Communication data analysis and processing system and method
First Claim
1. A computer-implemented method for reducing organizational risk threats and organizational inefficiencies for an organization, the computer-implemented method comprising:
- monitoring, by online activity monitoring applications, unstructured communications information from devices of employees of the organization, the online activity monitoring applications being integrated with the devices, capturing the unstructured communications information from the devices, and transmitting the unstructured communications information to a processing system;
collecting the unstructured communications information over a network at the processing system, the unstructured communications information comprising communications data and employee activity data, the communications data comprising employee voice communications data, the employee activity data comprising employee electronic mail data captured from the online activity monitoring applications;
managing, by the processing system, hierarchy data, the hierarchy data specifying a pre-defined allocation of skills of the employees of the organization and a hierarchy of authority;
synthesizing the unstructured communications information using extract, transform and load (ETL) procedures to create structured data;
mining the structured data and analyzing the structured data by searching to, from, and text fields of the employee electronic mail data to identify first patterns for particular employees and to create exploratory data exposing second patterns and relationships between the employees of the organization;
disambiguating the exploratory data by comparing data from multiple sources to resolve ambiguities in the exploratory data and improve accuracy of the exploratory data;
analyzing the employee electronic mail data and the employee voice communications data to identify an employee skillset, to generate confirmatory data and to generate hypotheses;
comparing the employee electronic mail data and the employee voice communications data with the hierarchy data to verify when the employee skillset includes an ambiguity;
determining one or more business impacts based on the hypotheses, the second patterns, the relationships, and the confirmatory data, when the employee skillset does not include the ambiguity, the one or more business impacts including at least one of the organizational risk threats or the organizational inefficiencies; and
updating one or more employee parameters based on the one or more business impacts to reduce the at least one of the organizational risk threats or the organizational inefficiencies,wherein the one or more employee parameters is updated, based on the one or more business impacts, to at least one of automatically block or censor electronic mail communications from the employee.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods are provided for assessing risks and efficiencies based on enterprise communications information. A method for assessing risks and efficiencies based on enterprise communications information may include: collecting information from digital data tools over at least one computer network into a storage database in a computer memory; executing instructions on a computer processor to synthesize the employee communications data into structured data; mining the structured data to generate exploratory data; performing analytics on the structured data to generate confirmatory data; disambiguating the confirmatory data and exploratory data; determining a business impact based on the exploratory and confirmatory data; and implementing a business process based on a quantification of said business impact.
10 Citations
22 Claims
-
1. A computer-implemented method for reducing organizational risk threats and organizational inefficiencies for an organization, the computer-implemented method comprising:
-
monitoring, by online activity monitoring applications, unstructured communications information from devices of employees of the organization, the online activity monitoring applications being integrated with the devices, capturing the unstructured communications information from the devices, and transmitting the unstructured communications information to a processing system; collecting the unstructured communications information over a network at the processing system, the unstructured communications information comprising communications data and employee activity data, the communications data comprising employee voice communications data, the employee activity data comprising employee electronic mail data captured from the online activity monitoring applications; managing, by the processing system, hierarchy data, the hierarchy data specifying a pre-defined allocation of skills of the employees of the organization and a hierarchy of authority; synthesizing the unstructured communications information using extract, transform and load (ETL) procedures to create structured data; mining the structured data and analyzing the structured data by searching to, from, and text fields of the employee electronic mail data to identify first patterns for particular employees and to create exploratory data exposing second patterns and relationships between the employees of the organization; disambiguating the exploratory data by comparing data from multiple sources to resolve ambiguities in the exploratory data and improve accuracy of the exploratory data; analyzing the employee electronic mail data and the employee voice communications data to identify an employee skillset, to generate confirmatory data and to generate hypotheses; comparing the employee electronic mail data and the employee voice communications data with the hierarchy data to verify when the employee skillset includes an ambiguity; determining one or more business impacts based on the hypotheses, the second patterns, the relationships, and the confirmatory data, when the employee skillset does not include the ambiguity, the one or more business impacts including at least one of the organizational risk threats or the organizational inefficiencies; and updating one or more employee parameters based on the one or more business impacts to reduce the at least one of the organizational risk threats or the organizational inefficiencies, wherein the one or more employee parameters is updated, based on the one or more business impacts, to at least one of automatically block or censor electronic mail communications from the employee. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A communication data analysis and processing system comprising at least one of a data gathering engine, a data mining engine, an analytics engine, or a business impact engine, the communication data analysis and processing system further comprising a memory, the memory comprising programmed instructions stored thereon and one or more processors configured to be capable of executing the stored instructions to perform operations comprising:
-
causing online activity monitoring applications to monitor unstructured communications information from devices of employees of an organization, the online activity monitoring applications being integrated with the devices, capturing the unstructured communications information from the devices, and transmitting the unstructured communications information to the communication data analysis and processing system; collecting the unstructured communications information over a network at the communication data analysis and processing system, the unstructured communications information comprising communications data and employee activity data, the communications data comprising employee voice communications data, the employee activity data comprising employee electronic mail data captured from the online activity monitoring applications; managing, by the communication data analysis and processing system, hierarchy data, the hierarchy data specifying a pre-defined allocation of skills of the employees of the organization and a hierarchy of authority; synthesizing the unstructured communications information using extract, transform and load (ETL) procedures to create structured data; mining the structured data and analyzing the structured data by searching to, from, and text fields of the employee electronic mail data to identify first patterns for particular employees and to create exploratory data exposing first patterns and relationships between the employees of the organization; disambiguating the exploratory data by comparing data from multiple sources to resolve ambiguities in the exploratory data and improve accuracy of the exploratory data; analyzing the employee electronic mail data and the employee voice communications data to identify an employee skillset, to generate confirmatory data and to generate hypotheses; comparing the employee electronic mail data and the employee voice communications data with the hierarchy data to verify when the employee skillset includes an ambiguity; determining one or more business impacts based on the hypotheses, the second patterns, the relationships, and the confirmatory data, when the employee skillset does not include the ambiguity, the one or more business impacts including at least one of the organizational risk threats or the organizational inefficiencies; and updating one or more employee parameters based on the one or more business impacts to reduce the at least one of the organizational risk threats or the organizational inefficiencies, wherein the one or more employee parameters is updated, based on the one or more business impacts, to at least one of automatically block or censor electronic mail communications from the employee. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
Specification