Difference between revisions of "Enterprise Intelligence Quarter"

From CNM Wiki
Jump to: navigation, search
(Concepts)
 
(103 intermediate revisions by 2 users not shown)
Line 1: Line 1:
[[Risk Analysis Quarter]] (hereinafter, the ''Quarter'') is the first of four lectures of [[Operations Quadrivium]] (hereinafter, the ''Quadrivium''):
+
[[Enterprise Intelligence Quarter]] (hereinafter, the ''Quarter'') is a lecture introducing the learners to [[organizational research]] primarily through key topics related to [[enterprise intelligence]]. The ''Quarter'' is the second of four lectures of [[Organizational Quadrivium]], which is the last of seven modules of '''[[Septem Artes Administrativi]]''' (hereinafter, the ''Course''). The ''Course'' is designed to introduce the learners to general concepts in [[business administration]], [[management]], and [[organizational behavior]].
*The ''Quarter'' is designed to introduce its learners to [[enterprise discovery]], or, in other words, to concepts related to obtaining data needed to administer the [[enterprise effort]]; and
 
*The ''Quadrivium'' examines concepts of administering various types of enterprises known as [[enterprise administration]] as a whole.
 
 
 
The ''Quadrivium'' is the first of seven modules of [[Septem Artes Administrativi]], which is a course designed to introduce its learners to general concepts in [[business administration]], [[management]], and [[organizational behavior]].
 
  
  
 
==Outline==
 
==Outline==
''The predecessor lecture is [[Market Engagement Quarter]].''
+
''[[Bookkeeping Quarter]] is the predecessor lecture.  In the [[enterprise research]] series, the previous lecture is [[Regulatory Сompliance Quarter]].''
  
 
===Concepts===
 
===Concepts===
 +
#[[File:Enterprise-intelligence.png|400px|thumb|right|[[Enterprise intelligence]]]]'''[[Enterprise intelligence]]'''. [[Intelligence]] that is accountable for taking [[data]] from all [[data source]]s and processing it into useful knowledge in order to identify [[risk]]s, both [[business threat]]s and [[business opportunity|business opportuniti]]es and to provide [[enterprise]]s with actionable insights based on human analysis and data analytics. [[Enterprise intelligence]] is accountable for dealing with [[insider threat]], [[cyber crime]], [[physical crime]], and other threats on the one side, as well as business leads and potentials on the other side.
 +
#*[[File:Knowledge.png|400px|thumb|right|[[Knowledge]]]][[Intelligence]]. (1) The ability to acquire and apply knowledge and skills; (2) The collection of information of military, political, or business value.
 +
#*[[Natural language processing]] (NLP). The ability of computers to understand, or process natural human languages and derive meaning from them. NLP typically involves machine interpretation of text or speech recognition.
 +
#*[[Countersurveillance]]. [[Enterprise effort]]s such as [[covert surveillance]] undertaken to prevent [[surveillance]].
 +
#*[[Single source of truth]].
 +
#'''[[All-source intelligence]]'''. (1) Intelligence products and/or organizations and activities that incorporate all sources of information, most frequently including [[human resources intelligence]], [[imagery intelligence]], [[measurement and signature intelligence]], [[signals intelligence]], and open-source data in the production of finished [[enterprise intelligence]]; (2) In intelligence collection, a phrase that indicates that in the satisfaction of intelligence requirements, all collection, processing, exploitation, and reporting systems and resources are identified for possible use and those most capable are tasked.
 +
#*[[Human resources intelligence]] (HUMINT). The [[intelligence]] derived from the intelligence collection discipline that uses human beings as both sources and collectors, and where the human being is the primary collection instrument.
 +
#*[[Signals intelligence]]. The branch of usually military intelligence concerned with the monitoring, interception, and interpretation of radio signals, radar signals, and telemetry.
 +
#*[[Imagery intelligence]] (IMINT). An intelligence gathering discipline which collects information via satellite and aerial photography. As a means of collecting intelligence, IMINT is a subset of intelligence collection management, which, in turn, is a subset of intelligence cycle management.
 +
#*[[Measurement and signature intelligence]] (MASINT). A technical branch of intelligence gathering, which serves to detect, track, identify or describe the signatures (distinctive characteristics) of fixed or dynamic target sources.
 +
#*[[Customer intelligence]]. Searching for customer opinions in the Internet such as in chats, forums, web pages, and blogs where people express freely about their experiences with products, becoming strong opinion formers.
 +
#'''[[Intelligence data]]'''. [[Enterprise data]] used in [[enterprise intelligence]].
 +
#*[[Known known]]. Any fact or situation which is known or familiar.
 +
#*[[Known unknown]] (or [[identified risk]]). Any [[risk]] that is identified.
 +
#*[[Unknown known]]. Any fact or situation, which is known as existent, but little to no details of it are known.
 +
#*[[Unknown unknown]] (or [[unidentified risk]]). Any [[risk]] that is unidentified.
 +
#'''[[Objective intelligence assumption]]'''.
 +
#*[[Data-collection assumption]]. Data collection is never completely implemented.
 +
#*[[Data-analysis assumption]]. If complete data can be collected, it is never completely analyzed.
 +
#*[[Data-synthesis assumption]]. If complete data analysis can be accomplished, the analysis results are never conclusive.
 +
#*[[Data-presentation assumption]]. If complete data analysis can be accomplished and the analysis results are conclusive, they are never presented properly to decision makers.
 +
#*[[Data-usage assumption]]. If complete data analysis can be accomplished, the analysis results are conclusive and properly presented to decision makers. they are never used for decision-making because of internal or external factors.
 
#'''[[Risk analysis]]'''. Controlling [[residual risk]]s, identifying new risks, executing [[risk response plan]]s, and evaluating their effectiveness throughout an [[enterprise effort]].
 
#'''[[Risk analysis]]'''. Controlling [[residual risk]]s, identifying new risks, executing [[risk response plan]]s, and evaluating their effectiveness throughout an [[enterprise effort]].
 
#*[[Risk event]]. A discrete occurrence that may affect the project for better or worse.
 
#*[[Risk event]]. A discrete occurrence that may affect the project for better or worse.
 
#*[[Trigger]]. Triggers, sometimes called risk symptoms or warning signs, are indications that a risk has occurred or is about to occur. Triggers may be discovered in the risk identification process and watched in the risk monitoring and control process.
 
#*[[Trigger]]. Triggers, sometimes called risk symptoms or warning signs, are indications that a risk has occurred or is about to occur. Triggers may be discovered in the risk identification process and watched in the risk monitoring and control process.
 
#*[[Risk category]]. A source of potential risk reflecting technical, project management, organizational, or external sources.
 
#*[[Risk category]]. A source of potential risk reflecting technical, project management, organizational, or external sources.
#'''[[Risk]]'''. An uncertain event or condition that, if it occurs, has a positive or negative effect on an [[enterprise effort]].
+
#'''[[Risk]]'''. (1) An uncertain event or condition that, if it occurs, has a positive or negative effect on an [[enterprise effort]]; (2) A situation involving exposure to danger.
 
#*[[Secondary risk]]. A risk that arises as a direct result of implementing a risk response.
 
#*[[Secondary risk]]. A risk that arises as a direct result of implementing a risk response.
 
#*[[Residual risk]]. A risk that remains after risk responses have been implemented.
 
#*[[Residual risk]]. A risk that remains after risk responses have been implemented.
#*[[Identified risk]].
+
#[[File:Risk-culture.png|400px|thumb|right|[[Risk culture]]]]'''[[Risk culture]]'''. The part of [[organizational culture]] that accounts for [[risk appetite]], [[risk tolerance]], and [[risk threshold]].
#'''[[Conflict]]'''. A process that begins when one party perceives that another party has negatively affected, or is about to negatively affect, something that the first party cares about.
+
#*[[Risk appetite]]. The degree of uncertainty an [[enterprise]] is willing to take on in anticipation of a reward.
#*[[Conflict]]. Perceived incompatible differences that result in interference or opposition.
+
#*[[Risk tolerance]]. The degree, amount, or volume of the [[risk]] that an [[enterprise]] will withstand.
#*[[Traditional view of conflict]]. The view that all conflict is bad and must be avoided.
+
#*[[Risk threshold]]. The level of impact at which one or more [[stakeholder]]s may have a specific interest. Below the risk threshold, the [[enterprise]] will accept the [[risk]], and above the [[risk threshold]], the [[enterprise]] will not tolerate the risk.
#*[[Human relations view of conflict]]. The view that conflict is a natural and inevitable outcome in any group.
+
#'''[[Competitive intelligence]]'''. The ability to control [[market research]], to identify the data about the competitors, to process the identified data in order to acquire knowledge, and to apply the knowledge towards understanding and anticipating competitors' actions rather than merely react to them.
#*[[Interactionist view of conflict]]. The view that some conflict is necessary for a group to perform effectively.
+
#*[[Competition]]. The activity or condition of competing on the [[market]]. The buyers may compete over purchases of a [[market exchangeable]]; more frequently, the sellers compete over sales of a [[market exchangeable]].
#'''[[Conflict process]]'''. A process that has five stages: (1) [[conflict potential]], potential opposition or incompatibility, (2) [[conflict personalization|cognition and personalization]], (3) [[conflict intention|intention]]s, (4) behavior, and (5) [[conflict outcome|outcome]]s.
+
#*[[Competitive analysis]]. A structured process which captures the key characteristics of an industry to predict the long-term profitability prospects and to determine the practices of the most significant competitors.
#'''[[Conflict potential]]'''.
+
#*[[Competitor analysis]]. Performing an audit or conducting user testing of competing websites and apps; writing a report that summarizes the competitive landscape.
#*[[Dyadic conflict]]. [[Conflict]] that occurs between two people usually on personal grounds.
+
#'''[[Business intelligence]]'''. [[Information]] that managers can use to make more effective strategic decisions.
#*[[Intergroup conflict]]. [[Conflict]] that occurs between different [[group]]s or [[team]]s.
+
#*[[Anonymization]]. The severing of links between people in a database and their records to prevent the discovery of the source of the records, and to maintain privacy and confidentiality.
#*[[Interrole conflict]]. A situation in which the expectations of an individual's different, separate groups are in opposition.
+
#*[[Association]]. A link between two elements or objects in a diagram.
#*[[Intragroup conflict]]. [[Conflict]] that occurs within a [[group]] or [[team]].
+
#*[[Systematic study]]. Looking at relationships, attempting to attribute causes and effects, and drawing conclusions based on scientific evidence.
#*[[Process conflict]]. A [[conflict]] over how work gets done.
+
#*[[Behavioral analytics]]. Using data about people's behavior to understand intent and predict future actions.
#*[[Relationship conflict]]. A [[conflict]] based on interpersonal relationships.
+
#'''[[Data curation]]'''. The management of data throughout its lifecycle, from creation and initial storage to the time when it is archived for posterity or becomes obsolete, and is deleted. The main purpose of [[data curation]] is to ensure that data is reliably retrievable for future research purposes or reuse.
#*[[Role conflict]]. A [[conflict]] that occurs because of divergent role expectations.
+
#*[[Data validation]]. The process of ensuring that [[data]] have undergone data cleansing to ensure they have data quality, that is, that the [[data]] is both correct and useful.
#*[[Task conflict]]. A [[conflict]] over content and goals of the work.
+
#*[[Data gap]]. Indentification of data gaps in available information in reference to a particular procurement.
#'''[[Conflict personalization]]'''.
+
#'''[[Data manipulation]]'''. The action of manipulating [[data]] in a skillful manner.
#*[[Felt conflict]]. Emotional involvement in a conflict that creates anxiety, tenseness, frustration, or hostility.
+
#*[[Filter]]. A mechanism that includes or excludes specific data from reports based upon what the user decides to filter (e.g., to tightly tailor a report, you might strictly want records of customers between the ages of 25 and 35 who like skiing, but you want to exclude everyone else).
#*[[Perceived conflict]]. Awareness by one or more parties of the existence of conditions that create opportunities for conflict to arise.
+
#'''[[Big data]]'''. The vast amount of quantifiable information that can be analyzed by highly sophisticated data processing.
#'''[[Conflict intention]]'''.
+
#*[[Contextual data]]. A structuring of big data that attaches situational contexts to single elements of big data to enrich them with business meaning (e.g., instead of a customer record that tells you the customer's name and address, data appended to this record data also gives the customer's buying preferences, which is gathered from recent web activity data). The result is a more complete understanding of the customer and her lifestyle.
#*[[Collaborating]]. A situation in which the parties to a [[conflict]] each desire to satisfy fully the concerns of all parties.
+
#*[[Multipolar analytics]]. A distributed big data model where data is collected, stored, and analyzed in different areas of the company instead of being centrally located and analyzed.
#*[[Competing]]. A desire to satisfy one's interests, regardless of the impact on the other party of the conflict.
+
#'''[[Data visualization]]'''. A method of putting data in a visual or a pictorial context as a way to assist users in better understanding what the data are telling them (e.g., a map is a way to visualize which areas of the country get the most rainfall).
#*[[Compromising]]. A situation in which each party to a [[conflict]] is willing to give up something.
+
#*[[Data point]]. An individual item on a graph or a chart.
#*[[Accommodating]]. The willingness of one party in a [[conflict]] to place the opponent's interests above his or her own.
+
#'''[[Artificial intelligence]]''' (AI). A field of computer science dedicated to the study of computer software making intelligent decisions, reasoning, and problem solving.
#*[[Avoiding]]. The desire to withdraw from or suppress a [[conflict]].
+
#*[[Strong AI]]. An area of AI development that is working toward the goal of making AI systems that are as useful and skilled as the human mind.
#'''[[Conflict outcome]]'''.
+
#*[[Weak AI]]. Also known as narrow AI, weak AI refers to a non-sentient computer system that operates within a predetermined range of skills and usually focuses on a singular task or small set of tasks. Most AI in use today is weak AI.
#*[[Functional conflict]]. [[Conflict]] that supports the goals of the group and improves its performance.
+
#'''[[Algorithm]]'''. A formula or set of rules for performing a task. In AI, the algorithm tells the machine how to go about finding answers to a question or solutions to a problem.
#*[[Functional conflict]]. A [[conflict]] that supports a group's goals and improve its performance.
+
#*[[AI planning]]. A branch of AI dealing with planned sequences or strategies to be performed by an AI-powered machine. Things such as actions to take, variable to account for, and duration of performance are accounted for.
#*[[Dysfunctional conflict]]. [[Conflict]] that hinders group performance.
+
#*[[Autonomous]]. Autonomy is the ability to act independently of a ruling body. In AI, a machine or vehicle is referred to as autonomous if it doesn't require input from a human operator to function properly.
#*[[Dysfunctional conflict]]. A [[conflict]] that prevents a group from achieving its goals.
+
#*[[Data mining]]. The process by which patterns are discovered within large sets of data with the goal of extracting useful information from it.
#'''[[Stakeholder analysis]]'''. The work to identify the stakeholders who may be impacted by a proposed initiative and assess their interests and likely participation.
+
#*[[Heuristics]]. These are rules drawn from experience used to solve a problem more quickly than traditional problem-solving methods in AI. While faster, a heuristic approach typically is less optimal than the classic methods it replaces.
#*[[Stakeholder power]] (high, medium, low)
+
#*[[Pruning]]. The use of a search algorithm to cut off undesirable solutions to a problem in an AI system. It reduces the number of decisions that can be made by the AI system.
#*[[Stakeholder support]] (positive, neutral, negative)
+
#'''[[Machine learning]]'''. A field of AI focused on getting machines to act without being programmed to do so. Machines "learn" from patterns they recognize and adjust their behavior accordingly.
#*[[Stakeholder influence]] (high or low)
+
#*[[Artificial neural network]] (ANN). A learning concept based on the biological neural networks present in the brains of animals. Based on the activity of neurons, ANNs are used to solve tasks that would be too difficult for traditional methods of programming.
#*[[Stakeholder need]] (strong, medium, weak)
+
#*[[Deep learning]]. A subset of [[machine learning]] that uses specialized algorithms to model and understand complex structures and relationships among data and datasets.
#*[[Stakeholder change readiness]] (unaware – this group has no information about the project; resistant – aware of project and resistant to the changes and impacts the project may bring; neutral – aware of the project and neither supportive nor resistant; supportive – aware of the project and the potential changes and impacts and is supportive; leading – aware of the project and actively engaged to ensure the project’s success)
+
#*[[Backpropagation]]. Short for "backward propagation of errors," backpropagation is a way of training neural networks based on a known, desired output for specific sample case.
#'''[[Stakeholder engagement]]'''. An individual's involvement with, satisfaction with, and enthusiasm for the enterprise he or she works for or is involved with.
+
#*[[Weights]]. The connection strength between units, or nodes, in a neural network. These weights can be adjusted in a process called learning.
#*[[Stakeholder engagement]]. When stakeholders are connected to, satisfied with, and enthusiastic about their enterprise.
+
#'''[[Artificial reasoning]]'''. The action of thinking about something in a logical, sensible way used in [[artificial intelligence]].
#*[[Perceived organizational support]]. Employees' general belief that their organization values their contribution and cares about their well-being.
+
#*[[Analogical reasoning]]. Solving problems by using analogies, by comparing to past experiences.
#*[[Perceived organizational support]]. The degree to which employees believe an organization values their contribution and cares about their well-being.
+
#*[[Case-based reasoning]] (CBR). An approach to knowledge-based problem solving that uses the solutions of a past, similar problem (case) to solve an existing problem.
#*[[Organizational commitment]]. The degree to which an employee identifies with a particular organization and its goals and wishes to maintain membership in that organization.
+
#*[[Inductive reasoning]]. In AI, inductive reasoning uses evidence and data to create statements and rules.
#*[[Organizational commitment]]. The degree to which an employee identifies with a particular organization and its goals and wishes to maintain membership in the organization.
+
#'''[[Artificial chaining]]'''. The action of connecting various probable activities in a chain used in [[artificial intelligence]].
#*[[Psychological empowerment]]. Employee's belief in the degree to which they affect their work environment, their competence, the meaningfulness of their job, and their perceived autonomy in their work.
+
#*[[Backward chaining]]. A method in which machines work backward from the desired goal, or output, to determine if there is any data or evidence to support those goals or outputs.
#*[[Workplace spirituality]]. The recognition that people have an inner life that nourishes and is nourished by meaningful work that takes place in the context of community.
+
#*[[Forward chaining]]. A situation where an AI system must work "forward" from a problem to find a solution. Using a rule-based system, the AI would determine which "if" rules it would apply to the problem.
#*[[Sexual harassment]]. Any unwanted action or activity of a sexual nature that explicitly or implicitly affects an individual's employment, performance, or work environment.
+
#'''[[Forecasting]]'''. A process that uses [[historical data]] to predict future outcomes.
#*[[Sexual harassment]]. Any unwanted activity of a sexual nature that affects an individual's employment and creates a hostile work environment.
+
#*[[Forecast]]. Prediction of outcome.
#'''[[Stakeholder participation]]'''. A participative process that uses the input of stakeholders to increase their commitment to enterprise success.
+
#*[[Qualitative forecasting]]. Forecasting that uses the judgment and opinions of knowledgeable individuals to predict outcomes.
#*[[Representative participation]]. A system in which workers participate in organizational decision making through a small group of representative employees.
+
#*[[Quantitative forecasting]]. Forecasting that applies a set of mathematical rules to a series of past data to predict outcomes.
#*[[Participative management]]. A process in which subordinates share a significant degree of decision-making power with their immediate superiors.
 
#'''[[Affirmative action]]'''. Organizational programs that enhance the status of members of protected groups.
 
  
 
===Roles===
 
===Roles===
#'''[[Work council]]'''. A group of nominated or elected employees who must be consulted when management makes decisions involving personnel.
+
#'''[[Intelligence analyst]]'''. A professional who gathers, analyzes, or evaluates information from a variety of [[source]]s, such as law enforcement databases, [[surveillance]], intelligence networks or geographic information systems. He or she uses [[intelligence data]] to anticipate and prevent [[counterproductive work behavior]] and other unwelcome activities.
#*[[Board representative]]. An employee who sits on a company's board of directors and represents the interests of the firm's employees.
+
#'''[[Business continuity planner]]'''. A professional engaged in developing, maintaining, or implementing business continuity and disaster recovery strategies and solutions, including risk assessments, business impact analyses, strategy selection, and documentation of business continuity and disaster recovery procedures. He or she plans, conducts, and debriefs regular mock-disaster exercises to test the adequacy of existing plans and strategies, updating procedures and plans regularly. An incumbent of this role acts as a coordinator for continuity efforts after a disruption event.
#'''[[Whistle-blower]]'''. An individual who raises ethical concerns or issues to others.
+
#'''[[Business intelligence analyst]]'''. A professional who produces financial and market intelligence by querying data repositories and generating periodic reports. He or she devises methods for identifying data patterns and trends in available information sources.
#*[[Whistle-blower]]. An individual who reports unethical practices by their employer to outsiders.
 
#'''[[Labor union]]'''. An organization that represents workers and seeks to protect their interests through collective bargaining.
 
  
 
===Methods===
 
===Methods===
#'''[[Three-step risk evaluation technique]]'''. A three-step pattern used to evaluate risks. Risks are identified first, qualitatively analyzed second, and those, that are selected as the most important ones, quantitatively analyzed third.
+
#[[File:Risk-response.png|400px|thumb|right|[[Risk-response technique]]s]]'''[[Risk-response technique]]'''. An established [[procedure]] for establishing plans of responding to [[risk]]s if they occur.
#*[[Risk identification]]. Determining which risks might affect the project and documenting their characteristics. Tools used include [[brainstorming]] and [[checklist]]s.
+
#*[[Opportunity-response technique]]. An established way for developing plans of responding to [[opportunity|opportuniti]]es if they occur.
#*[[Qualitative risk analysis]]. Performing a qualitative analysis of risks and conditions to prioritize their effects on project objectives. It involves assessing the probability and impact of project risk(s) and using methods such as the probability and impact matrix to classify risks into categories of high, moderate, and low for prioritized risk response planning.
+
#[[File:Threat-response.png|400px|thumb|right|[[Threat-response technique]]s]]'''[[Threat-response technique]]'''. An established way for developing plans of responding to [[threat]]s if they occur.
#*[[Quantitative risk analysis]]. Measuring the probability and consequences of risks and estimating their implications for project objectives. Risks are characterized by probability distributions of possible outcomes. This process uses quantitative techniques such as [[simulation]] and [[decision tree]] analysis.
+
#*[[Risk acceptance]] ([[risk-response avoidance]]). This technique of the risk response planning process indicates that the project team has decided not to change the project plan to deal with a risk, or is unable to identify any other suitable response strategy.
#'''[[Risk response technique]]'''.
+
#*[[Threat prevention]] ([[threat avoidance]]). Risk avoidance is changing the project plan to eliminate the risk or to protect the project objectives from its impact. It is a tool of the risk response planning process.
#*[[Risk acceptance]]. This technique of the risk response planning process indicates that the project team has decided not to change the project plan to deal with a risk, or is unable to identify any other suitable response strategy.
+
#*[[Threat mitigation]]. Risk mitigation seeks to reduce the probability and/or impact of a risk to below an acceptable threshold.
#*[[Risk avoidance]]. Risk avoidance is changing the project plan to eliminate the risk or to protect the project objectives from its impact. It is a tool of the risk response planning process.
 
#*[[Risk mitigation]]. Risk mitigation seeks to reduce the probability and/or impact of a risk to below an acceptable threshold.
 
 
#*[[Risk transference]]. Risk transference is seeking to shift the impact of a risk to a third party together with ownership of the response.
 
#*[[Risk transference]]. Risk transference is seeking to shift the impact of a risk to a third party together with ownership of the response.
 
#'''[[Simulation]]'''. A simulation uses a project model that translates the uncertainties specified at a detailed level into their potential impact on objectives that are expressed at the level of the total project. Project simulations use computer models and estimates of risk at a detailed level, and are typically performed using the [[Monte Carlo method]].
 
#'''[[Simulation]]'''. A simulation uses a project model that translates the uncertainties specified at a detailed level into their potential impact on objectives that are expressed at the level of the total project. Project simulations use computer models and estimates of risk at a detailed level, and are typically performed using the [[Monte Carlo method]].
 
#*[[Monte Carlo method]]. A technique that performs a project simulation many times to calculate a distribution of likely results.
 
#*[[Monte Carlo method]]. A technique that performs a project simulation many times to calculate a distribution of likely results.
#'''[[Change support analysis]]'''. An evaluation of the stakeholder support of the  and, vice versa, the resistance to this [[proposed change|change]].
+
#'''[[Turing test]]'''. A test developed by Alan Turing that tests the ability of a machine to mimic human behavior. The test involves a human evaluator who undertakes natural language conversations with another human and a machine and rates the conversations.
#*[[Restraining force]].  A force that hinders movement from the existing equilibrium ([[Kurt Lewin]]).
 
#*[[Driving force]]. A force that directs behavior away from status quo ([[Kurt Lewin]]).
 
  
 
===Instruments===
 
===Instruments===
#'''[[Stakeholder-analysis tool]]'''.
+
#[[File:Analytic-cascade.png|400px|thumb|right|[[Analytic cascade]]]]'''[[Analytic cascade]]'''. A [[model]] used to analyze [[uncertain factor]]s such as [[risk]]s, [[target]]s, [[concept]]s, [[source]]s, [[data]], etc. These ''factors'' are identified first, qualitatively analyzed second, prioritized third, selected to be further analyzed fourth, and those, that are selected as the most important ones, quantitatively analyzed fifth.
#*[[Power-interest grid]].
+
#*[[Uncertain factor identification]]. Determining which risks might affect the project and documenting their characteristics. Tools used include [[brainstorming]] and [[checklist]]s.
#*[[Influence-interest grid]].  
+
#*[[Qualitative analysis]]. Performing a qualitative analysis of risks and conditions to prioritize their effects on project objectives. It involves assessing the probability and impact of project risk(s) and using methods such as the probability and impact matrix to classify risks into categories of high, moderate, and low for prioritized risk response planning.
#*[[Power-interest-attitude grouping]].
+
#*[[Quantitative analysis]]. Measuring the probability and consequences of risks and estimating their implications for project objectives. Risks are characterized by probability distributions of possible outcomes. This process uses quantitative techniques such as [[simulation]] and [[decision tree]] analysis.
 +
#*[[Uncertain factor prioritization]]. The process that arranges [[proposed change]]s in order of importance relative to each other based on a review of the means available and the impact of [[trade-off]]s to attain the objectives.
 +
#*[[Prioritization]]. The process of determining the relative importance of a set of items in order to determine the order in which they will be addressed.
 
#'''[[Probability and impact matrix]]'''. A common way to determine whether a risk is considered low, moderate, or high by combining the two dimensions of a risk, its probability of occurrence, and its impact on objectives if it occurs.
 
#'''[[Probability and impact matrix]]'''. A common way to determine whether a risk is considered low, moderate, or high by combining the two dimensions of a risk, its probability of occurrence, and its impact on objectives if it occurs.
  
Line 103: Line 115:
 
===Practices===
 
===Practices===
  
''The successor lecture is [[Workgroup Design Quarter]].''
+
''[[Organizational Culture Quarter]] is the successor lecture. In the [[enterprise envisioning]] series, the next lecture is [[Enterprise Architecture Quarter]].''
  
 
==Materials==
 
==Materials==
Line 113: Line 125:
  
 
==See also==
 
==See also==
 +
 +
[[Category:Septem Artes Administrativi]][[Category:Lecture notes]]

Latest revision as of 03:47, 6 May 2023

Enterprise Intelligence Quarter (hereinafter, the Quarter) is a lecture introducing the learners to organizational research primarily through key topics related to enterprise intelligence. The Quarter is the second of four lectures of Organizational Quadrivium, which is the last of seven modules of Septem Artes Administrativi (hereinafter, the Course). The Course is designed to introduce the learners to general concepts in business administration, management, and organizational behavior.


Outline

Bookkeeping Quarter is the predecessor lecture. In the enterprise research series, the previous lecture is Regulatory Сompliance Quarter.

Concepts

  1. Enterprise intelligence. Intelligence that is accountable for taking data from all data sources and processing it into useful knowledge in order to identify risks, both business threats and business opportunities and to provide enterprises with actionable insights based on human analysis and data analytics. Enterprise intelligence is accountable for dealing with insider threat, cyber crime, physical crime, and other threats on the one side, as well as business leads and potentials on the other side.
  2. All-source intelligence. (1) Intelligence products and/or organizations and activities that incorporate all sources of information, most frequently including human resources intelligence, imagery intelligence, measurement and signature intelligence, signals intelligence, and open-source data in the production of finished enterprise intelligence; (2) In intelligence collection, a phrase that indicates that in the satisfaction of intelligence requirements, all collection, processing, exploitation, and reporting systems and resources are identified for possible use and those most capable are tasked.
    • Human resources intelligence (HUMINT). The intelligence derived from the intelligence collection discipline that uses human beings as both sources and collectors, and where the human being is the primary collection instrument.
    • Signals intelligence. The branch of usually military intelligence concerned with the monitoring, interception, and interpretation of radio signals, radar signals, and telemetry.
    • Imagery intelligence (IMINT). An intelligence gathering discipline which collects information via satellite and aerial photography. As a means of collecting intelligence, IMINT is a subset of intelligence collection management, which, in turn, is a subset of intelligence cycle management.
    • Measurement and signature intelligence (MASINT). A technical branch of intelligence gathering, which serves to detect, track, identify or describe the signatures (distinctive characteristics) of fixed or dynamic target sources.
    • Customer intelligence. Searching for customer opinions in the Internet such as in chats, forums, web pages, and blogs where people express freely about their experiences with products, becoming strong opinion formers.
  3. Intelligence data. Enterprise data used in enterprise intelligence.
  4. Objective intelligence assumption.
    • Data-collection assumption. Data collection is never completely implemented.
    • Data-analysis assumption. If complete data can be collected, it is never completely analyzed.
    • Data-synthesis assumption. If complete data analysis can be accomplished, the analysis results are never conclusive.
    • Data-presentation assumption. If complete data analysis can be accomplished and the analysis results are conclusive, they are never presented properly to decision makers.
    • Data-usage assumption. If complete data analysis can be accomplished, the analysis results are conclusive and properly presented to decision makers. they are never used for decision-making because of internal or external factors.
  5. Risk analysis. Controlling residual risks, identifying new risks, executing risk response plans, and evaluating their effectiveness throughout an enterprise effort.
    • Risk event. A discrete occurrence that may affect the project for better or worse.
    • Trigger. Triggers, sometimes called risk symptoms or warning signs, are indications that a risk has occurred or is about to occur. Triggers may be discovered in the risk identification process and watched in the risk monitoring and control process.
    • Risk category. A source of potential risk reflecting technical, project management, organizational, or external sources.
  6. Risk. (1) An uncertain event or condition that, if it occurs, has a positive or negative effect on an enterprise effort; (2) A situation involving exposure to danger.
    • Secondary risk. A risk that arises as a direct result of implementing a risk response.
    • Residual risk. A risk that remains after risk responses have been implemented.
  7. Risk culture. The part of organizational culture that accounts for risk appetite, risk tolerance, and risk threshold.
  8. Competitive intelligence. The ability to control market research, to identify the data about the competitors, to process the identified data in order to acquire knowledge, and to apply the knowledge towards understanding and anticipating competitors' actions rather than merely react to them.
    • Competition. The activity or condition of competing on the market. The buyers may compete over purchases of a market exchangeable; more frequently, the sellers compete over sales of a market exchangeable.
    • Competitive analysis. A structured process which captures the key characteristics of an industry to predict the long-term profitability prospects and to determine the practices of the most significant competitors.
    • Competitor analysis. Performing an audit or conducting user testing of competing websites and apps; writing a report that summarizes the competitive landscape.
  9. Business intelligence. Information that managers can use to make more effective strategic decisions.
    • Anonymization. The severing of links between people in a database and their records to prevent the discovery of the source of the records, and to maintain privacy and confidentiality.
    • Association. A link between two elements or objects in a diagram.
    • Systematic study. Looking at relationships, attempting to attribute causes and effects, and drawing conclusions based on scientific evidence.
    • Behavioral analytics. Using data about people's behavior to understand intent and predict future actions.
  10. Data curation. The management of data throughout its lifecycle, from creation and initial storage to the time when it is archived for posterity or becomes obsolete, and is deleted. The main purpose of data curation is to ensure that data is reliably retrievable for future research purposes or reuse.
    • Data validation. The process of ensuring that data have undergone data cleansing to ensure they have data quality, that is, that the data is both correct and useful.
    • Data gap. Indentification of data gaps in available information in reference to a particular procurement.
  11. Data manipulation. The action of manipulating data in a skillful manner.
    • Filter. A mechanism that includes or excludes specific data from reports based upon what the user decides to filter (e.g., to tightly tailor a report, you might strictly want records of customers between the ages of 25 and 35 who like skiing, but you want to exclude everyone else).
  12. Big data. The vast amount of quantifiable information that can be analyzed by highly sophisticated data processing.
    • Contextual data. A structuring of big data that attaches situational contexts to single elements of big data to enrich them with business meaning (e.g., instead of a customer record that tells you the customer's name and address, data appended to this record data also gives the customer's buying preferences, which is gathered from recent web activity data). The result is a more complete understanding of the customer and her lifestyle.
    • Multipolar analytics. A distributed big data model where data is collected, stored, and analyzed in different areas of the company instead of being centrally located and analyzed.
  13. Data visualization. A method of putting data in a visual or a pictorial context as a way to assist users in better understanding what the data are telling them (e.g., a map is a way to visualize which areas of the country get the most rainfall).
    • Data point. An individual item on a graph or a chart.
  14. Artificial intelligence (AI). A field of computer science dedicated to the study of computer software making intelligent decisions, reasoning, and problem solving.
    • Strong AI. An area of AI development that is working toward the goal of making AI systems that are as useful and skilled as the human mind.
    • Weak AI. Also known as narrow AI, weak AI refers to a non-sentient computer system that operates within a predetermined range of skills and usually focuses on a singular task or small set of tasks. Most AI in use today is weak AI.
  15. Algorithm. A formula or set of rules for performing a task. In AI, the algorithm tells the machine how to go about finding answers to a question or solutions to a problem.
    • AI planning. A branch of AI dealing with planned sequences or strategies to be performed by an AI-powered machine. Things such as actions to take, variable to account for, and duration of performance are accounted for.
    • Autonomous. Autonomy is the ability to act independently of a ruling body. In AI, a machine or vehicle is referred to as autonomous if it doesn't require input from a human operator to function properly.
    • Data mining. The process by which patterns are discovered within large sets of data with the goal of extracting useful information from it.
    • Heuristics. These are rules drawn from experience used to solve a problem more quickly than traditional problem-solving methods in AI. While faster, a heuristic approach typically is less optimal than the classic methods it replaces.
    • Pruning. The use of a search algorithm to cut off undesirable solutions to a problem in an AI system. It reduces the number of decisions that can be made by the AI system.
  16. Machine learning. A field of AI focused on getting machines to act without being programmed to do so. Machines "learn" from patterns they recognize and adjust their behavior accordingly.
    • Artificial neural network (ANN). A learning concept based on the biological neural networks present in the brains of animals. Based on the activity of neurons, ANNs are used to solve tasks that would be too difficult for traditional methods of programming.
    • Deep learning. A subset of machine learning that uses specialized algorithms to model and understand complex structures and relationships among data and datasets.
    • Backpropagation. Short for "backward propagation of errors," backpropagation is a way of training neural networks based on a known, desired output for specific sample case.
    • Weights. The connection strength between units, or nodes, in a neural network. These weights can be adjusted in a process called learning.
  17. Artificial reasoning. The action of thinking about something in a logical, sensible way used in artificial intelligence.
    • Analogical reasoning. Solving problems by using analogies, by comparing to past experiences.
    • Case-based reasoning (CBR). An approach to knowledge-based problem solving that uses the solutions of a past, similar problem (case) to solve an existing problem.
    • Inductive reasoning. In AI, inductive reasoning uses evidence and data to create statements and rules.
  18. Artificial chaining. The action of connecting various probable activities in a chain used in artificial intelligence.
    • Backward chaining. A method in which machines work backward from the desired goal, or output, to determine if there is any data or evidence to support those goals or outputs.
    • Forward chaining. A situation where an AI system must work "forward" from a problem to find a solution. Using a rule-based system, the AI would determine which "if" rules it would apply to the problem.
  19. Forecasting. A process that uses historical data to predict future outcomes.
    • Forecast. Prediction of outcome.
    • Qualitative forecasting. Forecasting that uses the judgment and opinions of knowledgeable individuals to predict outcomes.
    • Quantitative forecasting. Forecasting that applies a set of mathematical rules to a series of past data to predict outcomes.

Roles

  1. Intelligence analyst. A professional who gathers, analyzes, or evaluates information from a variety of sources, such as law enforcement databases, surveillance, intelligence networks or geographic information systems. He or she uses intelligence data to anticipate and prevent counterproductive work behavior and other unwelcome activities.
  2. Business continuity planner. A professional engaged in developing, maintaining, or implementing business continuity and disaster recovery strategies and solutions, including risk assessments, business impact analyses, strategy selection, and documentation of business continuity and disaster recovery procedures. He or she plans, conducts, and debriefs regular mock-disaster exercises to test the adequacy of existing plans and strategies, updating procedures and plans regularly. An incumbent of this role acts as a coordinator for continuity efforts after a disruption event.
  3. Business intelligence analyst. A professional who produces financial and market intelligence by querying data repositories and generating periodic reports. He or she devises methods for identifying data patterns and trends in available information sources.

Methods

  1. Risk-response technique. An established procedure for establishing plans of responding to risks if they occur.
  2. Threat-response technique. An established way for developing plans of responding to threats if they occur.
    • Risk acceptance (risk-response avoidance). This technique of the risk response planning process indicates that the project team has decided not to change the project plan to deal with a risk, or is unable to identify any other suitable response strategy.
    • Threat prevention (threat avoidance). Risk avoidance is changing the project plan to eliminate the risk or to protect the project objectives from its impact. It is a tool of the risk response planning process.
    • Threat mitigation. Risk mitigation seeks to reduce the probability and/or impact of a risk to below an acceptable threshold.
    • Risk transference. Risk transference is seeking to shift the impact of a risk to a third party together with ownership of the response.
  3. Simulation. A simulation uses a project model that translates the uncertainties specified at a detailed level into their potential impact on objectives that are expressed at the level of the total project. Project simulations use computer models and estimates of risk at a detailed level, and are typically performed using the Monte Carlo method.
    • Monte Carlo method. A technique that performs a project simulation many times to calculate a distribution of likely results.
  4. Turing test. A test developed by Alan Turing that tests the ability of a machine to mimic human behavior. The test involves a human evaluator who undertakes natural language conversations with another human and a machine and rates the conversations.

Instruments

  1. Analytic cascade. A model used to analyze uncertain factors such as risks, targets, concepts, sources, data, etc. These factors are identified first, qualitatively analyzed second, prioritized third, selected to be further analyzed fourth, and those, that are selected as the most important ones, quantitatively analyzed fifth.
    • Uncertain factor identification. Determining which risks might affect the project and documenting their characteristics. Tools used include brainstorming and checklists.
    • Qualitative analysis. Performing a qualitative analysis of risks and conditions to prioritize their effects on project objectives. It involves assessing the probability and impact of project risk(s) and using methods such as the probability and impact matrix to classify risks into categories of high, moderate, and low for prioritized risk response planning.
    • Quantitative analysis. Measuring the probability and consequences of risks and estimating their implications for project objectives. Risks are characterized by probability distributions of possible outcomes. This process uses quantitative techniques such as simulation and decision tree analysis.
    • Uncertain factor prioritization. The process that arranges proposed changes in order of importance relative to each other based on a review of the means available and the impact of trade-offs to attain the objectives.
    • Prioritization. The process of determining the relative importance of a set of items in order to determine the order in which they will be addressed.
  2. Probability and impact matrix. A common way to determine whether a risk is considered low, moderate, or high by combining the two dimensions of a risk, its probability of occurrence, and its impact on objectives if it occurs.

Results

  1. Risk database. A repository that provides for collection, maintenance, and analysis of data gathered and used in the risk management processes. A lessons-learned program uses a risk database. This is an output of the risk monitoring and control process.

Practices

Organizational Culture Quarter is the successor lecture. In the enterprise envisioning series, the next lecture is Enterprise Architecture Quarter.

Materials

Recorded audio

Recorded video

Live sessions

Texts and graphics

See also