Petter Gottschalk

Last updated
Petter Gottschalk
Born (1950-03-27) March 27, 1950 (age 74)
NationalityNorwegian
EducationBerlin Institute of Technology
Alma materDartmouth College
Scientific career
FieldsIT strategy
InstitutionsBI Norwegian Business School

Petter Gottschalk (born March 27, 1950) is a Norwegian professor of IT strategy employed at the BI Norwegian Business School at its Institute for Leadership and Organizational Management. [1]

He is educated Diplom-Kaufmann from Berlin Institute of Technology, Master of Science from Dartmouth College and Massachusetts Institute of Technology, and Doctor of Business Administration from Henley Management College and Brunel University. [1]

Gottschalk has previously been CEO of Norwegian Computing Center, ABB Datakabel, Statens kantiner and Norsk Informasjonsteknologi (NIT). [1]

In recent years, Gottschalk has done research on the police and their use of IT. He has also done much research on knowledge management, and he has published a number of books on that subject, as well as books about the police. He has also worked as an advisor to the police. His research on the police and their use of information technology has resulted in his appearance in the news media when this topic has been in the news. Gottschalk also researches crime as seen from the police perspective, in particular organized crime and financial crime. In recent years, he has published many articles as well as a number of books in English about organized crime, financial crime and criminal entrepreneurship. Gottschalk was an active participant in the Norwegian public discourse about EU's Data Retention Directive in 2010 expressing his opinion that the police ought to make better use of the sources they already have. [2]

Related Research Articles

<span class="mw-page-title-main">BI Norwegian Business School</span> Business school in Norway

BI Norwegian Business School is a private university college in Norway. It was founded as a private, commercial night school in 1943, offering shorter courses in business and office-related subjects for tradespeople. In 1969 it became a foundation and it was later accredited as a college and later as a specialised university-level institution, becoming Norway's second business school after the state Norwegian School of Economics.

<span class="mw-page-title-main">Closed-circuit television</span> Use of video cameras to transmit a signal to a specific place on a limited set of monitors

Closed-circuit television (CCTV), also known as video surveillance, is the use of closed-circuit television cameras to transmit a signal to a specific place, on a limited set of monitors. It differs from broadcast television in that the signal is not openly transmitted, though it may employ point-to-point, point-to-multipoint (P2MP), or mesh wired or wireless links. Even though almost all video cameras fit this definition, the term is most often applied to those used for surveillance in areas that require additional security or ongoing monitoring.

Business intelligence (BI) consists of strategies and technologies used by enterprises for the data analysis and management of business information. Common functions of BI technologies include reporting, online analytical processing, analytics, dashboard development, data mining, process mining, complex event processing, business performance management, benchmarking, text mining, predictive analytics, and prescriptive analytics.

<span class="mw-page-title-main">White-collar crime</span> Financially motivated nonviolent crime committed by business and government professionals

The term "white-collar crime" refers to financially motivated, nonviolent or non-directly violent crime committed by individuals, businesses and government professionals. The crimes are believed to be committed by middle- or upper-class individuals for financial gains. It was first defined by the sociologist Edwin Sutherland in 1939 as "a crime committed by a person of respectability and high social status in the course of their occupation". Typical white-collar crimes could include wage theft, fraud, bribery, Ponzi schemes, insider trading, labor racketeering, embezzlement, cybercrime, copyright infringement, money laundering, identity theft, and forgery. White-collar crime overlaps with corporate crime.

<span class="mw-page-title-main">Mass surveillance</span> Intricate surveillance of an entire or a substantial fraction of a population

Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by local and federal governments or governmental organizations, but it may also be carried out by corporations. Depending on each nation's laws and judicial systems, the legality of and the permission required to engage in mass surveillance varies. It is the single most indicative distinguishing trait of totalitarian regimes. It is often distinguished from targeted surveillance.

<span class="mw-page-title-main">Cybercrime</span> Type of crime based in computer networks

Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or networks. These crimes involve the use of technology to commit fraud, identity theft, data breaches, computer viruses, scams, and expanded upon in other malicious acts. Cybercriminals exploit vulnerabilities in computer systems and networks to gain unauthorized access, steal sensitive information, disrupt services, and cause financial or reputational harm to individuals, organizations, and governments.

<span class="mw-page-title-main">Norwegian Police Security Service</span> Domestic intelligence service in Norway

The Norwegian Police Security Service is the police security agency of Norway. The agency was previously known as POT, the name change was decided by the Parliament of Norway on 2 June 2001.

<span class="mw-page-title-main">Data management</span> Disciplines related to managing data as a resource

Data management comprises all disciplines related to handling data as a valuable resource, it is the practice of managing an organization's data so it can be analyzed for decision making.

In general, compliance means conforming to a rule, such as a specification, policy, standard or law. Compliance has traditionally been explained by reference to the deterrence theory, according to which punishing a behavior will decrease the violations both by the wrongdoer and by others. This view has been supported by economic theory, which has framed punishment in terms of costs and has explained compliance in terms of a cost-benefit equilibrium. However, psychological research on motivation provides an alternative view: granting rewards or imposing fines for a certain behavior is a form of extrinsic motivation that weakens intrinsic motivation and ultimately undermines compliance.

Data retention defines the policies of persistent data and records management for meeting legal and business data archival requirements. Although sometimes interchangeable, it is not to be confused with the Data Protection Act 1998.

<span class="mw-page-title-main">Federal Criminal Police Office (Germany)</span> German federal investigative police agency

The Federal Criminal Police Office of Germany is the federal investigative police agency of Germany, directly subordinated to the Federal Ministry of the Interior. It is headquartered in Wiesbaden, Hesse, and maintains major branch offices in Berlin and Meckenheim near Bonn. It has been headed by Holger Münch since December 2014.

Predictive analytics is a form of business analytics applying machine learning to generate a predictive model for certain business applications. As such, it encompasses a variety of statistical techniques from predictive modeling and machine learning that analyze current and historical facts to make predictions about future or otherwise unknown events. It represents a major subset of machine learning applications; in some contexts, it is synonymous with machine learning.

<span class="mw-page-title-main">National Policing Improvement Agency</span> Former public body in the United Kingdom

The National Policing Improvement Agency (NPIA) was a non-departmental public body in the United Kingdom, established to support police by providing expertise in such areas as information technology, information sharing, and recruitment.

<span class="mw-page-title-main">IBM Center for The Business of Government</span> American think tank

The IBM Center for The Business of Government is an independent business think tank that focuses on management issues in the U.S. Federal government. Founded in 2002, the Center is located in Washington, D.C.

<span class="mw-page-title-main">Anders B. Werp</span> Norwegian politician

Anders Bjørnsen Werp is a Norwegian politician of the Conservative Party. He was mayor of Øvre Eiker from 1999 until he was elected to the Stortinget from Buskerud in 2009. He was also deputy representative in the Stortinget from 1997 until 2005. Werp had formerly worked as an economic consultant and local political advisor for Norges Skogeierforbund. He was the leader of Buskerud Høyre from 1998 to 2008, and sat on Høyre's central board during the same period. He was reelected to the Storting for the period 2013–2017.

<span class="mw-page-title-main">Big data</span> Extremely large or complex datasets

Big data primarily refers to data sets that are too large or complex to be dealt with by traditional data-processing application software. Data with many entries (rows) offer greater statistical power, while data with higher complexity may lead to a higher false discovery rate. Though used sometimes loosely partly due to a lack of formal definition, the best interpretation is that it is a large body of information that cannot be comprehended when used in small amounts only.

Privacy by design is an approach to systems engineering initially developed by Ann Cavoukian and formalized in a joint report on privacy-enhancing technologies by a joint team of the Information and Privacy Commissioner of Ontario (Canada), the Dutch Data Protection Authority, and the Netherlands Organisation for Applied Scientific Research in 1995. The privacy by design framework was published in 2009 and adopted by the International Assembly of Privacy Commissioners and Data Protection Authorities in 2010. Privacy by design calls for privacy to be taken into account throughout the whole engineering process. The concept is an example of value sensitive design, i.e., taking human values into account in a well-defined manner throughout the process.

<span class="mw-page-title-main">Cheng Siwei</span>

Cheng Siwei was a Chinese economist, chemical engineer and politician. He was the Chairman of China Soft Science Research Association; President of the Chinese Society for Management Modernization; Director of the Research Center on Fictitious Economy and Data Science, Chinese Academy of Sciences; Dean of the School of Management of the Graduate University of the Chinese Academy of Sciences and Honorary President of East China University of Science and Technology.

<span class="mw-page-title-main">Telecommunications (Interception and Access) Amendment (Data Retention) Act 2015</span> Act of the Parliament of Australia

The Telecommunications (Interception and Access) Amendment (Data Retention) Act 2015(Cth) is an Act of the Parliament of Australia that amends the Telecommunications (Interception and Access) Act 1979 (original Act) and the Telecommunications Act 1997 to introduce a statutory obligation for Australian telecommunication service providers (TSPs) to retain, for a period of two years, particular types of telecommunications data (metadata) and introduces certain reforms to the regimes applying to the access of stored communications and telecommunications data under the original Act.

<span class="mw-page-title-main">Dataveillance</span> Monitoring and collecting online data and metadata

Dataveillance is the practice of monitoring and collecting online data as well as metadata. The word is a portmanteau of data and surveillance. Dataveillance is concerned with the continuous monitoring of users' communications and actions across various platforms. For instance, dataveillance refers to the monitoring of data resulting from credit card transactions, GPS coordinates, emails, social networks, etc. Using digital media often leaves traces of data and creates a digital footprint of our activity. Unlike sousveillance, this type of surveillance is not often known and happens discreetly. Dataveillance may involve the surveillance of groups of individuals. There exist three types of dataveillance: personal dataveillance, mass dataveillance, and facilitative mechanisms.

References

  1. 1 2 3 "Petter Gottschalk" (in Norwegian). BI Norwegian Business School. Archived from the original on March 30, 2012. Retrieved March 30, 2012.
  2. Oreld, Michael (March 15, 2010). "- Politiet trenger ikke lagringsdirektiv" [- The police do not need the Data Retention Directive]. Computerworld Norway (in Norwegian). Retrieved March 30, 2012.