The Fraud Triangle Analytics (FTA) supports corporate security officers and internal auditors with internal investigations on their Big Data collections to prevent and detect fraud as early as possible
Records management and text analytics - a powerful marriage for ECM Thursday, March 21 10:00 Text analytics may be the best kept secret in our industry
Billy Cripe presented Moving Beyond Analytics: Putting Insights into Action. The recent innovation explosion in text analytics, information management and big data have produced unparalleled information gathering and insight mining capabilities
Applying content analytics helps to assuage the risks of Big Data , but also to benefit from the power of Big Data: broad analysis which yields absolute insights
But, it is also possible to develop text mining and other content analytics applications with multi-linguality requirements in mind
However, some text analytics products take a so-called “bag of word” (BOW) approach, in which all words (maybe with the exception of a list of high frequency noise words) are dumped into a mathematical model, without any additional knowledge or interpretation of linguistic patterns and properties such as word order (“a good book” versus “book a good”), synonyms, spelling and syntactical variations, co-references and pronouns resolution or negations
But most importantly, the application of content analytics and other search technology is now getting built-in to specific search applications for eDiscovery, compliance, auditing, and other real-world applications
In addition to requiring redeployed enterprise-search technology, large-scale investigations like these need flexible data identification, - capturing, - collection and - preservation tools, support for many different file formats and languages, data normalization and enrichment tools, content analytics, support for multi-media, open long-term data storage, privacy-, privileged-, health- and other data protection compliance, and flexible disclosure and production tools
Even one of the vendors I spoke to understood that their tools could do so much more if they were employed for insight and analytics, rather than for responding and defending against discovery and compliance issues
In order to determine which custodians are involved and what really went on, you need organized data collections, advanced exploratory search, content analytics and other tools to search and analyze all of your relevant corporate data in real-time
8403 Colesville Rd #1100Silver Spring, MD 20910USA
Phone: (301) 587-8202Toll free: (800) 477-2446Fax: (301) 587-2711Email: hello@aiim.org
JoinBenefitsLearn More
About UsTerms of Use