HOME

Identity Resolution Daily Links 2009-08-24

August 24th, 2009

By the Infoglide Team

CRMBuyer: The BI Outlook: A Bright Spot of Growth in a Gloomy Economy

“Investing in business intelligence is important for a company now more than ever, agreed Bill Barberg, president of Insightformation and an expert in Balanced Scorecard methodology. Sound business intelligence helps companies make fact-based decisions as they try to navigate in today’s stormy economy, he told CRM Buyer. “Business intelligence can help companies make much better decisions,’ he said.”

OCDQ Blog: Adventures in Data Profiling (Part 3)

“In Part 3, you will continue your adventures by using a combination of field values and field formats to begin your analysis of the following fields: Birth Date, Telephone Number and E-mail Address.”

SearchSOA.com: SOA with MDM prevents messaging confusion

“Increasingly, organizations are designing SOA into the MDM architecture from the beginning, says Dan Power, president and founder of consulting firm Hub Solution Designs Inc. in Hingham, Mass. This creates challenges in meshing the real-time realities with the need to keep the data accurate.”

iHealthBeat: Privacy and Security: Experts Focus on Legal Issues Surrounding EHR Use at AHIMA Summit

“Linda Kloss, AHIMA CEO, said many vendors have not focused on developing legally defensible EHR systems. In addition, health care providers have not created a demand for such functionality.”

Identity Resolution Daily Links 2009-08-21

August 21st, 2009

[Post from Infoglide] Walking the Privacy/Security Tightrope

“In a post last April, we talked about the privacy/security balance issue for fusion centers and for vendors with supporting technology. Now an article in the Austin Sunday paper about a proposed fusion center again highlights the tension between security and privacy. Each time a fusion center is proposed, the story goes like this…”

information management: MDM for Tough Times: 5 trends to strengthen organizations during recession

[Aaron Zornes] “Enterprise MDM solutions are steadily but rapidly evolving away from data-centric hubs into full-blown application stacks. In other words, MDM is becoming less of a standalone technology infrastructure as the emphasis is increasingly on relationships between domains, user interface and integration with other emerging and adjacent technologies such as RFID, entity analytics and business intelligence.”

InformationWeek: Healthcare Tech: Can BI Help Save The System?

“Healthcare IT is a good place to be these days. While IT budgets in many verticals have been tightly reined, healthcare is enjoying multiple government mandates. This has resulted in an infusion of funds to modernize and integrate IT infrastructure, applications, and data. However, we aren’t starting from a high ground. There are multiple challenges to attaining a 21st century-grade IT environment.”

OCDQ Blog: Adventures in Data Profiling (Part 2)

“The adventures began with the following scenario – You are an external consultant on a new data quality initiative.  You have got 3,338,190 customer records to analyze, a robust data profiling tool, half a case of Mountain Dew, it’s dark, and you’re wearing sunglasses…ok, maybe not those last two or three things – but the rest is true.”

VIDEO: Interview with Secure Flight

TSA Secure Flight Program Director Paul Leyh is interviewed about recent developments.

Walking the Privacy/Security Tightrope

August 19th, 2009

By Mike Shultz, Infoglide Software CEO

In a post last April, we talked about the privacy/security balance issue for fusion centers and for vendors with supporting technology. Now an article in the Austin Sunday paper about a proposed fusion center again highlights the tension between security and privacy. Each time a fusion center is proposed, the story goes like this:

“Local law enforcement officials see benefit of two-way information sharing with other local, state, and national agencies… privacy groups are concerned about unnecessary intrusions into personal information.”

As of July 2009, 72 such centers have been put in place and are operational across the country. The Department of Homeland Security (DHS), in conjunction with the Justice Department, has tried to address the need for consistent operating principles. Starting in 2005, they published and continue to maintain a set of guidelines suggesting how to establish collaboration and data sharing between agencies while protecting the privacy and civil liberties of citizens.

It would be nice to report that every fusion center has performed flawlessly in solving crimes while preserving American freedoms. Given that they are run by human beings, execution at every center hasn’t always fallen within the guidelines. There are instances where the centers have been ineffective, and there are instances where controversial privacy issues have been raised when centers overstepped their bounds.

The Austin American Statesman article presented a balanced view of the issues surrounding fusion centers without sensationalizing them. Instances of controversies surrounding fusion centers were discussed, yet instances of the benefits of existing centers were also given.

As Jack Thomas Tomarchio, former deputy undersecretary for intelligence and analysis operations at DHS was quoted, “These things are brand new. They haven’t been around 20 years, and even the ones that have been around three or four years are still in their formative years. In many cases, they don’t have a track record.”

While existing software technology addresses both privacy and security issues, the ultimate decision to use it wisely falls to the people who run the fusion centers. In the City of Austin case, the concerns of privacy and security seem to be receiving equal consideration so that the best results can be achieved without trampling on civil liberties.

Identity Resolution Daily Links 2009-08-10

August 17th, 2009

By the Infoglide Team

Jeff Jonas: Your Movements Speak for Themselves: Space-Time Travel Data is Analytic Super-Food!

“I’ve seen a lot of data in my life, and I’d like to think I have a decent grip on what can be accomplished with data and analytics.  However, I recently stumbled upon some facts that have radically reshaped my understanding of the world we are living in.  What I thought was years away is already here! Our toes are dangling over the edge of a very different future.”

information management: Styles and Architectures for Master Data Management

“We have conducted a survey aimed at gaining deeper insight into the views and plans of businesses regarding their current or planned MDM initiatives, focused on the styles and architectures adopted or planned to be implemented.”

statesman.com: Police, sheriffs establishing regional intelligence center

“David Carter, an Austin assistant police chief in charge of the intelligence center project, said analysts stationed at the facility also will stitch together information collected by various agencies to create new files on suspects in criminal cases or on suspects they think may be planning to carry out crimes and merit further surveillance.”

Secure Flight on CBS: View story broadcast on August 13

Identity Resolution Daily Links 2009-08-14

August 14th, 2009

[Post from Infoglide] Vetting Sharks and Whales

“If you’re not in the casino industry, the title of this post may be meaningless, but for casino managers, “sharks” are the bad guys and “whales” are the good guys. Sharks are people who try to defraud the casino through illegal activities, while whales are the high rollers who are apt to win $20,000 one trip and lost $25,000 the next. If there’s any environment where you’d be motivated as a businessperson to know as much as you can about who you’re dealing with, it’s a casino.”

DATAWARE HOUSING: Business Intelligence and Identity Recognition—IBM’s Entity Analytics

“This article will define master data management (MDM) and explain how customer data integration (CDI) fits within MDM’s framework. Additionally, this article will provide an understanding of how MDM and CDI differ from entity analytics, outline their practical uses, and discuss how organizations can leverage their benefits.”

Workers’Comp Kit Blog: Failure to Pay Workers Compensation Premiums

“A New York asbestos  contractor failed to pay $1.6 Million in workers’ compensation premiums and will serve four years in prison. Upon his release he will be deported to his home country as he is an illegal immigrant… He repeatedly changed the name of his company.”

The TSA Blog: Secure Flight Q&A II

“Each one of these layers alone is capable of stopping a terrorist attack. In combination their security value is multiplied, creating a much stronger, formidable system. A terrorist who has to overcome multiple security layers in order to carry out an attack is more likely to be pre-empted, deterred, or to fail during the attempt.”

Vetting Sharks and Whales

August 12th, 2009

By Robert Barker, Infoglide Senior VP & Chief Marketing Officer

If you’re not in the casino industry, the title of this post may be meaningless, but for casino managers, “sharks” are the bad guys and “whales” are the good guys. Sharks are people who try to defraud the casino through illegal activities, while whales are the high rollers who are apt to win $20,000 one trip and lost $25,000 the next. If there’s any environment where you’d be motivated as a businessperson to know as much as you can about who you’re dealing with, it’s a casino.

What can an ideal identity resolution system do for a casino manager? From the moment of check-in, the system identifies the whales and sharks. Unbeknownst to the hospitality clerk, the attributes of the person checking in are compared real time against computerized lists of bad guys and good guys. The shark lists include known card counters, chip stealers, and other types of troublesome guests and fraudsters.

When a match is found as the suspected fraudster checks in, a text alert is sent immediately to a security room. Then a plainclothes hotel security staffer quietly pulls the person of interest aside, confirms who they are, and informs them that they aren’t welcome and should leave immediately. The identity resolution system also monitors other points of interaction (e.g., credit cards) in the casino.

Whales are similarly detected at entry points into the casino, but once detected, they get the “red carpet” treatment instead of a red flag. Alerts are sent to the appropriate people, including those running the whale’s favorite tables.

The identity resolution system also detects the whale’s friends and relatives to ensure that they are likewise handled with care. Without the system in place, unfortunate incidents can happen. For example, a whale’s wife or girlfriend may be refused some request because the server doesn’t realize who she’s related to. It’s not good business to let even one incident like that happen!

Implementing an identity resolution system can help any enterprise get a better handle on its business. Consultant and blogger Jim George documented what he calls “the 6 R’s” about knowing who’s whom in a casino environment:

  • Resolve –  Is Jane Smith also Jane Brown and/or Jane Brown-Smythe?
  • Research – What is known about her? Is she a known criminal? Card counter?
  • Relate – Who is she related to and how? Is she Gotti’s limo driver or the wife of a wealthy high rolling CEO?
  • Recognize – At the check-in counter, out on the casino floor, over the phone, on the Internet site, at the cage, etc.
  • Respond – All the above is wasted without the capability to differentiate the appropriate response by the casino.
  • Recover – If all else fails, do we have all of the information to make a recovery or support an arrest?

If you’re investigating identity resolution, you’re in the right place. That’s all we talk about here.

If you have a comment, we want to hear it; if you have a question, our readers will try to help.

Identity Resolution Daily Links 2009-08-10

August 10th, 2009

By the Infoglide Team

statesman.com: Austin takes step toward regional law enforcement database

“The Austin City Council voted Thursday to spend up to $200,000 in federal grant money to renovate part of a Texas Department of Public Safety building to house the Austin Regional Intelligence Center, a central databank of information shared by local law enforcement agencies to help with investigations.”

nbc12.com: ‘Secure Flight’ forcing stronger security measures at airports

“With secure flight you’ll need to provide your name exactly as it appears on your identification, your date of birth and gender. The TSA will use that information to keep passengers safe. ‘They are going to have this information and be able to run it against like five different lists like no fly lists ahead of time so they can stop people from boarding that shouldn’t,’ said Mark Turkelson, owner of Travel Leaders.”

resource shelf: Electronic Health Record Resources Added to Special Queries

“The US Department of Health and Human Services defines an electronic health record as ‘An electronic record of health-related information on an individual that conforms to nationally recognized interoperability standards and that can be created, managed, and consulted by authorized clinicians and staff across more than one health care organization.’”

Kimball University: Eight Recommendations for International Data Quality

“For the most part, IT organizations are simply reacting to specific data problems in specific locations, without an overall architecture. Is an overall architecture even possible? This article examines the many challenges surrounding international data quality and concludes with eight recommendations for addressing the problem.”

Identity Resolution Daily Links 2009-08-07

August 7th, 2009

[Post from Infoglide] Applying Identity Resolution to Patient Identification Integrity

The recently passed economic stimulus plan included $20 billion to encourage adoption of electronic health records by medical facilities across the U.S., spurring a huge amount of activity in the health care world. A key issue in EMR implementation is the integrity of the patient identification process used in creating an enterprise master patient index (EMPI).

KELOLAND.com: Keeping An Eye On The Highways

“South Dakota troopers receive alerts about fugitives and people of interest that may be in the state on a regular basis through a place called the National Fusion Center Network. It’s a Department of Homeland Security agency that funnels information to law enforcement agencies in every state. ‘The information sharing is something that improved after 9/11. I think this is a case where the information sharing paid off,’ Lt. Welsh said.”

HealthData Management: When Will EHR Spending Ramp Up?

“‘The steady drumbeat of inevitability is changing the debate from not ‘if’ we’ll get an electronic health record but ‘when’,’ says Eric Brown, research director at Forrester Research Inc., Cambridge, Mass. ‘There’s a tipping point at which we’ll see big growth, but we’re not there yet.’”

YouTube: Bruce Schneier on Secure Flight

Noted security expert Bruce Schneier discusses how TSA’s Secure Flight program has evolved

Applying Identity Resolution to Patient Identification Integrity

August 5th, 2009

By Robert Barker, Infoglide Senior VP & Chief Marketing Officer

The recently passed economic stimulus plan included $20 billion to encourage adoption of electronic health records by medical facilities across the U.S., spurring a huge amount of activity in the health care world. Implementing electronic medical records (EMR) is a very hot topic!

A key issue in EMR implementation is the integrity of the patient identification process used in creating an enterprise master patient index (EMPI). Avoiding medical errors means avoiding multiple types of errors that can crop up. Duplicates are a simple example, where the two records exist for the same person within a single facility. More complex types of errors can easily start to mount up, including overlaps where more than one record exists for one person within two facilities within a single organization, and overlays where information for two people are integrated under a single record.

False positives and false negatives during the identification process often cause these types of serious errors. Beth Just of Just Associates recently wrote an AHIMA Practice Brief entitled Managing the Integrity of Patient Identity in Health Information Exchange:

Common pitfalls include linking two closely related people with very similar names and dates of birth who live near each other (e.g., cousins who are named after the same individual who recently expired); two individuals living in a dense urban area with the same common name, date of birth, and address; or the example of twins having the same first name. Failure to catch such errors can result in overlaid medical records and subsequently negative health outcomes, serious privacy breaches, and legal ramifications.

Entity resolution technology capable of handling these problems has evolved in response to similar challenges that arose in other industries. Disparate applications, including airline passenger screening, lottery retailer fraud detection, organized retail crime fighting, and workers compensation fraud discovery, employ the same technology vital to successful EMR implementations.

Identity Resolution Daily Links 2009-08-03

August 3rd, 2009

By the Infoglide Team

Liliendahl on Data Quality: Master Data meets the Customer

“When doing business online with multi national customers then take care that the sequence, formats and labels are useful to everyone and that mandatory checks and other validations are in line with rules for the country in question. External reference data may be used for lookup and validation integrated in the registration forms.”

FBI Charlotte: Seven Charged with Terrorism Violations in North Carolina

“‘The cooperation between federal, state and local authorities throughout this investigation has been outstanding. It is only with our ongoing law enforcement partnership through the Joint Terrorism Task Force in conjunction with North Carolina’s fusion center, ISAAC, that we are able to ensure public safety from these terrorist threats,’ said North Carolina State State Bureau of Investigation Director Robin P. Pendergraft.”

yourwestvalley.com: Town hall sheds light on electronic records

“Personal health records are confidential, electronic tools that manage health information and compile it in one location for access by health-care providers or family members. Advocates said the benefits include keeping track of all medication, medical conditions and emergency contact information so medical personnel can provide safe treatment during an emergency or appointments.”

YouTube: Secure Flight PSA

TSA recently released a public service announcement about the Secure Flight program.


Bad Behavior has blocked 691 access attempts in the last 7 days.

Close
E-mail It
Portfolio Strategy News The Direct Marketing Voice