea-aikaista. Näihin tavoitteisiin pyritään vastaamaan systemaattisella prosessilla, jota voidaan hallinnoida ja jonka avulla tiedon merkityksellisyys, luotettavuus ja oikea-aikaisuus pyritään varmistamaan. Tutkimuksen empiirisessä osassa kartoitetaan kohdeyrityksen liiketoimintatiedon hallinnan nykytila yritysjohdon näkökulmasta. Tavoitteena empiirisessä osassa on selvittää haastatteluiden avulla johtoryhmän tietotarpeita sekä sitä kuinka tietotarpeet tulevat nykyisin tyydytettyä ja kuinka yritysjohto käyttää ja hyödyntää tietoa. Lopputuloksena teorian ja empiirisen tutkimuksen pohjalta luotiin prosessimalli liiketoimintatiedon hallinnan järjestämiseksi kohdeyrityksessä. Lisäksi empiirisen tutkimuksen pohjalta havaituista kehityskohteista tehtiin toimenpide-ehdotukset, kuinka kyseisiä kohteita tulisi kohdeyrityksessä jatkossa kehittää.