kc-ol.com/i2 anb plugin presentation 27.10.2015.pdf · powered by ibm i2, case manager and watson...
TRANSCRIPT
1 www.integritie.com
© Integritie 2015
Social Media Analytics for i2
Cloud Specialist in the areas of Image Capture, Content Management, and ECM Merger, and Information Consolidation
eMail [email protected]
www.integritie.com
www.smcapture.com
www.kc-ol.com
22.10.2015
kc-ol.com/i2
2 www.integritie.com
© Integritie 2015
Knowledge Capture® Online (KC Online)
is a content capture and management
application, providing prebuilt, out of
the box, configurable, business
applications, both OnPremise and In the
Cloud
Knowledge Capture – Content Management Cloud
Powered by IBM i2, Case Manager and Watson ICA
Knowledge Capture is powered by
• IBM i2 Analyst
• IBM FileNet Content Manager
• IBM Case Foundation (workflow)
• IBM Case Manager
• IBM Content Analytics
• IBM Enterprise Records Manager
• IBM Content Manager OnDemand
• IBM Content Manager
• IBM e-Discovery
• IBM Datacap
• Knowledge Capture Online®
• SMC4 Social Media Management
3 www.integritie.com
© Integritie 2015
End to End Analytics Solution
Content
& Sentiment
Analytics
Capture
Communications
i2Reporting &
Dashboard
FileNet
Case ManagerKC Online Case
Management
FileNet BPMWorkflow
Reference
Databases
And
Structured
Data
1
2
34
6
5
4 www.integritie.com
© Integritie 2015
SMC4 is A Total Social Media Communication Tool
SMC4 provides:
1. Seamless integration of Social Media to i2
2. A single sign-in tool, controlling the receipt
and sending of all Social Media
communications
3. Comprehensive controls and supervision,
ensuring published and received social
media communications meet regulative
policies
4. Full audit, control and reporting tool of all
social media communications
5. Repository and e-discovery of all social
media communications
6. Regulative life cycle control and destruction
of all social media communications
Social Media Single Sign-in Console
5 www.integritie.com
© Integritie 2015
SMC4 – Out of the Box Social Media Connection for i2
SMC4 provides an i2 out of the box Social Media Connector
Direct
APIs
6 www.integritie.com
© Integritie 2015
We provide direct APIs for:
SMC4 Connector for i2 includes
Channel Channel API
RestrictionsSearch Window
1. Twitter Full Access i2 ✓ SMC4 ✓
2. Facebook Authorised Access I2 ✓SMC4 ✓
5. LinkedIn Authorised Access SMC4 ✓
4. Instagram Authorised AccessSMC4 ✓
4. Google+ Authorised Access SMC4 ✓
Authorised Access means that the Social Tool (such as Facebook) has API
restrictions and must provide security approval to see all social content (like
Facebook friend authorisation).
7 www.integritie.com
© Integritie 2015
Social MediaSearchRetrieveExpand
Analysts Notebook
Notebook Plugin
i2 Social Analyst’s Notebook Integration – Push
(PUSH)Automatic Updates
from Twitter, Facebook
SMC4 is used to define a Company, Person of Interest, or Connection
you wish to monitor, such as Elvis Presley or Barclays Bank
Once defined, the social media content is available to i2 automatically
Six minute polling cycles as per API restrictions
Meta dataKC OnlineAnalytics
Categorised Risk
Message
Integritie KC Online SMC4
SMC4 Repository(Candidate Store)
Stored for 30 days
Restrictions of
Social APIs
8 www.integritie.com
© Integritie 2015
Social MediaSearchRetrieveExpand
Analysts Notebook
Notebook Plugin
(PULL)Search, Retrieval
and Expansion of
Messages
i2 Social Analyst’s Notebook Integration – Pull
i2 Social Media Search Console
Meta dataKC OnlineAnalytics
Categorised Risk
Message
Integritie KC Online SMC4
SMC4 Repository(Candidate Store)
Stored for 30 days
Complete a search from within
i2 for social content
9 www.integritie.com
© Integritie 2015
Meta dataKC OnlineAnalytics
Categorised Risk
Social MediaSearchRetrieveExpand
Message
Integritie KC Online SMC4
Analysts Notebook
Notebook Plugin
(PULL)Search, Retrieval
and Expansion of
Messages
(PUSH)Charts, Schemas and Data saved within an
i2 repository if available
SMC4 Repository(Candidate Store)
i2 Social Analyst’s Notebook Data Flow
IBM i2 IAP
IBM i2 iBase
IBM i2 EIA
(PUSH)Automatic Updates
from Twitter, Facebook
Stored for 30 days
Store vetted social media content
Your Social Media Storage and Retention Rules
11 www.integritie.com
© Integritie 2015
1. Search for social media content from within i2
2. Search for social media accounts from within i2
3. Expand posts of an account to show latest information
4. Expand for followers/following and identify common connections
5. Example charts built using the SMC4 ANB plugin
6. Counterfeit Mobile Application for i2
7. How to Download the i2 ANB Plugin
Demonstrations
12 www.integritie.com
© Integritie 2015
Demo 1
Searching for social media content from within i2
The SMC4 i2 plugin features
search capabilities that access
the entirety of the content
captured via the connected SMC4
instance.
It is possible to filter via social
media site, date range, SMC4
category, specific social account,
or keyword. Once given a list of
social messages, you can further
filter either by name of the
sender or keyword within the
content.
To add these messages into
Analyst’s Notebook, there is the
option to add those you have
highlighted, or every message
that’s been returned. These will
then be added directly the
Analyst’s Notebook chart.
13 www.integritie.com
© Integritie 2015
Demo 2
Search for social media accounts from within i2
The SMC4 ANB Plugin also
features a social account search
option, which enables users to
search for either Twitter or
Facebook accounts from within
ANB.
It is possible to filter via social
media site and you can then
search by name or username.
Results will be returned where
you gain further information
about the account, such a
location information and a link
back to the social site.
By clicking the monitor account
option, this social media account
will automatically be loaded into
SMC4, where all future publically
available content will be
captured.
14 www.integritie.com
© Integritie 2015
Demo 3
Expand posts of an account to show latest information
.
In order to expand a post in
Analyst’s Notebook, you can right
click on the social media account
entity, select the SMC4 option,
and choose between the
expansion of posts, followers, or
those the selected account
follow.
Within these expansions, you can
further filter the posts you want
to bring back onto the chart.
The SMC4 plugin enables a user to
either expand all, or complete a
filtered expand where a user can
view the associated followers or
those they are following and
choose which accounts to display
on the chart.
15 www.integritie.com
© Integritie 2015
Demo 4
Expand Followers and Find Common Connections
By loading multiple accounts from
the SMC4 plugin, analyst’s can
expand the followers to find
common connections.
Once this data is brought back to
a chart, the links between
entities will be automatically
displayed.
Users can then expand the
common links to build the
network out.
This functionality is incredibly
useful when examining people of
interest, in order to understand
how they are connected, along
with connections to individuals
that may not have been identified
yet.
16 www.integritie.com
© Integritie 2015
KC Online Counterfeit Capture - Process
An agent in the field scans the barcode of a suspected counterfeit product
Identify as Counterfeit
Process Case
Database Look-up
ReportingCreate Case
Scan Barcode
Agent is provided with artwork and identifying information to confirm if counterfeit
A case worker can then process the case using a defined business process
Case’s can be created automatically once the product is identified as counterfeit
Reporting can be utilised to understand the full history of the case
The system does an automatic DB lookup against known counterfeit batches/goods
The KC Online Counterfeit module, powered by i2, Case Manager and
Watson, is a single solution to differentiate authentic products from
counterfeit, with a Chain of Custody module to capture, analyse and
leverage all counterfeit evidence, linking the chain of organised crime
11 22 33 44 55 66
17 www.integritie.com
© Integritie 2015
Counterfeit Capture – Barcode Scanner
1 2 3
The counterfeit capture mobile
application utilises a barcode scanner
to quickly and efficiently look up
counterfeit goods based on the product
bar code based on documents held
within the KC Online repository.
Batches are identified as counterfeit
through a series of documents
identifying if goods are fraudulent or
real.
Securely logon to the counterfeit
capture mobile
18 www.integritie.com
© Integritie 2015
Counterfeit Capture – Case Management
On discovery of a counterfeit product the mobile application will automatically create a case in Advance
Case Manager. Once identified the investigators can then process the case through to resolution utilising
checklists based on business driven procedures. All documents then relating to a case will be stored in a
central archive.
4 5
19 www.integritie.com
© Integritie 2015
Three Easy Steps to Get Social Media into i2
1. Download the plugin – smcapture.com/i2/analysts-notebook
2. Install the SMC4 i2 ANB plugin
3. Use it
Three Easy Steps to connect Social Media to i2 ANB
21 www.integritie.com
© Integritie 2015
Who to Target for New Licences of i2 with Social Feeds
1. Police DetectivesCapture criminal activity on social media and use that data when completing
investigations.
2. ManufacturingCounterfeit, find organised crime connections. This connection could be direct
messaging on social media or through mutual acquaintances.
3. Insurance ClaimsClaimant profiles can be monitored to find fraudulent insurance claims, e.g. an
individual who claims to be in too much pain to work, yet who posts pictures of
themselves in a nightclub.
4. RetailCapture employees’ social media posts and follow their external conversations in
order to watch for mentions that could lead to organised crime.
5. Banking Fraud
If suspicions are raised over a customer who has just opened a bank account they
can be monitored and connected to other online aliases connected to them which
can, in turn, be used to discover whether they have opened multiple bank accounts
fraudulently.
6. CMO – Marketing Utilised to discover thousands of potential customers by monitoring those who are
following several similar company brands and targeting them specifically.
7. Schools
Monitor students’ social media accounts for interactions with fake profiles. For
example, registered sex offenders pretending to be a fellow student and
encouraging the student to meet them.
22 www.integritie.com
© Integritie 2015
Visit us at Insight Las Vegas Oct 2015 – Booth 884
Contact
Rob Dinerman
845-271-8285
Sam Clive
Next Steps