NAMER All PDFs

The Data-Informed Institution

Issue link: https://access.awscloud.com/i/1465316

Contents of this Issue

Navigation

Page 17 of 20

Content elements: › How education is using data for digital transformation › The mission and business value of data › Data, adaptability, and agility › Agility for data - 6 steps › How can we use data to bring adaptability to our institution? › In closing › About the author Spotting patterns Another area where data can promote agility is through sensing changes or recognizing patterns in the environment. For example, ML can be used to detect and respond to anomalies. We can train an ML model with historical or routine data, so it becomes used to what is "normal" and then apply it to find activity that is not normal. This technique is used, for example, to spot fraudulent credit card transactions or equipment on a factory production line that is diverging from its normal behavior and might have to be repaired or replaced—and to do so before it actually fails. In higher education, it can be used to detect and respond to plagiarism. According to Unicheck, which uses AWS services for its anti-plagiarism software, the purpose of plagiarism prevention software is not merely to catch cheaters so they can be penalized. Instead, they want to help educators identify and find a solution for "problematic students" early on. When we collect large amounts of data, we may find that we can identify relationships that we didn't know were there. Social media companies build large databases of relationships between people. A government might find that a potential terrorist they are investigating once lived at the same address as someone who is already known to be a terrorist—which might lead them to ask questions when they next encounter the person. A number of fraudulent immigration applications might turn out to have all been prepared by the same immigration lawyer. Here, we have moved well beyond simply using data to process transactions: we can now find important and interesting relationships between those transactions. But once again, we don't know exactly what relationships we might find; agility, flexibility, and curiosity are the keys to deriving value from data. To cite one more example of using data to "keep an eye on events" the existence of a data point can serve as confirmation that an activity took place—for example, when audit trail logs are created automatically. By following the trail of activities, auditors may be able to validate compliance or investigate improper activity. Blockchain is often used to store data that confirms that activities took place—for example, the issuance of a credential, a transfer of money between two parties, or an approval of a contract by the parties involved. By using automated guardrails and audit data to establish compliance, enterprises can often avoid heavyweight compliance processes that reduce agility and consume precious time. There are, of course, challenges in using data to support business agility. As we noted previously, it requires skill to draw the appropriate inferences from data. The data does not always tell us what action to take—we have to interpret it and make good decisions. Often, we face a trade-off between false positives and false negatives—for instance, if we use the data to spot anomalous transactions to identify potential fraud, we run the risk of flagging too many transactions as anomalous and annoying our customers or flagging too few and allowing fraud to sneak through. The larger the data set becomes, the more likely that meaningless patterns will emerge or that important patterns will become buried in the sheer number of potential connections. Noise accumulates along with signal. 17

Articles in this issue

Links on this page

view archives of NAMER All PDFs - The Data-Informed Institution