G06Q10/105

METHOD AND SYSTEM OF ON-LINE REAL-TIME SHADOWING FOR CONTEXT AWARE USER RELATIONSHIP MANAGEMENT

Methods and systems are disclosed herein to provide real-time shadowing service architectures and workflows to support dynamic event pattern parameter configuration, collection, filtering, learning, and profiling for users of one or more interactive platforms. The real-time shadowing service may receive a subset of application specific tags, generate tag values for the tags in the subset based on user behavior, and report the values for the tags in the subset. Further, the real-time shadowing service may collect data based on a list of tags for an engagement level related parameter vector (E.V.) and a competence level related parameter vector (C.V.). Further, the real-time shadowing service may map E.V. and C.V. for an event of interest (EoI) to an engagement level (E.L.) and competence level (C.L.) based on a model. The real-time shadowing service may also generate alerts based on detection rules, E.L. and C.L., and transmit the alerts.

METHOD AND APPARATUS FOR IMPROVING DISPATCH OF DIFFERENT TYPES OF LAW ENFORCEMENT PATROLS FOR ACHIEVING A DESIRED DETERRENT EFFECT
20180012323 · 2018-01-11 ·

A process for improving dispatch of different types of law enforcement patrols (LEPs) for achieving a desired deterrent effect includes first receiving patrol route information indicating patrol routes taken by first LEPs, and then determining, as a function of a type of each of the first LEPs, a threshold level of deterrence reached for each of the patrol routes taken. Subsequently, a threshold level of deterrence desired (TLoDD) for each of the plurality of patrol routes is determined as a function of historical and/or real-time crime information. A first patrol route having a threshold level of deterrence reached (TLoDR) that is less than a TOoDD is identified and, as a function of the difference, a particular type of second LEP having a sufficient deterrent effect factor to compensate for the difference is identified. An available responding second LEP of the particular type is then identified for dispatch.

Systems and methods for understanding identity and organizational access to applications within an enterprise environment

Methods and systems for understanding identity and organizational access to applications within an enterprise environment are provided. Exemplary methods include collecting data about relationships between applications and metadata associated with the applications in a computing environment of an enterprise, the metadata including information concerning a plurality of users accessing the applications; updating a graph database including nodes representing the applications of the computing environment of the enterprise and edges representing relationships between the applications; enriching the graph database by associating the nodes with metadata associated with the applications and associating user accounts with metadata associated with roles, organizations membership, privileges, and permissions; analyzing the graph database to identify a subset of nodes being accessed by a user of the plurality of users; and displaying, via a graphical user interface, a graphical representation of the subset of nodes and relationships between the nodes in the subset of the nodes.

Systems and methods for understanding identity and organizational access to applications within an enterprise environment

Methods and systems for understanding identity and organizational access to applications within an enterprise environment are provided. Exemplary methods include collecting data about relationships between applications and metadata associated with the applications in a computing environment of an enterprise, the metadata including information concerning a plurality of users accessing the applications; updating a graph database including nodes representing the applications of the computing environment of the enterprise and edges representing relationships between the applications; enriching the graph database by associating the nodes with metadata associated with the applications and associating user accounts with metadata associated with roles, organizations membership, privileges, and permissions; analyzing the graph database to identify a subset of nodes being accessed by a user of the plurality of users; and displaying, via a graphical user interface, a graphical representation of the subset of nodes and relationships between the nodes in the subset of the nodes.

HUMAN RESOURCE DEVELOPMENT SUPPORT SYSTEM

A human resource development support system calculates, for each agent, a profitability indicator value that is a value of an indicator of profitability of the agent on the basis of order histories for customers regarding industrial machinery at the agent. Then, the human resource development support system generates, for each agent, reference information capable of identifying a grade of service personnel for which human resource development is to be strengthened, on the basis of the calculated profitability indicator value and on the basis of constitution information indicating the numbers of service personnel belonging to the agent for individual grades.

VICTIM REPORTING AND NOTIFICATION SYSTEM AND ALERT MECHANISM FOR ORGANIZATIONS
20230237434 · 2023-07-27 ·

A method and system for victim notification functions by receiving a report from an accuser regarding conduct of an accused that is believed to constitute harassment, bullying and/or discrimination, the reporting being composed of structured data. The severity of conduct in the report is scored and ranked and the pervasiveness of conduct in the report is scored and ranked by comparing the reported conduct against prior reports regarding the accused. Other reports by the accuser are also analyzed.

VICTIM REPORTING AND NOTIFICATION SYSTEM AND ALERT MECHANISM FOR ORGANIZATIONS
20230237434 · 2023-07-27 ·

A method and system for victim notification functions by receiving a report from an accuser regarding conduct of an accused that is believed to constitute harassment, bullying and/or discrimination, the reporting being composed of structured data. The severity of conduct in the report is scored and ranked and the pervasiveness of conduct in the report is scored and ranked by comparing the reported conduct against prior reports regarding the accused. Other reports by the accuser are also analyzed.

CONTINUOUS AND ANONYMOUS RISK EVALUATION

Techniques for risk evaluation include receiving, from a requesting entity, a request for monitoring target entities specifying a first identifier associated with each target entity and target entity information. The system generates a second identifier and a third identifier for each target entity and stores a mapping of the second identifiers to the first identifiers and the third identifiers, preventing the second identifiers from being provided to the requesting entity. The system monitors a periodically updated data set and determines risk metrics for the target entities, comparing each risk metric to a threshold value to identify target entities whose risk data indicates an insider threat. The system generates a third identifier for the identified target entities and provides the third identifiers to the requesting entity. Responsive to a request for a corresponding first identifier, the system identifies and provides the first and third identifiers to the requesting entity.

Pre-data breach monitoring

A method for providing pre-data breach monitoring provides information to businesses that is useful to predict portions of the company data that may not be secured well enough and other risks associated with data breaches, such as employees that may not be trustworthy.

METHOD OF ESTIMATING EMPLOYEE TURNOVER RATES, COMPUTING DEVICE, AND STORAGE MEDIUM
20230028536 · 2023-01-26 ·

A method of estimating employee turnover rates obtains original employee data from a preset data source. First data processing is applied to the original employee data to obtain first processed employee data. A training set and a first verification set are selected from the first processed employee data. The training set is used to train a machine learning model to obtain a turnover estimation model. The first verification set is used to verify the turnover estimation model to obtain a first estimation result. The turnover estimation model is optimized according to the first estimation result to obtain an optimized turnover estimation model. Updated employee data and a corresponding employee turnover rate of a second time period are obtained. The method helps to replenish manpower in time and avoids over-recruitment.