E-discovery projects typically start with an assessment of the collected electronic data in order to estimate the risk to prosecute or defend a legal case. This is not a review task but is appropriately called early case assessment, which is better known as exploratory search in the information retrieval community. This paper first describes text mining methodologies that can be used for enhancing exploratory search. Based on these ideas we present a semantic search dashboard that includes entities that are relevant to investigators such as who knew who, what, where and when. We describe how this dashboard can be powered by results from our ongoing research in the “Semantic Search for E-Discovery” project on topic detection and clustering, semantic enrichment of user profiles, email recipient recommendation, expert finding and identity extraction from digital forensic evidence.
MULTIFILE
Background: Due to multimorbidity and geriatric problems, older people often require both psychosocial and medical care. Collaboration between medical and social professionals is a prerequisite to deliver high-quality care for community-living older people. Effective, safe, and person-centered care relies on skilled interprofessional collaboration and practice. Little is known about interprofessional education to increase interprofessional collaboration in practice (IPCP) in the context of community care for older people. This study examines the feasibility of the implementation of an IPCP program in three community districts and determines its potential to increase interprofessional collaboration between primary healthcare professionals caring for older people. Method: A feasibility study was conducted to determine the acceptability and feasibility of data collection and analysis regarding interprofessional collaboration in network development. A questionnaire was used to measure the learning experience and the acquisition of knowledge and skills regarding the program. Network development was assessed by distributing a social network survey among professionals attending the program as well as professionals not attending the program at baseline and 5.5 months after. Network development was determined by calculating the number, reciprocity, value, and diversity of contacts between professionals using social network analysis. Results: The IPCP program was found to be instructive and the knowledge and skills gained were applicable in practice. Social network analysis was feasible to conduct and revealed a spill-over effect regarding network development. Program participants, as well as non-program participants, had larger, more reciprocal, and more diverse interprofessional networks than they did before the program. Conclusions: This study showed the feasibility of implementing an IPCP program in terms of acceptability, feasibility of data collection, and social network analysis to measure network development, and indicated potential to increase interprofessional collaboration between primary healthcare professionals. Both program participants and non-program participants developed a larger, more collaborative, and diverse interprofessional network.
DOCUMENT
Prompt and timely response to incoming cyber-attacks and incidents is a core requirement for business continuity and safe operations for organizations operating at all levels (commercial, governmental, military). The effectiveness of these measures is significantly limited (and oftentimes defeated altogether) by the inefficiency of the attack identification and response process which is, effectively, a show-stopper for all attack prevention and reaction activities. The cognitive-intensive, human-driven alarm analysis procedures currently employed by Security Operation Centres are made ineffective (as opposed to only inefficient) by the sheer amount of alarm data produced, and the lack of mechanisms to automatically and soundly evaluate the arriving evidence to build operable risk-based metrics for incident response. This project will build foundational technologies to achieve Security Response Centres (SRC) based on three key components: (1) risk-based systems for alarm prioritization, (2) real-time, human-centric procedures for alarm operationalization, and (3) technology integration in response operations. In doing so, SeReNity will develop new techniques, methods, and systems at the intersection of the Design and Defence domains to deliver operable and accurate procedures for efficient incident response. To achieve this, this project will develop semantically and contextually rich alarm data to inform risk-based metrics on the mounting evidence of incoming cyber-attacks (as opposed to firing an alarm for each match of an IDS signature). SeReNity will achieve this by means of advanced techniques from machine learning and information mining and extraction, to identify attack patterns in the network traffic, and automatically identify threat types. Importantly, SeReNity will develop new mechanisms and interfaces to present the gathered evidence to SRC operators dynamically, and based on the specific threat (type) identified by the underlying technology. To achieve this, this project unifies Dutch excellence in intrusion detection, threat intelligence, and human-computer interaction with an industry-leading partner operating in the market of tailored solutions for Security Monitoring.