Book Image

Analytics: How to Win with Intelligence

By : John Thompson, Shawn P. Rogers
Book Image

Analytics: How to Win with Intelligence

By: John Thompson, Shawn P. Rogers

Overview of this book

Today, business is moving into an era where information is more valuable than services. Organizations that connect information with their products will have a huge advantage. This book helps people understand the power of data analytics and explains how some of the tools available can be applied to a wide range of applications. It begins with a brief history of analytics and explains how it all began. You'll learn about several common analytical approaches and the tools that data scientists use to analyze data. You'll gain insight into some staffing models, technologies, organizational structures, and analytical approaches used in the previous two eras of analytics. As you progress through the chapters, you'll also get a glimpse into the future of the analytical marketplace. After reading this book, you will be able to help your team deploy analytical elements into your operations and become competitive in your business.
Table of Contents (11 chapters)
Free Chapter
1
Foreword by Tom Davenport

Fraud and theft

Every industry suffers from fraud and theft. Especially now, in our digital society with ubiquitous connectivity, mobile access, and demand for the convenience of easy-to-use apps for commercial transactions, companies have become increasingly vulnerable. To be sure, security systems and countermeasures have advanced dramatically in recent years. Specifically, firewalls, antivirus software, and multiple layers of validation and verification have made IT systems much more secure and, at the same time, more effective and efficient. Yet businesses still have much work to do with respect to securing their assets.

Indeed, according to a recent survey, only roughly one-third of security leaders have high confidence in their organization’s ability to detect fraud and prevent any incursions from becoming serious problems.7 In other words, companies need to find more effective ways to protect their operations, information, employees, customers, products, finances...