The suspect makes his fingerprints unreadable, and doesn’t have a wallet or other ID. Who is he?
“Controversial Facial System Identifies Suspect,” The Wall Street Journal, June 30, 2019 A3. Facial recognition used to identify the shooter at the Capital Gazette in Annapolis, where five died. A picture was run through the drivers license data base, and up popped his license photo.
Biometrics as information? Role of technology in information governance?
Vendors with whom you deal can (and do) capture lots of information about you. They use that information. Hopefully to improve customer service. Can they disclose what they know to others? What if your traveling companions don’t know it’s your birthday because you don’t want them to know?
“What the Airline Knows About The Guy in Seat 12A,” The Wall Street Journal, June 20, 2018 A11. What information on you do airlines collect and how do they use it?
If the information is correct and used positively, that’s one thing. What if it’s wrong, or used negatively? What if it leaks? What if it’s sold?
Filed under Access, Accuracy, Collect, Controls, Corporation, Duty, Duty of Care, Governance, Information, Management, Oversight, Ownership, Privacy, Protect, Use
“Old Spy Plane Tries to Learn New Tricks,” The Wall Street Journal, June 8, 2018 A3. Using new data analytical techniques to harvest more information from U2 spy photos taken from 70,000 feet, freeing up human viewers for other duties.
What old information do you have that you could process differently with newly available technology? What value could you harvest?
Who owns the information on social media? Everyone?
“Wall Street Moves Toward Mining of Social-Media Data,” The Wall Street Journal, June 4, 2018 B4. Companies now looking focusing on “alternative data reports” concerning a potential acquisition target, which are things such as user “purchase data, mobile app usage[,] and web surveys of prices.”
This data is mined from social media.
A powerful case for (a) using what’s available and (b) the ownership of data of social media.
Interesting Journal Report on health care technology. Several articles on new uses of information, or uses of new information, in order to do everything from brain surgery to looking after aging parents.
- “Augmented Reality Gives Brain Surgeons a Better View,” The Wall Street Journal, May 29, 2018 R1.
- “AI Tools Help the Blind Tackle Everyday Tasks,” The Wall Street Journal, May 29, 2018 R4.
- “Robots and Chatbots Look After the Elderly,” The Wall Street Journal, May 29, 2018 R6.
- “Apps Promise to Help Avoid Pregnancy,” The Wall Street Journal, May 29, 2018 R7.
- “For Those With Dementia, an Assist From Technology,” The Wall Street Journal, May 29, 2018 R8.
- “Doctors, Beware: You’re Being Watched,” The Wall Street Journal, May 29, 2018 R10.”
- Bad employees are bad
“Suspect In Massive CIA Leak Identified,” The Wall Street Journal, May 16, 2018 A2. Did a former employee leak CIA hacking tools? How do you protect yourself from former employees leaking your information?
- Does this displace doctors?
“New Methods Aim to Speed Stroke Care,” The Wall Street Journal, May 15, 2018 A3. Algorithms compare a patient’s brain scans against a database, allowing quicker diagnosis and treatment, even by non-experts. Is this closer to using AI to practice medicine? Is this using information better, faster, and, hopefully, cheaper?
- Failure to use information
“Paris Attacker Was Flagged as Risk,” The Wall Street Journal, May 14, 2018 A8. Attacker in Paris was in the database, but nevertheless was able to kill.
Filed under Access, Analytics, Controls, Corporation, Duty, Employees, Governance, Government, Information, Internal controls, Oversight, Protect assets, To report, Use, Value
The value of information is in its use, or perhaps in the ability to prevent others from using it.
“H&M Ramps Up Data Use,” The Wall Street Journal, May 8, 20189 B4. Store chain mines social media to identify and track trends, and analyses store-specific information to determine what to stock in that store.
So, they use a common technology approach to data analysis chain-wide to derive a store-specific stocking strategy. They find that computers don’t get distracted by emotions as much as humans.
Filed under Access, Analytics, Collect, Information, IT, Knowledge Management, Management, Operations, Use, Use, Value