{"id":30668,"date":"2017-02-24T12:30:19","date_gmt":"2017-02-24T01:30:19","guid":{"rendered":"https:\/\/www.aspistrategist.ru\/?p=30668"},"modified":"2017-02-24T13:37:03","modified_gmt":"2017-02-24T02:37:03","slug":"big-data-devils-detail","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/big-data-devils-detail\/","title":{"rendered":"Big Data: the devil\u2019s in the detail"},"content":{"rendered":"
<\/p>\n
As the government\u2019s review<\/a> of the Australian Intelligence Community (AIC) picks up steam, one of the key challenges is to identify and resolve growing gaps in the AIC\u2019s technological capabilities. One such capability is the collection and use of Big Data.<\/p>\n The generally accepted definition of big data casts it as a \u201cproblem\u201d, because it\u2019s characterised by its extreme volume, velocity, and variety, which makes collection, management and analysis rather challenging. The problem stems from a \u2018data deluge<\/em><\/a>\u2019 of social media posts, photos, videos, purchases, clicks and a burgeoning wave of sensor data from smarter and interconnected appliances and accessories, known as the \u2018Internet of Things<\/em><\/a>\u2019. Those sources generated a staggering 4.4 trillion gigabytes of data in 2013<\/a>, but that figure is forecasted to reach 44 trillion gigabytes of data by 2020<\/a>, which threatens to overwhelm conventional methods for storing and analysing data.<\/p>\n In response to the problem of big data is the \u201cpromise\u201d of big data analytics. Analytics promises to not only manage the data deluge, but also to analyse the data using algorithms to uncover hidden correlations, patterns and links of potential analytical value. Techniques to extract those insights fall under various names<\/a>: \u2018data mining\u2019, \u2018data analytics\u2019, \u2018data science\u2019, and \u2018machine learning\u2019, among others. That work is expected to yield new insights into a range of puzzles from tracking financial fraud<\/a> to detecting cybersecurity<\/a> incidents through the power of parallel processing hardware, distributed software, new analytics tools and a talented workforce of multidisciplinary data scientists.<\/p>\n However, in order to keep the big data \u201cpromise\u201d, the AIC review needs to address the following challenges:<\/p>\n Over the coming months, ASPI, with support from CSC Australia, will undertake an analysis of Big Data in National Security to further explore the policy issues and challenges outlined in this piece, and to stimulate policy discussions around the issue.<\/p>\n","protected":false},"excerpt":{"rendered":" As the government\u2019s review of the Australian Intelligence Community (AIC) picks up steam, one of the key challenges is to identify and resolve growing gaps in the AIC\u2019s technological capabilities. One such capability is the …<\/p>\n","protected":false},"author":608,"featured_media":30673,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[343,646,391,95],"class_list":["post-30668","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-australian-intelligence-community","tag-big-data","tag-cyber","tag-cyber-security"],"acf":[],"yoast_head":"\n\n