Information Design for “Weak Signal” detection and processing in Economic Intelligence: A case study on Health resources
DOI:
https://doi.org/10.37380/jisib.v1i1.13Keywords:
Economic Intelligence, Business Intelligence, Information Design, Weak SignalsAbstract
The topics of this research cover all phases of “Information Design” applied to detect and profit from weak signals in economic intelligence (EI) or business intelligence (BI). The field of the information design (ID) applies to the process of translating complex, unorganized or unstructured data into valuable and meaningful information. ID practice requires an interdisciplinary approach, which combines skills in graphic design (writing, analysis processing and editing), human performances technology and human factors. Applied in the context of information system, it allows end-users to easily detect implicit topics known as “weak signals” (WS). In our approach to implement the ID, the processes cover the development of a knowledge management (KM) process in the context of EI. A case study concerning information monitoring health resources is presented using ID processes to outline weak signals. Both French and American bibliographic databases were applied to make the connection to multilingual concepts in the health watch process.References
ATILF – CNRS. 2010. - Université Nancy 2, Le Trésor de la Langue française, http://atilf.atilf.fr/dendien/scripts/tlfiv5/advanced.exe?8;s=66859215; [visited date: Nov. 20, 2010].
H. I. Ansoff. 1975. “Managing strategic surprise by response to weak signals”. California Management Review, vol. 18, no. 2, pp. 21–33.
H. I. Ansoff. 1985. “Strategic response in turbulent environments”. Handbook of business strategy.
S. Card, J. Mackinlay, and B. Shneiderman (Eds). 1999. Readings in Information Visualization: Using Vision to Think. S.F., CA: Morgan Kaufmann.
B. Coffman. 1997. Weak Signal Research, Part I: Introduction, Journal of Transition Management, MG Taylor Corporation, Jan 1, 2011, from http://www.mgtaylor.com/mgtaylor/jotm/winter97/wsrmatur.htm
B. Coffman. 1997. Weak Signal Research, Part II: Information Theory, Journal of Transition Management, MG Taylor Corporation, Retrieved Jan 1, 2011, from http://www.mgtaylor.com/mgtaylor/jotm/winter97/wsrmatur.htm
L. S. Elting, C. G. Martin, S. B. Cantor, and E. B. Rubenstein. 1999. “Influence of data display formats on physical investigators´ decisions to stop clinical trials formats on physician investigators´ decisions to stop clinical trials: prospective trial with repeated measures,” BMJ, vol. 318, no. 7197, pp. 1527 -1531.
M. J. Eppler and R. A. Burkhard. 2007. “Visual representations in knowledge management: framework and cases”. Journal of Knowledge Management, vol. 11, no. 4, pp. 112–122.
B. Jotham Fry. 2004. Computational information design. bfa Communication Design, in Computer Science Carnegie Mellon University. Massachusetts Institute of Technology, April, Retrieved 5 Jan from http://benfry.com/phd/dissertation-050312b-acrobat.pdf
C. H. Goh, S. Bressan, S. Madnick, and M. Siegel. 1999. “Context interchange: new features and formalisms for the intelligent integration of information,” ACM Trans. Inf. Syst., vol. 17, no. 3, pp. 270-293.
M. Le Guern. 1989. “Sur les relations entre terminologie et lexique,” Meta, vol. 34, no. 3
A. Harbaoui, M. Ghenima, and S. Sidhom. 2009. “Enrichissement des contenus par la réindexation des usagers: UN état de l’art sur la problématique”. In Proceedings SIIE'09 -Systèmes d'Information ET Intelligence Economique, IHE Edition. Hammamet (12-fév. 2009).
D. Karabeg. 2002. “Designing information design”. Information Design Journal, vol. 11, no. 1, pp. 82–90, 2002.
P. Kislin. 2007. “Modélisation du problème informationnel du veilleur dans la démarche d’Intelligence Économique”. Thèse de doctorat: université de Nancy2. 5 Nov.
P. Lambert, S. Sidhom. 2010. “Knowledge extraction and visualization: case study on ChroniSanté project in France “. In Procedings SIIE'2010, Sousse (Feb. Tunisia). IHE Edition.
H. Lesca. 2001. “Veille stratégique: passage de la notion de signal faible à la notion de Signe d’alerte précoce,” in Colloque VSST, pp. 98–105.
H. Lesca, S. Kriaa-Medhaffer, and A. Casagrande. 2009. “Veille stratégique: Un Facteur d’échec paradoxal largement avéré: la surinformation causée par l’Internet. Cas concrets, retours d’expérience et piste de solutions”. in Proceedings SIIE'09 - Systèmes d'Information et Intelligence Economique, IHE Edition. Hammamet (12-14 fév. 2009).
G. Salton, A. Wong, and C. S. Yang. 1975. “A vector space model for automatic indexing,” Communications of the ACM, vol. 18, no. 11, pp. 613–620.
S. Sidhom. 2002. “Plate-forme d’analyse morpho-syntaxique pour l'indexation automatique ET la recherche d'information: de l’écrit vers la gestion desconnaissances”. Thèse de doctorat, Université Claude Bernard Lyon1.
S. Sidhom. 2008. “ Approche conceptuelle par un processus d'annotation pour la représentation et la valorisation de contenus informationnels en intelligence économique (IE) contenus informationnels en intelligence économique (IE),” In Proceedings SIIE’08 - Systèmes d'Information et Intelligence Economique, IHE Edition vol.1, Hammamet (fév. 2009).
M. Silberztein. 2005. “NooJ: a linguistic annotation system for corpus processing,” in Proceedings of HLT/EMNLP on Interactive Demonstrations, p. 11.
J. Wyatt. 1999. “Same information, different decisions: format counts,” BMJ, vol. 318, no. 7197, pp. 1501 -1502.
Downloads
Published
Issue
Section
License
Copyright (c) 2011 Journal of Intelligence Studies in Business
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).