76 research outputs found

    An Industrial Application of Business Intelligence Approach to the Electronic Defence Sector

    Get PDF
    In the age of digital transformation, the availability of data is growing ex-ponentially leading companies to struggle in processing big data while not missing out useful insights to focus on their business development strate-gy. In this scenario, always more often companies are making use of Busi-ness Intelligence platforms that could allow them to collect, analyses and disseminate data in real time to face the dynamic of the market. This paper aims to apply a Business Intelligence approach that adopts OSINT (open-source intelligence) and SOCMINT (Social Media Intelligence) techniques to Defence Electronics Market to analyse how this technology could facili-tate Companies decision-making process by providing them with a distinct competitive advantage. In this frame we used QUIPO intelligence platform for an industrial scenario analysis in the Defence Electronics sector. This is an initial research to study the correlation between the experimental OSINT analysis carried out by the intelligence platform and the information based on the internal experience and know-how of the company for the use case study

    Muckraker websites (American and European examples)

    Get PDF
    The goal of the article is to compare contemporary websites used by investigative reporters for organising their inquiries and propagating their outcomes. To achieve that goal, I compare the experiences of American and European muckrakers in conducting investigative activities through websites. I analysed 10 such projects in total, 3 from the USA and 7 from Europe. The discussed criteria include the modes of financing, the size of annual budgets, the modes of operation, and HR policies.The goal of the article is to compare contemporary websites used by investigative reporters for organising their inquiries and propagating their outcomes. To achieve that goal, I compare the experiences of American and European muckrakers in conducting investigative activities through websites. I analysed 10 such projects in total, 3 from the USA and 7 from Europe. The discussed criteria include the modes of financing, the size of annual budgets, the modes of operation, and HR policies

    Fighting organized crime through open source intelligence: regulatory strategies of the CAPER Project

    Get PDF
    OSINT stands for Open Source Intelligence. The CAPER project has built an OSINT solution oriented to the prevention of organised crime. We offer in this paper an overall view of some results, embedding into the system legal and ethical issues raised by the General Data Reform Package (GDRP) in Europe. We briefly describe CAPER architecture, workflow, functionalities, modules and ontologies (European LEAs Interoperability ELIO, and Multi-Lingual Crime Ontology MCO). This paper is focused on the indirect strategy to flesh out Privacy by Design principles (PbD) through the Caper Regulatory Model (CRM)

    Documentar lo invisible: Cómo el activismo de datos llena los vacíos visuales

    Get PDF
    This article examines, from the perspective of data activism, how some organizations are developing new languages to talk about invisibility, disappearance, and liminality. To do this, it uses open source intelligence (known as OSINT), maps, and public and citizen data. Examining four pioneering projects which incorporate these practices (Forensic Architecture, Bellingcat, Syrian Archive, and the work of activist María Salguero), the article discusses how technologies such as OSINT and maps can serve to chart the previously unmapped and, by doing so, shed light on the agency and destinies of invisible people. Facing traditional ways of talking about abuse and suffering in documentaries, this type of data activism offers counter-narratives that renew the visual language to deal with human rights abuses. By embracing OSINT and maps to visualize disappearance, data activism has gained the precision of digital tools and has influenced investigative and journalistic practices. This analysis also suggests that OSINT and digital cartography could be part of a renewal in documentary production.; Este artículo examina, desde la perspectiva del activismo de datos, cómo algunas organizaciones están desarrollando nuevos lenguajes para hablar sobre la invisibilización, la desaparición y la liminalidad. Para ello, estas emplean la inteligencia de fuentes abiertas (conocida como Open Source Intelligence [OSINT, por sus siglas en inglés]), los mapas y los datos públicos y ciudadanos. Al examinar cuatro proyectos pioneros en la incorporación de estas prácticas (Forensic Architecture, Bellingcat, Syrian Archive y el trabajo de la activista María Salguero), el artículo plantea cómo tecnologías como la OSINT y los mapas pueden servir para mapear lo antes no cartografiado y, de esta forma, arrojar luz sobre la agencia y los destinos de personas invisibilizadas. Frente a las formas tradicionales de hablar sobre los abusos y el sufrimiento en los documentales, este tipo de activismo de datos ofrece contra-narrativas que renuevan el lenguaje visual para tratar sobre abusos de derechos humanos. Al adoptar OSINT y mapas para visualizar la desaparición, el activismo de datos ha adquirido la precisión de las herramientas digitales y ha influido en las prácticas periodísticas y de investigación. Este análisis también sugiere que OSINT y la cartografía digital podrían ser parte de una renovación en la producción documental

    The Threat of Offensive AI to Organizations

    Get PDF
    AI has provided us with the ability to automate tasks, extract information from vast amounts of data, and synthesize media that is nearly indistinguishable from the real thing. However, positive tools can also be used for negative purposes. In particular, cyber adversaries can use AI to enhance their attacks and expand their campaigns. Although offensive AI has been discussed in the past, there is a need to analyze and understand the threat in the context of organizations. For example, how does an AI-capable adversary impact the cyber kill chain? Does AI benefit the attacker more than the defender? What are the most significant AI threats facing organizations today and what will be their impact on the future? In this study, we explore the threat of offensive AI on organizations. First, we present the background and discuss how AI changes the adversary’s methods, strategies, goals, and overall attack model. Then, through a literature review, we identify 32 offensive AI capabilities which adversaries can use to enhance their attacks. Finally, through a panel survey spanning industry, government and academia, we rank the AI threats and provide insights on the adversaries

    Competitive Intelligence and Academic Entrepreneurship as Innovative Vectors of a Resilient, Business-Oriented Education

    Get PDF
    Purpose – The present paper substantiates that the concepts of competitive intelligence and academic entrepreneurship are genuinely connected to the modern society and, through their perpetual and versatile evolution, have an important role in moving the development on the right way. Design/methodology/approach – Their evolutive is completed by a comparative analysis as appropriate method to point out similarities and differences and identify the way their application may serve innovation as a tool for those activating in the related domains of education, within our highly dynamic world. Findings – The development of the concepts is meant to link and accelerate the technological and operational innovation to a highly competitive academic environment, business-oriented, as a contribution to its wide potential for profit. Originality/value – The correlation between the two concepts provides an innovative tool able to serve as a platform helping the competitive intelligence, as design and functions, for any academic entrepreneurship business-oriented

    NLP-Based Techniques for Cyber Threat Intelligence

    Full text link
    In the digital era, threat actors employ sophisticated techniques for which, often, digital traces in the form of textual data are available. Cyber Threat Intelligence~(CTI) is related to all the solutions inherent to data collection, processing, and analysis useful to understand a threat actor's targets and attack behavior. Currently, CTI is assuming an always more crucial role in identifying and mitigating threats and enabling proactive defense strategies. In this context, NLP, an artificial intelligence branch, has emerged as a powerful tool for enhancing threat intelligence capabilities. This survey paper provides a comprehensive overview of NLP-based techniques applied in the context of threat intelligence. It begins by describing the foundational definitions and principles of CTI as a major tool for safeguarding digital assets. It then undertakes a thorough examination of NLP-based techniques for CTI data crawling from Web sources, CTI data analysis, Relation Extraction from cybersecurity data, CTI sharing and collaboration, and security threats of CTI. Finally, the challenges and limitations of NLP in threat intelligence are exhaustively examined, including data quality issues and ethical considerations. This survey draws a complete framework and serves as a valuable resource for security professionals and researchers seeking to understand the state-of-the-art NLP-based threat intelligence techniques and their potential impact on cybersecurity
    corecore