Search

1 to 4 of 4
Sort by

Blog Entry
Automatic Fraud Triangle Analytics made possible with Text-Mining and Content Analytics

Economic crimes such as corruption and fraud are difficult to detect and prevent, but the financial and reputational consequences and the growing public and political demand for harsh action on corporates whose employees break the law are forcing companies to review their security and compliance...

Johannes Scholtes's profile image

Blog Entry
Fraud and Abuse are Bad – But Disease and Death are Worse

A January 8 story in The New York Times shone a bright light on the perils of implementation for electronic health records. “The report was critical of the lack of guidelines around the widely used copy-and-past function…available in many of the largest EHR systems. The...

Greg Bartels's profile image

Blog Entry
The Essential Role of Technology for Law Enforcement and Internal Investigations

Almost every crime leaves a proverbial “paper trail”, but when the probative information spans a vast volume of confiscated documents, electronic records, e-mail, wiretap transcripts, observation reports, cold cases, intelligence, information from telecom and internet providers,...

Johannes Scholtes's profile image

Blog Entry
Who is Guarding the File Cabinet?

As records managers gain unprecedented clout within organizations, it is inevitable that they also come under more scrutiny. Which begs the question: “Who is guarding the file cabinet?” Records managers aren’t saints, even if most have similar patience in order to deal...

Dan Elam's profile image