Quote from Rob Neyer, ESPN

"In business, as in baseball, the question isn't whether or not you'll jump into analytics; the question is when. Do you want to ride the analytics horse to profitability...or follow it with a shovel?"

Friday, June 26, 2009

A Concept Map of the Security Analytics Field

It seems that many of us are crazed with the need to define things. To say that "that idea fits in this box". And I'm among the worst of them. But then, there is value in definition. I once had a Security Director whose favorite retort was "You can't measure security, Harold." Well, I disagreed then, and disagree even more fervently now. The whole point of the Security Analytics effort is find trends, patterns and associations in security-related data, measure it's import to managing our risks and making sound decisions. So my reply has been..."whatever I can operationally define, I can measure...whatever I can measure, I can manage!" So, I find it necessary to define my field. Over the next few days, I'll try to circumscribe, dissect, illuminate and define the new and burgeoning field of Security Analytics. I'll then create and post Concept Maps along the way so that we can visually analyze those definitions. Read on and let's see if we can paint this picture.

Friday, December 14, 2007

Homeland Security Information Network

The Homeland Security Information Network is a computer-based counterterrorism communications system connecting all 50 states, five territories, Washington, D.C., and 50 major urban areas.

The Homeland Security Information Network (HSIN) allows all states and major urban areas to collect and disseminate information between federal, state, and local agencies involved in combating terrorism.
  • helps provide situational awareness
  • facilitates information sharing and collaboration with homeland security partners throughout the federal, state and local levels
  • provides advanced analytic capabilities
  • enables real time sharing of threat information

This communications capability delivers to states and major urban areas real-time interactive connectivity with the National Operations Center. This collaborative communications environment was developed by state and local authorities in the United States.

Risk Analysis and the Security Survey, Third Edition - A book review

Risk Analysis and the Security Survey, Third Edition. By James F. Broder, CPP; published by Elsevier Butterworth-Heinemann; available from ASIS International, Item #1684, 703/519-6200 (phone), www.asisonline.org (Web); $60 (ASIS members), $66 (nonmembers).

"Security is an element of risk management", writes James F. Broder in his third edition of the corporate security classic text "Risk Analysis and the Security Survey". And he ably backs up that statement in this wonderfully written book, which should be required reading for all current and future security professionals.

If anything, Broder undersells the book with the title; the book’s scope is actually much broader. It could easily comprise two books: one on risk in the security profession and the other on emergency management and business continuity.

Even at over 300 pages, the book is a quick read due to its sequence of concise chapters. This edition thoughtfully updates the book to include contemporary resources and post-9-11 and post-Katrina scenarios.

Security and risk management are explained and tied together elegantly in the first 100 pages of the book. To Broder’s credit, his definitions of terms such as risks, perils (threats), hazards, and exposures closely align with those used in the academic model of risk management.

The next 150 pages are basically a retread of information available from the Federal Emergency Management Agency. While the section isn’t as impressive as the first 100 pages, it provides good information on crisis planning for kidnap, ransom, and extortion, as well as useful advice for evaluating and hiring security consultants. It also provides the building blocks of disaster management.

Appendices cover the final 100 pages or so, offering excellent resources such as sample plans, letters, and memoranda for business impact analysis. If there’s a security thinker out there whose philosophy should be studied and adopted, it’s James Broder.

Terrorism and Organized Hate Crime: Intelligence Gathering, Analysis, and Investigations - A book review

Terrorism and Organized Hate Crime: Intelligence Gathering, Analysis, and Investigations. By Michael Ronczkowski; published by CRC Press, 800/272-7737 (phone), www.crcpress.com (Web); 280 pages; $71.96.

Like any perceived phenomenon or rapid growth area, global terrorism has inspired many authors to venture into the security and intelligence fields. That's not surprising given that there is an avid audience, not least in the security profession itself, keen to grasp the essential knowledge and skills needed to manage the current and emerging terrorist threat.

Many recent works provide a scant overview for the uninformed. Others provide excellent detailed reviews suited for reference only. This book tries to strike a balance between the two, but while it has flashes of excellence, it unfortunately succeeds at neither.

The problem comes after a useful introduction on the need for understanding crime and intelligence analysis. The work appears to drift from detailed and at times academic debates on definitions of terrorism to almost naïve views on emerging computer crime and terrorist threats. Most frustrating of all, when the author identifies a bona fide challenge, he fails to follow up with possible solutions.

Best described as a sound idea with disappointing execution, this book regrettably does not fulfill its potential. Excellent in some parts and poor in others, the book may have been developed in a hurry to capitalize on market demands rather than in the time necessary for the author to display his true abilities.

Introduction to Crime Analysis: Basic Resources for Criminal Justice Practice - A book review

Introduction to Crime Analysis: Basic Resources for Criminal Justice Practice. By Deborah Osborne and Susan Wernicke; published by Haworth Press, 800/429-6784 (phone), www.haworthpress.com (Web); 156 pages; $17.95.

The field of crime analysis is growing, as many of its principles and practices overlap with the burgeoning area of homeland security. Taking the intricacies of crime analysis and transforming them into an easily understood format, the authors of this book provide a foundation for anyone interested in working in or learning about crime analysis. Readers learn a lot more than the basics, including how to use crime-mapping software and how to rise to the top of the field.

Written by two police crime analysts, the book is replete with resources to assist in gathering evidence for analyzing crime. Moreover, the authors explain the "Ten Commandments" of crime analysis as a way to inculcate best practices in the reader. The first commandment, for example, is "Thy Task is Crime Analysis. Thou Shalt Have No Other Tasks Before It," and the sixth commandment is "Thou Shalt Know Thy Jurisdiction from One End Unto the Other."

As with any new endeavor, beginners must also learn the logistics of the field. With that in mind, the authors provide useful information on how to set up a crime analysis unit and how to outline a mission statement for the unit. The authors also offer sections on staffing, education, funding, and marketing. Another section is devoted to success stories from analysts. Given its abundance of resources and forthright instruction, this book is highly recommended.

Some Online Survey Analysis Articles

"Sampling Error Software for Personal Computers" by Jim Lepkowski and Judy Bowles, reprinted from The Survey Statistician: a general review of the reasons why special software is needed to analyse survey data, and a description of eight packages for the PC.

"An Evaluation of Alternative PC-Based Packages for the Analysis of Complex Survey Data," by Steven B. Cohen (1997), The American Statistician, 51, 285-292. (Postscript file, Adobe PDF file - note that pagination is close to but not precisely identical with published version)
"Comparison of Variance Estimation Software and Methods", a report prepared by a consortium of the UK Office for National Statistics, Statistics Sweden, the University of Southampton and the University of Bath, under the sponsorship of Eurostat. (See title page for full author list.) PDF file, 41 pages, released 1999. General discussion of principles, and comparison of 5 packages with detailed description of capabilities.

"Software for Statistical Analysis of Sample Survey Data" by Barbara Lepidus Carlson, reprinted with permission from Encyclopedia of Biostatistics, Wiley, 1998. A brief discussion of variance estimation in surveys and references for a number of packages.

"Pitfalls of Using Standard Statistical Software Packages for Sample Survey Data" by Donna Brogan, reprinted with permission from Encyclopedia of Biostatistics, Wiley, 1998. An example comparing analyses using standard software to that using software that recognizes special features of survey design.

Introduction to Survey Analysis from UCLA Academic Technology Services defines some key concepts of survey analysis and gives examples from several packages. See also their Survey Analysis Portal for additional links.

Analysis of Survey Data from Household Surveys in Developing and Transition Countries from the United Nations. See Chapter 21 (by Donna Brogan) for software examples and reviews.

Survey Analysis Software Packages

Need to do surveys? Need to analyze the results? Here is some software to help.


WesVar from Westat, Inc