Best of TAB 2017 part 1: the top case studies

TAB OnRecord

Over the next four days we will share the top white papers, case studies, RIM guides and blog posts. The post Best of TAB 2017 part 1: the top case studies appeared first on TAB Records Management Blog | TAB OnRecord. In a four-part series, we will be revealing the top RIM resources of the past year, as voted by your colleagues in records and information management.

Paper 78

Award-winning loyalty and rewards program personalizes online experiences

OpenText Information Management

Customer Experience Management Case Studies Case study customer story Jet Privilege Loyalty and Rewards Programs OpenText Elite OpenText LiveSite OpenText TeamSiteWhen loyalty is your business, how do you support and engage your members and offer the best digital experience? Jet Privilege turned to personalizing the web experience, tailored to the needs of its members, encouraging loyalty in return.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Capitec Bank innovates to create real-time client interaction

OpenText Information Management

Enterprise Content Management Banking Capitec Bank Captiva Case Studies Documentum Documentum xCP enterprise content management financial services xPressionHow can digital technologies help banks gain a competitive advantage in today’s highly competitive financial services sector?

Download Our Newest Comprehensive Case Study on Les Schwab

IGI

This case study reveals a typical but complex IG problem: managing the relationships among key IG players, incl uding: Outside law firms that play a central role in approving, blocking, and/or advising on key IG decisions (like information retention and preservation). Click here to access the case study in the IGI Community.

Best of TAB 2017 part 2: the top blog posts

TAB OnRecord

It is time for part two of our series on the top RIM resources of the past year, including your favorite case studies, white papers, blog posts and guides. In this installment, we share the top three blog posts of 2017: how to save money with RIM, corporate moves, and document imaging for financial institutions. [.] The post Best of TAB 2017 part 2: the top blog posts appeared first on TAB Records Management Blog | TAB OnRecord.

e-Records 2017 – “Information Governance: Take Control and Succeed” Conference Recap

The Texas Record

The 2017 e-Records conference delivered on all fronts hosting a variety of vendors, local government and state agency representatives and, of course, plenty of staff from the two hosting state agencies: Department of Information Resources (DIR) and Texas State Library and Archives Commission (TSLAC). Given the topic of the conference, many of the presentations centered around information governance and implementation whether in the cloud, SharePoint, or through successful case studies.

Archiving and describing mass tragedy: the Web Archive on the October 1, 2017 Shooting in Las Vegas, Nevada

Archive-It

Tragedy struck Las Vegas, Nevada on October 1, 2017, when a lone gunman opened fire onto a crowd of twenty-two thousand people attending the Route 91 Harvest Festival, injuring over five hundred people and killing fifty-eight. Archiving Spontaneous Events Case Studies

Google's Data on Login Thefts

Schneier on Security

This is interesting research and data: With Google accounts as a case-study, we teamed up with the University of California, Berkeley to better understand how hijackers attempt to take over accounts in the wild. From March 2016 to March 2017, we analyzed several black markets to see how hijackers steal passwords and other sensitive data. [.].

Data Breaches, Phishing, or Malware? Understanding the Risks of Stolen Credentials

Elie

In this paper, we present the first longitudinal measurement study of the underground ecosystem fueling credential theft and assess the risk it poses to millions of users. Over the course of March, 2016–March, 2017, we identify 788,000 potential victims of off-theshelf keyloggers; 12.4 Drawing upon Google as a case study, we find 7–25% of exposed passwords match a victim’s Google account.

Understanding web archive access and use with Google Analytics: Lessons and questions from the Federal Depository Library Program

Archive-It

Case Studies How ToThe following is a guest post by Andra Stump of GPO contractor Zimmerman Associates, Inc., with contributions by Dory Bower of the U.S. Government Publishing Office (GPO). Stump and Bower introduce how Archive-It partners at the Federal Depository Library Program (FDLP) Web Archive have implemented and use Google Analytics to understand the use of their existing collections and plan for the future.

Best of TAB 2017 part 3: the top white papers

TAB OnRecord

In a four-part series, we are bringing you the top case studies, white papers, blog posts, and guides – all chosen by your records management colleagues! The post Best of TAB 2017 part 3: the top white papers appeared first on TAB Records Management Blog | TAB OnRecord. For part three of our series, we reveal the most popular white papers of the past year. These in-depth resources cover: survival skills for modern records managers, RIM software, [.] Read More.

Paper 81

Acoustical Attacks against Hard Drives

Schneier on Security

Despite the widespread use of HDDs and their critical role in real-world systems, there exist only a few research studies on the security of HDDs. In particular, prior research studies have discussed how HDDs can potentially leak critical private information through acoustic or electromagnetic emanations. We show the feasibility of the proposed attack in two real-world case studies, namely, personal computers and CCTVs.

From local to global, NYARC’s networks bring art history to the web archive

Archive-It

In this case, why are three heads better than one? NYARC’s Archive-It collections are devoted to our institutional websites, NYARC’s own website and project sites, art-rich websites of significance to the study of art and art history, artists’ websites, auction house sites and their embedded catalogs, catalogue raisonnés, sites of NYC galleries and art dealers, and sites dedicated to restitution efforts and provenance of artworks that may be lost, stolen, or looted.

How to start your career in cyber security

IT Governance

Study. Books and e-learning courses might be better options, as they allow you to study specific topics at your own pace. This one-day course is delivered by an experienced information security practitioner, and combines formal training, practical exercises and relevant case studies. There has never been a better time to get into cyber security. There is a growing demand for experts , leading to increased salaries and job opportunities.

Archive-It Partner News, November 2017

Archive-It

To join us for updates on all things Archive-It in Q3 2017, simply point your web browsers at call time to: [link]. Take the NDSA 2017 Web Archiving Survey. Any United States organization involved in web archiving or in the process of planning a web archive is encouraged to take the survey before it closes on November 17, 2017. To explore a rich case study in collecting and parsing out this information, see the new blog post by partners at the U.S.

Attacking encrypted USB keys the hard(ware) way

Elie

We will demonstrate how this methodology works in practice via a set of case-studies. Ever wondered if your new shiny AES hardware-encrypted USB device really encrypts your data - or is just a fluke? If you have, come to our talk to find out if those products live up to the hype and hear about the results of the audit we conducted on multiples USB keys and hard drives that claim to securely encrypt data.

Honda Is Using IBM Watson to Drive Real Changes in Quality Assurance

Information Management Resources

This IDC Case Study examines how Honda implemented a cognitive system using text analytics to help it respond faster to customer feedback. Customer-centricity Customer data

Who will win the driverless / autonomous car wars?

Information Matters

Historical case studies ( eg. I’ve been planning some new classes for the fast-approaching semester and have decided to use the example of driverless vehicles to help my students think about what determines which type of companies win when a new technology emerges.

IGI and TGCI’s “The Exchange” Presents The Information Governance Forum 2017

IGI

Case Studies in IG. November 1 st , 2017-The Buckhead Club. Atlanta, GA. Colloquium Lead Moderators: Barclay T. Blair. Information Governance Initiative. Jason R. Baron. Drinker Biddle & Reath LLP. The Exchange” Information Governance Forum – Atlanta, is the first program developed and delivered through the new TGCI partnership with IGI.

GDPR 20

How Exactly are Fraudsters Ripping Off Your ATMs?

Rippleshot

In a recent webinar hosted by the ABA and Rippleshot's Chief Data Scientist Randal Cox, we discussed case studies of actual fraudster behavior and explored patterns of ATM misuse that help financial institutions fully understand the scope of this problem — and why it’s getting worse. Solving ATM fraud has become a 2 billion-dollar question. The impact of ATM skimming on a global scale).

IT 40

To Bucket or Not to Bucket…?

The Texas Record

Once it’s completed successfully, you’ll have an outstanding case study that you can share with other divisions within your agency. There is a term in records management circles you might have heard of called “big buckets.” ” Have you ever stopped and thought, “What is this? Should I be doing this? Am I missing out on something?” ” (Coincidentally, there’s the pop culture acronym F.O.M.O.

New Functional Schedule for North Carolina State Agencies

The Schedule

For a more in-depth look at the process behind this project, check out the case study published by SAA’s Government Records Section. A years-long project at the State Archives of North Carolina has culminated with the publication of the first Functional Schedule for North Carolina State Agencies.

Kofax Announces “First Year Free” Offer for its Market Leading Information Capture Solutions

Document Imaging Report

Irvine, CA, November 30, 2017 – Kofax® , a leading provider of software to simplify and transform the First Mile™ of business, today announced a “First Year Free” offer that allows organizations to try and buy its market leading Kofax Capture™ and Kofax Transformation™ software on a no charge basis. County of Ventura Automates Case Management with Capture Shared Services Solution case study.

Interactive: What Does It Really Mean?

Association eLearning

In these cases, people use interactive as a buzzword. In this case, I’m using “something involving meaningful action or input from a learner” as the definition. Reading a case study and using it to come to conclusions. Merriam-Webster ’s online dictionary defines “interactive” as, “involving the actions or input of a user.” When you stop to think about it, that’s not very clear. So, is eLearning with nothing but a next button interactive? The learner clicks something.

IT 55

4 ways ISO 27001 can enhance your business

IT Governance

You’ll learn how to implement ISO 27001 in nine steps and have the opportunity to get involved in group discussions, practical exercises and case studies. If your organisation is concerned about information security, it should have an ISO 27001 -compliant information security management system (ISMS) in place. Implementing an ISMS helps organisations manage their security practices, as well as helping to monitor, audit and improve their information security.

Sales 41

Web archiving and public knowledge: Collaborating with Vancouver Island Archive-It partners

Archive-It

Wildfires 2017 to which several universities contributed seeds, and UVic’s B.C. Provincial Candidates 2017 collection, an outcome of a collaboration started at BC Gov Info Day 2017 at Simon Fraser University, Burnaby, and a case of using–or trying to use–online political party resources to build comprehensive seed lists. Case Studies Collaborative Collectingby Caron Rollins, Matt Huculak, and Dana McFarland.

The Power of the Record

Brandeis Records Manager

Each year, we have excellent conferences–ARMA, AIIM, MER–I’ve attended them all multiple times, and they can be counted on for great sessions, engaging vendor floors, insights, leading edge case studies, keynote inspiration, and collegiality. George Despres, CRM. Program Director for University Records Management, Brandeis University. The content in this blog reflects the opinions of the author, and not of Brandeis University.).

Collecting for continuity and for change: The web archiving experience in Westborough

Archive-It

In 2017, our library applied for and received a grant to participate in the Community Webs program, designed to teach public libraries how to use web archiving tools and enable them to curate local history collections. Case Studies Community WebsBy Anthony Vaver, Local History Librarian and Archivist, Westborough Public Library.

Saving Local News on the Web

Archive-It

Gothamist and DNAInfo as they appeared on November 2, 2017. Case Studies Community WebsThe following is a guest post by Diana Bowers-Smith, Archivist, Brooklyn Collection, at the Brooklyn Public Library. For this year’s Endangered Data Week , the Brooklyn Public Library hosted a panel discussion at its Central Library’s Info Commons Lab on the topic of “Saving Local News on the Web.”

Why we need long-term thinking for long-term records

Preservica

Records and information governance practitioners play a vital role in easing this tension, creating dialogues and use cases to move people from a blinkered short term focus. To find out more about how digital preservation can help to protect critical, long term business records, take a look at our case studies or get in touch with the Preservica team Regardless of the sector you work in, there’s a tendency for users and managers to focus exclusively on the short-term.

Optimizing healthcare value with prescriptive analytics – Part 2

CGI

I invite you to read our case study to learn more about our project methods and results. Optimizing healthcare value with prescriptive analytics – Part 2. shobana.lv@cgi.com. Mon, 02/20/2017 - 08:00. Moving from “what if” to “what’s best”. In my previous blog on this topic , I discussed the need to shift analytics from monitoring and reporting of what has happened, to using analytics to make decisions.

Webinar: Simple Ways to Turn Your Records Liaisons Into Records Ambassadors

The Texas Record

This case study shows how the launch, and eventual revamping, of this program has impacted records management across Denton County. Date: Wednesday, October 18, 2017. In July, some staff were fortunate enough to attend the annual NAGARA Conference in Boise, ID. One of the sessions we attended was a presentation by Holly Dolan, Assistant Manager of Records Management for Denton County.

Hunting down Gooligan — retrospective analysis

Elie

This talk provides a retrospective on how during 2017 Check Point and Google jointly hunted down Gooligan – one of the largest Android botnets at the time. Beside its scale what makes Gooligan a worthwhile case-study is its heavy reliance on stolen oauth tokens to attack Google Play’s API, an approach previously unheard of in malware.

IT 48

NSA releases the source code of the GHIDRA reverse engineering framework

Security Affairs

The framework was first mentioned in the CIA Vault 7 dump that was leaked in 2017. My colleagues at Cybaze-Yoroi ZLAB malware demonstrated how to use the NSA Ghidra suite in a real case study, the analysis of the AZORult malware. NSA released the complete source code for its GHIDRA suite , the version 9.0.2 is available on the Agency’s Github repository.

Chinese hackers exploited a Trend Micro antivirus zero-day used in Mitsubishi Electric hack

Security Affairs

“In a case study on its website, Trend Micro lists Mitsubishi Electric as one of the companies that run the OfficeScan suite.” Chinese hackers have exploited a zero-day vulnerability the Trend Micro OfficeScan antivirus in the recently disclosed hack of Mitsubishi Electric.

Crooks offer millions to skilled black hats to help them in extortion campaigns

Security Affairs

Cybercrime gangs aim at hiring skilled hackers that can help them in extortion campaign against high-worth individuals, in this case they promise $30,000 per month ($360,000 per year). “These emails have been reported intermittently since late 2017, but the scale and persistence of the campaigns rocketed over 2018. One of the most interesting case studies for extortion attempt reported in the report was the one that involved the hacking group The Dark Overlord.

Sales 83

NHS is still assessing the cost of WannaCry one year later

Security Affairs

The estimate in the report considers the financial costs in two time periods: during the attack between 12 and 18 May 2017; during the recovery period in the immediate aftermath to June-July 2017; The analysis focus on two categories of cost are: Direct impact – lost output of patient care caused by reduced access to information and systems required for care leading to cancelled appointments etc.

A straightforward and pragmatic guide to leadership, management and teamwork

CILIP

This book translates theories in teamwork, management and leadership into practical guidance backed up with examples and case studies from current library and information workers globally. The book covers management and leadership ideas, tools and techniques, and examples and case studies are provided from a wide range of libraries and information services in the UK and across the world.? A straightforward and pragmatic guide to leadership, management and teamwork.

Destroying Barriers to Destruction

InfoGoTo

So it didn’t come as much of a surprise that the 2015 and 2017 Cohasset/ARMA IG Benchmark reports saw virtually no decline in the number of organizations (76%) that maintain a “keep everything culture,” and don’t have a formal secure destruction plan. While there’s a case to be made that more destruction is occurring because of new business demands, I’m not confident that much will have changed in the intervening two years since the last survey.

Book reviews: a call to arms for open licensing

CILIP

Nearly all the case studies in the second half of the book are UK-based and most deal with digitisation projects; the two exceptions are the accounts from the British Library (open metadata) and the University of Edinburgh (open educational resources). Interestingly, many of the case studies reported similar challenges, for example concerns about the impact on commercial opportunities or the difficulties in selecting the most suitable CC licence.