Browsing All Posts filed under »Text Mining«

Risk Analysis and Legacy Data: How to make your Big Data Defensible

March 27, 2014

0

Every company and government organisation has defined goals, targets and strategies for their success or growth, with established timelines for each proposed deliverable. But along the way, all types of terrible events can take place which may jeopardize these strategies and prevent the achievement of these goals and targets. We cannot prevent or foresee all […]

Protecting your Intellectual Property

March 17, 2014

0

In today’s global economy the value of an enterprise’s Intellectual Property (IP) assets is very important. In many companies however, IP is not only stored in well protected or encrypted repositories, but also resides on personal computers, laptops, home computers, removable storage, in cloud locations such as BOX.net or in personal email boxes. This vast […]

Dealing with Documents in other Languages

January 28, 2014

0

High-stake investigations and eDiscovery projects are not limited by national boundaries and no investigator can afford to miss relevant information because it is in a foreign language and the cost of translation is too high. Multi-lingual text collection hide more complexities than it initially look like, because, in addition to differences in character sets and […]

Automatic Fraud Triangle Analytics made possible with Text-Mining and Content Analytics

January 21, 2014

0

Economic crimes such as corruption and fraud are difficult to detect and prevent, but the financial and reputational consequences and the growing public and political demand for harsh action on corporates whose employees break the law are forcing companies to review their security and compliance policies to limit the extent to which fraud can take […]

How Technology can Help Investigators to Discovery the Golden W’s

January 13, 2014

0

The answers to the “Five W’s” that every investigator knows from school form the basis of the complete story of an investigation: • Who is it about? • What happened? • When did it take place? • Where did it take place? • Why did it happen? Some investigators add a sixth and seven question, […]

The Essential Role of Technology for Law Enforcement and Internal Investigations

December 16, 2013

0

Almost every crime leaves a proverbial “paper trail”, but when the probative information spans a vast volume of confiscated documents, electronic records, e-mail, wiretap transcripts, observation reports, cold cases, intelligence, information from telecom and internet providers, handwritten notes, audio files, pictures, video’s and social network posts, it is hard to link and combine all these […]

Protecting privacy essential to protect your organization!

December 10, 2013

0

The Enron Data Set is an industry-standard collection of email data that was previously hosted by EDRM and in 2012 became an Amazon Web Services Public Data Set. The Enron Data Set has served for many years as an industry-standard collection of email data for electronic discovery training and is a valuable public resource for […]