Petter Gottschalk | |
---|---|
Born | March 27, 1950 |
Nationality | Norwegian |
Education | Technische Universität Berlin |
Alma mater | Dartmouth College |
Scientific career | |
Fields | IT strategy |
Institutions | BI Norwegian Business School |
Petter Gottschalk (born March 27, 1950) is a Norwegian professor of IT strategy employed at the BI Norwegian Business School at its Institute for Leadership and Organizational Management. [1]
He is educated Diplom-Kaufmann from Technische Universität Berlin, Master of Science from Dartmouth College and Massachusetts Institute of Technology, and Doctor of Business Administration from Henley Management College and Brunel University. [1]
Gottschalk has previously been CEO of Norwegian Computing Center, ABB Datakabel, Statens kantiner and Norsk Informasjonsteknologi (NIT). [1]
In recent years, Gottschalk has done research on the police and their use of IT. He has also done much research on knowledge management, and he has published a number of books on that subject, as well as books about the police. He has also worked as an advisor to the police. His research on the police and their use of information technology has resulted in his appearance in the news media when this topic has been in the news. Gottschalk also researches crime as seen from the police perspective, in particular organized crime and financial crime. In recent years, he has published many articles as well as a number of books in English about organized crime, financial crime and criminal entrepreneurship. Gottschalk was an active participant in the Norwegian public discourse about EU's Data Retention Directive in 2010 expressing his opinion that the police ought to make better use of the sources they already have. [2]
BI Norwegian Business School is a private university college in Norway. It was founded as a private, commercial night school in 1943, offering shorter courses in business and office-related subjects for tradespeople. In 1969 it became a foundation and it was later accredited as a college and later as a specialised university-level institution, becoming Norway's second business school after the state Norwegian School of Economics.
Location-based service (LBS) is a general term denoting software services which use geographic data and information to provide services or information to users. LBS can be used in a variety of contexts, such as health, indoor object search, entertainment, work, personal life, etc. Commonly used examples of location-based services include navigation software, social networking services, location-based advertising, and tracking systems. LBS can also include mobile commerce when taking the form of coupons or advertising directed at customers based on their current location. LBS also includes personalized weather services and even location-based games.
Closed-circuit television (CCTV), also known as video surveillance, is the use of closed-circuit television cameras to transmit a signal to a specific place, on a limited set of monitors. It differs from broadcast television in that the signal is not openly transmitted, though it may employ point-to-point, point-to-multipoint (P2MP), or mesh wired or wireless links. Even though almost all video cameras fit this definition, the term is most often applied to those used for surveillance in areas that require additional security or ongoing monitoring.
Business intelligence (BI) consists of strategies and technologies used by enterprises for the data analysis and management of business information. Common functions of BI technologies include reporting, online analytical processing, analytics, dashboard development, data mining, process mining, complex event processing, business performance management, benchmarking, text mining, predictive analytics, and prescriptive analytics.
The term "white-collar crime" refers to financially motivated, nonviolent or non-directly violent crime committed by individuals, businesses and government professionals. The crimes are believed to be committed by middle- or upper-class individuals for financial gains. It was first defined by the sociologist Edwin Sutherland in 1939 as "a crime committed by a person of respectability and high social status in the course of their occupation". Typical white-collar crimes could include wage theft, fraud, bribery, Ponzi schemes, insider trading, labor racketeering, embezzlement, cybercrime, copyright infringement, money laundering, identity theft, and forgery. White-collar crime overlaps with corporate crime.
Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by local and federal governments or governmental organizations, but it may also be carried out by corporations. Depending on each nation's laws and judicial systems, the legality of and the permission required to engage in mass surveillance varies. It is the single most indicative distinguishing trait of totalitarian regimes. It is often distinguished from targeted surveillance.
Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or networks. These crimes involve the use of technology to commit fraud, identity theft, data breaches, computer viruses, scams, and expanded upon in other malicious acts. Cybercriminals exploit vulnerabilities in computer systems and networks to gain unauthorized access, steal sensitive information, disrupt services, and cause financial or reputational harm to individuals, organizations, and governments.
The Norwegian Police Security Service is the police security agency of Norway. The agency was previously known as POT, the name change was decided by the Parliament of Norway on 2 June 2001.
In general, compliance means conforming to a rule, such as a specification, policy, standard or law. Compliance has traditionally been explained by reference to deterrence theory, according to which punishing a behavior will decrease the violations both by the wrongdoer and by others. This view has been supported by economic theory, which has framed punishment in terms of costs and has explained compliance in terms of a cost-benefit equilibrium. However, psychological research on motivation provides an alternative view: granting rewards or imposing fines for a certain behavior is a form of extrinsic motivation that weakens intrinsic motivation and ultimately undermines compliance.
Restructuring or Reframing is the corporate management term for the act of reorganizing the legal, ownership, operational, or other structures of a company for the purpose of making it more profitable, or better organized for its present needs. Other reasons for restructuring include a change of ownership or ownership structure, demerger, or a response to a crisis or major change in the business such as bankruptcy, repositioning, or buyout. Restructuring may also be described as corporate restructuring, debt restructuring and financial restructuring.
Data retention defines the policies of persistent data and records management for meeting legal and business data archival requirements. Although sometimes interchangeable, it is not to be confused with the Data Protection Act 1998.
A cybersecurity regulation comprises directives that safeguard information technology and computer systems with the purpose of forcing companies and organizations to protect their systems and information from cyberattacks like viruses, worms, Trojan horses, phishing, denial of service (DOS) attacks, unauthorized access and control system attacks. While cybersecurity regulations aim to minimize cyber risks and enhance protection, the uncertainty arising from frequent changes or new regulations can significantly impact organizational response strategies.
Predictive analytics is a form of business analytics applying machine learning to generate a predictive model for certain business applications. As such, it encompasses a variety of statistical techniques from predictive modeling and machine learning that analyze current and historical facts to make predictions about future or otherwise unknown events. It represents a major subset of machine learning applications; in some contexts, it is synonymous with machine learning.
The National Policing Improvement Agency (NPIA) was a non-departmental public body in the United Kingdom, established to support police by providing expertise in such areas as information technology, information sharing, and recruitment.
The IBM Center for The Business of Government is an independent business think tank that focuses on management issues in the U.S. Federal government. Founded in 2002, the Center is located in Washington, D.C.
Anders Bjørnsen Werp is a Norwegian politician of the Conservative Party. He was mayor of Øvre Eiker from 1999 until he was elected to the Stortinget from Buskerud in 2009. He was also deputy representative in the Stortinget from 1997 until 2005. Werp had formerly worked as an economic consultant and local political advisor for Norges Skogeierforbund. He was the leader of Buskerud Høyre from 1998 to 2008, and sat on Høyre's central board during the same period. He was reelected to the Storting for the period 2013–2017.
Big data primarily refers to data sets that are too large or complex to be dealt with by traditional data-processing application software. Data with many entries (rows) offer greater statistical power, while data with higher complexity may lead to a higher false discovery rate. Though used sometimes loosely partly due to a lack of formal definition, the best interpretation is that it is a large body of information that cannot be comprehended when used in small amounts only.
Privacy by design is an approach to systems engineering initially developed by Ann Cavoukian and formalized in a joint report on privacy-enhancing technologies by a joint team of the Information and Privacy Commissioner of Ontario (Canada), the Dutch Data Protection Authority, and the Netherlands Organisation for Applied Scientific Research in 1995. The privacy by design framework was published in 2009 and adopted by the International Assembly of Privacy Commissioners and Data Protection Authorities in 2010. Privacy by design calls for privacy to be taken into account throughout the whole engineering process. The concept is an example of value sensitive design, i.e., taking human values into account in a well-defined manner throughout the process.
The Telecommunications (Interception and Access) Amendment (Data Retention) Act 2015(Cth) is an Act of the Parliament of Australia that amends the Telecommunications (Interception and Access) Act 1979 (original Act) and the Telecommunications Act 1997 to introduce a statutory obligation for Australian telecommunication service providers (TSPs) to retain, for a period of two years, particular types of telecommunications data (metadata) and introduces certain reforms to the regimes applying to the access of stored communications and telecommunications data under the original Act.
Dataveillance is the practice of monitoring and collecting online data as well as metadata. The word is a portmanteau of data and surveillance. Dataveillance is concerned with the continuous monitoring of users' communications and actions across various platforms. For instance, dataveillance refers to the monitoring of data resulting from credit card transactions, GPS coordinates, emails, social networks, etc. Using digital media often leaves traces of data and creates a digital footprint of our activity. Unlike sousveillance, this type of surveillance is not often known and happens discreetly. Dataveillance may involve the surveillance of groups of individuals. There exist three types of dataveillance: personal dataveillance, mass dataveillance, and facilitative mechanisms.