Hostile Intent and Counter-Terrorism by Alex Stedmon & Glyn Lawson

Hostile Intent and Counter-Terrorism by Alex Stedmon & Glyn Lawson

Author:Alex Stedmon & Glyn Lawson
Language: eng
Format: epub
Publisher: Ashgate Publishing Limited
Published: 2015-04-14T04:00:00+00:00


The Enterprise Architecture of SOEC and Fraud

SOEC and fraud can be described as components of a sociotechnical system or more specifically an Enterprise Architecture (EA) (Ross, Weill and Robertson, 2006). EA provides a holistic view of agents across business, economic, social and technological dimensions. As an EA, SOEC consists of ‘business enterprises’ in a similar fashion to any legitimate enterprise (e.g. business development, resources, staff, technologies, business infrastructure and resilience models) to which the vast body of EA knowledge can be applied. However, the distinction for SOEC is that the transactions it engages in are inherently unbalanced and directed against the interests of others (i.e. the victims) be they individuals, business organisations or wider society. Put simply, SOEC and fraud activities accept the risks associated with breaking the law as a cost to their business process and a legitimate part of their business model. It is this economic risk and its adverse effects on others that distinguishes SOEC and fraud from other forms of economic activity. It is through this that such activities can be delineated from other legitimate business activities and then criminal activities stopped.

EMPRISES thus exploits the state of the art in EA so that businesses can understand their own transactions better (e.g. to safeguard against cyber-terrorism and insider threats) and so that security agencies can identify anomalies and patterns of illegal activity. This basis enables us to extend the state of the art by applying the same processes to SOEC and fraud, adding meaning to the data that illegal activities generate and thereby discovering their fundamental enterprise anatomy. Once explicated, their supply and consumer chains can be identified and trapped, or the potential victim(s) alerted.

To illustrate this, Figure 11.1 takes the best practices from The Open Group Enterprise Architecture Framework (TOGAF), reflecting the organisational structures of SOEC including its protagonists (e.g. criminal enterprises) and involuntary agents (e.g. the victims) they transact with, the local enforcement agencies (LEAs), and EU-wide and national enforcement bodies (TOGAF, 2011).



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.