We’re adding new white papers frequently. Check back often.
This INFORMS ORMS article describes the right way to adopt process mining in your organization. This presentation offer a general process mining overview. Additionally, some national security use cases are described.
FOCAL Information Warfare Defense StandardTM: This Information Warfare Defense Standard helps public and private critical infrastructure participants defend against the growing information and cognitive threat, which is fueled by weaponized AI. It may also facilitate a whole-of-society effort to protect freedom and individual liberty. Five interlocking tenets help organizations shift culture, train the workforce, identify vulnerabilities, prepare for and recover from attack, and contribute to the community as a vested stakeholder. This short article offers and introduction, and a detailed technical paper accompanies the standard, as well. The FOCAL Information Warfare Defense StandardTM is available for free. Contact us to request a copy.
Process Mining: The Missing Capability in Information Warfare. From an information warfare perspective, The Cold War never ended. Moreover, the 21st Century presents vivid new security challenges related to information weaponry. This article describes novel, scalable, and extensible process-oriented methodologies not currently part of the United States’ informational warfare solution set.
(Draft in Submission) Detecting Botnet Signals Using Process Mining: Detecting bots and elucidating botnets is an active area of research. This draft journal article presents weaponized bot detection analysis results from an analysis of an ISIS terrorist Twitter dataset using process technologies. A future effort is presented to understand cross-platform choreographed information warfare campaigns and recursive adversarial modeling.
(Draft in Submission) Process Mining Organization Email Data and National Security Implications: Tremendous intelligence is contained within unstructured organizational data sources. Properly analyzed, these data provide government and private organizations with actionable management and risk mitigation insights. Using explainable process technologies combined with natural language processing, a private critical infrastructure participant’s organizational process model is discovered from semi-structured email data. Data derived from the process model are presented which elucidate internal operations. National security implications and future research needs are described.
Use Case: Protecting Critical Infrastructures: Financial Services. The American homeland is under attack. State and non-state actors are targeting vulnerabilities continually. This paper presents bleeding edge cyber and information warfare techniques to protect the financial services sector–one of America’s critical infrastructures as defined by the Department of Homeland Security.
Process Mining as a Platform Plug-in. Interested in Customer Journey Mapping? This paper discusses how process mining provides extreme value, at scale, for software platforms with large client/user bases.
Process Mining in a DoD Context. This paper articulates the necessity of adopting process mining technologies across the Department of Defense (DoD) and adjacent national security agencies in order to ensure America remains the premier global power in today’s emerging inter-state competitive environment.
Easing Organizational Change. Interested in mergers and acquisitions or re-orgs? Check this out.
Major New IT System Implementations. Process Mining eases the disruption caused by new system adoptions and outputs an improved solution.