Search results

1 – 10 of over 35000
Book part
Publication date: 26 January 2011

Hamilton Bean

This chapter configures resources from the fields of communication studies, intelligence ethics, and organization studies in order to explore whether the collection and analysis…

Abstract

This chapter configures resources from the fields of communication studies, intelligence ethics, and organization studies in order to explore whether the collection and analysis of open source information and subsequent production of open source intelligence constitute an ethical issue. Using an “ethics as practice” perspective, the author finds that tensions surrounding open source collection vis-à-vis U.S. Persons and the “outsourcing” of open source activities among commercial firms create ethical dilemmas and the space for moral agency.

Details

Government Secrecy
Type: Book
ISBN: 978-0-85724-390-4

Keywords

Article
Publication date: 25 July 2008

Craig S. Fleisher

The paper seeks to show how the increasingly popular use of data and information acquired from open sources (OS) impacts competitive and marketing intelligence (C/MI). It…

6530

Abstract

Purpose

The paper seeks to show how the increasingly popular use of data and information acquired from open sources (OS) impacts competitive and marketing intelligence (C/MI). It describes the current state of the art in analysis efforts of open source intelligence (OSINT) in business/commercial enterprises, examines the planning and execution challenges organizations are experiencing associated with effectively using and fusing OSINT in C/MI decision‐making processes, and provides guidelines associated with the successful use of OSINT.

Design/methodology/approach

This is a descriptive, conceptual paper that utilizes and develops arguments based on the search of three unclassified bodies of literature in competitive and marketing intelligence, intelligence processing and marketing analysis.

Findings

Open sources are useful in marketing analyses because they can be easily accessible, inexpensive, quickly accessed and voluminous in availability. There are several conceptual and practical challenges the analyst faces in employing them. These can be addressed through awareness of these issues as well as a willingness to invest resources into studying how to improve the data gathering/analysis interface.

Practical implications

Marketing analysts increasingly rely on open sources of data in developing plans, strategy and tactics. This article provides a description of the challenges they face in utilizing this data, as well as provides a discussion of the effective practices that some organizations have demonstrated in applying and fusing open sources in their C/MI analysis process.

Originality/value

There are very few papers published focusing on applying OSINT in enterprises for competitive and marketing intelligence purposes. More uniquely, this paper is written from the perspective of the marketing analyst and how they use open source data in the competitive and marketing sense‐making process and not the perspective of individuals specialized in gathering these data.

Details

European Journal of Marketing, vol. 42 no. 7/8
Type: Research Article
ISSN: 0309-0566

Keywords

Article
Publication date: 1 August 1999

Athol Yates and Nicholas Zvegintzovi

Open Source Information (OSI) and Open Source Intelligence (OSINT) are attracting enormous interest from the business, military and political intelligence communities. OSI and…

Abstract

Open Source Information (OSI) and Open Source Intelligence (OSINT) are attracting enormous interest from the business, military and political intelligence communities. OSI and OSINT offer the prospect of delivering valuable intelligence, from so‐called open sources such as newspapers, experts, and online databases. While OSI and OSINT may offer considerable potential when employed to produce information on foreign countries, they are totally dependent on the researchers’ and analysts’ understanding of the target country‘s history, politics and society. A research project on the BAM (Baikal‐Amur Mainline) Railway in eastern Siberia provides a practical example of OSI. The project involved researching a book on the BAM (Baikal‐Amur Mainline) Railway in eastern Siberia using OSI alone as it was impossible to visit the region. The 3,084km BAM traverses an almost unpopulated region which had been virtually closed to Westerners since it became a major gulag zone in the 1930s. Once the book’s research was underway, it became clear that much of the English language published material was ill‐informed and contradictory. After the collapse of the Soviet Union and the relaxation of travel restrictions, it was possible to validate the information gathered. This led to a number of surprising findings about the accuracy and comprehensiveness of the material collected outside Russia.

Details

Aslib Proceedings, vol. 51 no. 6
Type: Research Article
ISSN: 0001-253X

Keywords

Article
Publication date: 3 July 2017

Mark Lawrence Ashwell

The purpose of this paper is to highlight the potential of digital transformation and innovation opportunities for intelligence analysis. Its focus is the development of…

3179

Abstract

Purpose

The purpose of this paper is to highlight the potential of digital transformation and innovation opportunities for intelligence analysis. Its focus is the development of individuals to exploit data and information technologies to better understand and counter organised criminal networks.

Design/methodology/approach

The methodology adopted consisted of an extensive literature review and interview with practitioners in digital technology and transformation focused on intelligence, crime and terrorism, plus practical experience and field study.

Findings

Phenomena including the World Wide Web, social media and interconnectedness are influencing all aspects of human activity. Effective digital transformation, focusing on data, information technologies and people bestows significant competitive advantage upon those who have transformed. Applications are making previously complex processes and tasks easier for individuals to understand and exploit. An activity-based intelligence (ABI) model provides a platform for intelligence transformation. ABI provides a foundation from which to better fuse and share data to understand and resolve complex human (wicked) problems. To counter increasingly fast-moving organised crime networks, law enforcement needs to quickly transform.

Originality/value

This paper serves as a guide to alert and educate law enforcement professionals of the potential of digital transformation and associated evolving intelligence processes. It offers an appreciation of the nature of organisations, and the role of innovation within those organisation, required to better appreciate and tackle complex, human network challenges such as organised crime. It reveals the emergence and importance of an increasingly applications-based culture and the potential of this culture to simplify and exploit previously complex, expert-based processes.

Details

Journal of Financial Crime, vol. 24 no. 3
Type: Research Article
ISSN: 1359-0790

Keywords

Abstract

Details

The Emerald Handbook of Modern Information Management
Type: Book
ISBN: 978-1-78714-525-2

Keywords

Book part
Publication date: 7 October 2015

Azizah Ahmad

The strategic management literature emphasizes the concept of business intelligence (BI) as an essential competitive tool. Yet the sustainability of the firms’ competitive…

Abstract

The strategic management literature emphasizes the concept of business intelligence (BI) as an essential competitive tool. Yet the sustainability of the firms’ competitive advantage provided by BI capability is not well researched. To fill this gap, this study attempts to develop a model for successful BI deployment and empirically examines the association between BI deployment and sustainable competitive advantage. Taking the telecommunications industry in Malaysia as a case example, the research particularly focuses on the influencing perceptions held by telecommunications decision makers and executives on factors that impact successful BI deployment. The research further investigates the relationship between successful BI deployment and sustainable competitive advantage of the telecommunications organizations. Another important aim of this study is to determine the effect of moderating factors such as organization culture, business strategy, and use of BI tools on BI deployment and the sustainability of firm’s competitive advantage.

This research uses combination of resource-based theory and diffusion of innovation (DOI) theory to examine BI success and its relationship with firm’s sustainability. The research adopts the positivist paradigm and a two-phase sequential mixed method consisting of qualitative and quantitative approaches are employed. A tentative research model is developed first based on extensive literature review. The chapter presents a qualitative field study to fine tune the initial research model. Findings from the qualitative method are also used to develop measures and instruments for the next phase of quantitative method. The study includes a survey study with sample of business analysts and decision makers in telecommunications firms and is analyzed by partial least square-based structural equation modeling.

The findings reveal that some internal resources of the organizations such as BI governance and the perceptions of BI’s characteristics influence the successful deployment of BI. Organizations that practice good BI governance with strong moral and financial support from upper management have an opportunity to realize the dream of having successful BI initiatives in place. The scope of BI governance includes providing sufficient support and commitment in BI funding and implementation, laying out proper BI infrastructure and staffing and establishing a corporate-wide policy and procedures regarding BI. The perceptions about the characteristics of BI such as its relative advantage, complexity, compatibility, and observability are also significant in ensuring BI success. The most important results of this study indicated that with BI successfully deployed, executives would use the knowledge provided for their necessary actions in sustaining the organizations’ competitive advantage in terms of economics, social, and environmental issues.

This study contributes significantly to the existing literature that will assist future BI researchers especially in achieving sustainable competitive advantage. In particular, the model will help practitioners to consider the resources that they are likely to consider when deploying BI. Finally, the applications of this study can be extended through further adaptation in other industries and various geographic contexts.

Details

Sustaining Competitive Advantage Via Business Intelligence, Knowledge Management, and System Dynamics
Type: Book
ISBN: 978-1-78441-764-2

Keywords

Content available
Book part
Publication date: 15 December 2017

Abstract

Details

The Emerald Handbook of Modern Information Management
Type: Book
ISBN: 978-1-78714-525-2

Article
Publication date: 4 July 2023

Benjamin Scott

This paper aims to examine the history of data leaks and investigative journalism, the techniques and technology that enable them and their influence in Australia and abroad. It…

Abstract

Purpose

This paper aims to examine the history of data leaks and investigative journalism, the techniques and technology that enable them and their influence in Australia and abroad. It explores the ethical and professional considerations of investigative journalists, how they approach privacy and information-sharing and how this differs from intelligence practice in government and industry. The paper assesses the strengths and limitations of Collaborative Investigative Reporting based on Information Leaks (CIRIL) as a kind of public-facing intelligence practice.

Design/methodology/approach

This study draws on academic literature, source material from investigations by the International Consortium of Investigative Journalists and the Organised Crime and Corruption Reporting Project, and a survey of financial crime compliance professionals conducted in 2022.

Findings

The paper identifies three key causal factors that have enabled the rise of CIRIL even as traditional journalism has declined: the digital storage of information; increasing public interest in offshore finance and tax evasion; and “virtual newsrooms” enabled by internet communications. It concludes that the primary strength of CIRIL is its creation of complex global narratives to inform the public about corruption and tax evasion, while its key weakness is that the scale and breadth of the data released makes it difficult to focus on likely criminal activity. Results of a survey of industry and government professionals indicate that CIRIL is generally more effective as public information than as an investigative resource, owing to the volume, age and quality of information released. However, the trends enabling CIRIL are likely to continue, and this means that governments and financial institutions need to become more effective at using leaked information.

Originality/value

Over the past decade, large-scale, data-driven investigative journalism projects such as the Pandora Papers and the Russian Laundromat have had a significant public impact by exposing money laundering, financial crime and corruption. These projects share certain hallmarks: the use of human intelligence, often sourced from anonymous leaks; inventive fusion of this intelligence with data from open sources; and collaboration among a global collective of investigative journalists to build a narrative. These projects prioritise informing the public. They are also an important information source for government and private sector organisations working to investigate and disrupt financial crime.

Details

Journal of Financial Crime, vol. 31 no. 3
Type: Research Article
ISSN: 1359-0790

Keywords

Book part
Publication date: 18 January 2022

Brian McBreen, John Silson and Denise Bedford

This chapter fills a significant gap in the intelligence literature and the knowledge sciences literature by aligning definitions and characterizations of knowledge capital as an…

Abstract

Chapter Summary

This chapter fills a significant gap in the intelligence literature and the knowledge sciences literature by aligning definitions and characterizations of knowledge capital as an essential intelligence source. The chapter also explains how knowledge capital might be leveraged in each of the four capabilities. The chapter presents a well-researched characterization of knowledge capital drawing from international scholars and practitioners’ work. The value of human capital, structural capital, and relational capital in intelligence work is explored.

Details

Organizational Intelligence and Knowledge Analytics
Type: Book
ISBN: 978-1-80262-177-8

Open Access
Article
Publication date: 6 December 2022

Pieter Lagerwaard

In 2019, FIU-the Netherlands celebrated its 25th anniversary. This study takes the occasion to reflect on the role of the FIU in financial surveillance and to describe its core…

2011

Abstract

Purpose

In 2019, FIU-the Netherlands celebrated its 25th anniversary. This study takes the occasion to reflect on the role of the FIU in financial surveillance and to describe its core practices of collecting, analysing and disseminating financial intelligence.

Design/methodology/approach

Because FIU practices are often secret and its transaction data classified as state secrets, the FIU’s daily operational activities remain obscure. Drawing on interviews, public reports and an online training course, this study encircles secrecy and offers a fine-grained analysis of the FIU's core activities.

Findings

The article finds that the FIU plays a pivotal role in financial surveillance because it can operate at various intersections. An FIU operates at the intersection of finance and security, in between the public and private sector and at the national and international domain. This pivotal role makes the FIU indispensable in the surveillance of payment systems and spending behavior.

Social implications

The article poses that the desirability and effectiveness of financial surveillance has to date not received sufficient consideration, while it affects (the privacy of) anyone with a bank account. The article asks: is it ethically justifiable that transaction information is declared suspect, investigated, and shared nationally and internationally, without the individual or entity concerned officially being notified and legally named a suspect?

Originality/value

This case-study is not only relevant for the study of finance/security, AML/CFT and financial surveillance, but also to policy makers and the broader public who merit an understanding of how their financial behaviour is being surveilled.

Details

Journal of Money Laundering Control, vol. 26 no. 7
Type: Research Article
ISSN: 1368-5201

Keywords

1 – 10 of over 35000