Business Intelligence Essays (Examples)

Studyspark

Study Document Study Document

McDonalds International Expansion

Pages: 5 (1385 words) Sources: 6 Document Type:Essay Document #:12220481

… St. Lucia, especially if the restaurant is owned by a local franchisee. The island ranks in the middle of the “ease of doing business” rankings (St. Lucia Times, 2019) and has slipped of late in the Corruption Perceptions Index, meaning that the political environment has deteriorated of … the rule of law is upheld, and the court systems should be familiar both to McDonalds in general and to any St. Lucian business who wishes to operate a McDonalds franchise.
The economic environment is relatively unfavorable, unfortunately. St. Lucia is dependent on tourism for around 65% … franchise.
The economic environment is relatively unfavorable, unfortunately. St. Lucia is dependent on tourism for around 65% of its GDP, and the tourism business is not having a very good year (CIA World Factbook, 2020. The country’s GDP is low, but overall its economic indicators are reasonably ……

References

References

CIA World Factbook (2020) St. Lucia. Central Intelligence Agency. Retrieved May 29, 2020 from https://www.cia.gov/library/publications/the-world-factbook/geos/st.html

Deloitte (2020) International tax St. Lucia highlights 2020. Deloitte. Retrieved May 29, 2020 from https://www2.deloitte.com/content/dam/Deloitte/global/Documents/Tax/dttl-tax-stluciahighlights-2020.pdf

Duncan, N. (2019) The QSR 50. Quick Service Restaurants. Retrieved May 29, 2020 from  https://www.qsrmagazine.com/reports/qsr-50-11 

Patrick (2020) McDonald’s failure in Barbados hides in plain sight. Uncommon Caribbean. Retrieved May 29, 2020 from  https://www.uncommoncaribbean.com/barbados/mcdonalds-failure-in-barbados-hides-in-plain-sight/ 

St. Lucia Times (2019) Saint Lucia slips in ease of doing business rankings. St. Lucia Times. Retrieved May 29, 2020 from  https://stluciatimes.com/saint-lucia-slips-in-ease-of-doing-business-rankings/ 

Trading Economics (2019) St. Lucia corruption perceptions index. Trading Economics. Retrieved May 29, 2020 from https://tradingeconomics.com/st-lucia/corruption-index

Studyspark

Study Document Study Document

C Suite Executive Leadership And Ethics

Pages: 9 (2693 words) Sources: 7 Document Type:Essay Document #:16009984

… by colleagues he would have referred to as friends. The courage to speak out involves delicate and tactful approaches to communication and emotional intelligence, Linden notes, pointing out that the first step should always be direct confrontation with the individual and then if necessary alerting senior leadership.
… important intrinsic changes that lead to normative ethical behavior.
Speaking with leaders like Linden also showcase the diversity of opinions and approaches to business ethics. Not all leaders will believe that character ethics can be integrated into a large company. Many leaders believe that market forces and … a company. Linden straddles the extremes of consequentialism and deontology, showing that hard lined stances are just as problematic in the world of business as moral relativism. Through this interview, I also learned the importance of humor—an unexpected takeaway. Linden kept reminding me that people make mistakes ……

References

References

Bailey, C. & Shantz, A. (2018). Creating an ethically strong organization. MIT Sloan Management Review. http://ilp.mit.edu/media/news_articles/smr/2018/60101.pdf

Crossan, M., Mazutis, D. & Seijts, G. (2013). In search of virtue. Journal of Business Ethics 113(4): 567-581.

Hatcher, T. (2008). The value of values in the C-suite. In Sims, R.R. & Quatro, S.A. (Eds.) Executive Ethics. Charlotte: IAP, pp. 97-122.

Hoekstra, E., Bell, A. & Peterson, S.R. (2008). Humility in Leadership: Abandoning the Pursuit of Unattainable Perfection. In S.A. Quatro & R. R. Sims (Eds.), Executive Ethics: Ethical Dilemmas and Challenges for the C-Suite. Greenwich, CT: Information Age Publishing, pp. 79-96.

MacDougall, A.E., Bagdarasov, Z. & Buckley, M.R. (2008). Applying a primary risk management model to the C-suite. In Sims, R.R. & Quatro, S.A. (Eds.) Executive Ethics. Second Edition. Charlotte: IAP, pp. 211-234.

Martin, R. (2011). The CEO\\\\'s ethical dilemma in the era of earnings management. Strategy & Leadership 39(6): 43-47.

Schwartz, M.S. (2013). Developing and sustaining an ethical corporate culture: The core elements. Business Horizons 56(1): 39-50.

Studyspark

Study Document Study Document

Firewalls And Filtering

Pages: 4 (1317 words) Sources: 4 Document Type:Research Paper Document #:22384393

… design for the organizations’ web applications since it enhances performance and prevents system lags during high activity.
In a distributed system, the historical intelligence or perceptive algorithm technique is deemed appropriate when loading and balancing web traffic to a web application. The method determines a particular node ……

References

References

Anderson, R. O. (1997). EMERGING CHALLENGE: SECURITY AND SAFETY IN CYBERSPACE. In R. O. Anderson, In Athena's Camp: Preparing for Conflict in the Information Age (pp. 231–252). RAND corporation.

Martin C. Libicki, L. A. (2015). The Efficacy of Security Systems. In L. A. Martin C. Libicki, The Defender’s Dilemma: Charting a Course Toward Cybersecurity (pp. 23-40). Santa Monica: RAND Corporation.

Mays, J. (2018, September 24). Understanding Load Balancing for Web Servers. Retrieved from Liquid Web:  https://www.liquidweb.com/kb/understanding-load-balancing/ 

Thu, A. A. (2013). Integrated Intrusion Detection and Prevention System with Honeypot on Cloud Computing Environment. International Journal of Computer Applications, 9-13.

Studyspark

Study Document Study Document

TikTok Platform And Application Walkthrough

Pages: 4 (1080 words) Sources: 5 Document Type:Essay Document #:92988115

… platform. This is because it efficiently connects the end-users, content creators, and advertisers within its ecosystem (Tiwana 61). Through advanced leveraging of artificial intelligence, the platform has created a personalization for all its users. The end-users get recommendations based on their view history and the complementors, i.e., … efficiently because each set of the user affects the satisfaction of the other. In considering the TikTok’s platformization, the following perspectives are considered: business studies, software/platform studies, political economy, and cultural studies (Nieborg, David, and Anne Helmond 4276). In terms of the business perspective, TikTok generated about $179.6 million in 2019 alone. Even though the revenue generation model is not adequately concluded, TikTok mostly generates its ……

References

Works-Cited List

Nieborg, David B., and Thomas Poell. "The platformization of cultural production: Theorizing the contingent cultural commodity." New Media & Society, vol. 20, no. 11, 2018, pp. 4275-4292.

Nieborg, David B., and Anne Helmond. "The political economy of Facebook’s platformization in the mobile ecosystem: Facebook Messenger as a platform instance." Media, Culture & Society, vol. 41, no. 2, 2018, pp. 196-218.

Plantin, Jean-Christophe, et al. "Infrastructure studies meet platform studies in the age of Google and Facebook." New Media & Society, vol. 20, no. 1, 2016, pp. 293-310.

Poell, Thomas and David Nieborg and José van Dijck. "Platformisation". Internet Policy Review 8.4 (2019). Web. 7 Mar. 2020.

Tiwana, Amrit. "The Value Proposition of Platforms." Platform Ecosystems, 2014, pp. 61-69.

Studyspark

Study Document Study Document

Counterintelligence Issues Within The United States

Pages: 18 (5457 words) Sources: 29 Document Type:Research Paper Document #:72238996

Why Ethical Egoism is a Problematic Framework for intelligence
CI Literature Review
Introduction
The aim of this examination of the literature is to fill the wide gap that remains in intelligence research regarding an appropriate ethical standard that can guide and foster an ethical culture, as called for by Bellaby (2012) and Valentine (2016). … and to identify an appropriate theoretical framework for assessing the way forward. The research question for this study is: How can the US intelligence enterprise support collaboration among the various USIC members and the private sector in an ethical and productive manner? The ultimate purpose of this … sector in an ethical and productive manner? The ultimate purpose of this study is to propose a standardized ethical framework for guiding the intelligence program as it works to collaborate with the private sector in the 21st century. Therefore, the themes this review will examine are: 1)……

References

Bibliography

2020-2022 National Counterintelligence Strategy of the United States. 2020. Washington, DC: National Counterintelligence and Security Center

Bailey, Christopher and Susan M. Galich. 2012. “Codes of Ethics: The Intelligence Community.” International Journal of Intelligence Ethics 35 (2): 77-99.

Bernardi, Beatrice. 2013. "The Role of Intelligence in the Fight Against International Terrorism: Legal Profiles." Bachelor's thesis, Università Ca'Foscari Venezia.

Carson, Thomas L. 2010. Lying and Deception: Theory and Practice. Oxford University Press.

Cohen, Shlomo. 2016. "Are There Moral Limits to Military Deception?." Philosophia 44 (4): 1305-1318.

Coyne, John, Peter Bell, and Shannon Merrington. 2013. "Exploring ethics in intelligence and the role of leadership." Interntional Journal of Business and Commerce 2 (10): 27-37.

Erskine, Toni. 2004. "'As Rays of Light to the Human Soul'? Moral Agents and Intelligence Gathering." Intelligence & National Security 19 (2): 359-381.

Godson, Roy, and James J. Wirtz. 2000. "Strategic denial and deception." International Journal of Intelligence and Counterintelligence 13 (4): 424-437.

Studyspark

Study Document Study Document

Counterintelligence Issues Within United States

Pages: 13 (3766 words) Sources: 16 Document Type:Essay Document #:41694312

Morality of intelligence Ethical Implications and the Need for a Theoretical Framework
CI Literature Review
Deception is at the core of intelligence: yet, it is a problematic core because of the corruption associated with deception in ethical systems. Mattox (2002), for example, observed that the … observed that the practice of deception “is subject to limitations imposed by the demands of morality” (4). Unfortunately, morality within the realm of intelligence is often the first casualty, as history shows (Valentine 2016). The official beginnings of intelligence under the leadership of James Jesus Angleton have illustrated the extent to which the art of deception can create problems within the intelligence community (Morley 2017, 69). Within this community itself there is no standard ethical framework applied (Bailey and Galich 2012, 77). In intelligence, there is even less emphasis on ethical cohesion; as Valentine (2016) has revealed, the history of US intelligence is fraught……

References

Bibliography

2020-2022 National Counterintelligence Strategy of the United States. 2020. Washington, DC: National Counterintelligence and Security Center

Bailey, Christopher and Susan M. Galich. 2012. “Codes of Ethics: The Intelligence Community.” International Journal of Intelligence Ethics 35 (2): 77-99.

Bernardi, Beatrice. 2013. \\\\\\"The Role of Intelligence in the Fight Against International Terrorism: Legal Profiles.\\\\\\" Bachelor\\\\\\'s thesis, Università Ca\\\\\\'Foscari Venezia.

Carson, Thomas L. 2010. Lying and Deception: Theory and Practice. Oxford University Press.

Erskine, Toni. 2004. \\\\\\"\\\\\\'As Rays of Light to the Human Soul\\\\\\'? Moral Agents and Intelligence Gathering.\\\\\\" Intelligence & National Security 19 (2): 359-381.

Godson, Roy, and James J. Wirtz. 2000. \\\\\\"Strategic denial and deception.\\\\\\" International Journal of Intelligence and Counterintelligence 13 (4): 424-437.

Horkheimer, Max. 1972. Critical Theory. New York: Seabury Press.

Intelligence and National Security Alliance. 2020. Counterintelligence for the 21st Century. Arlington, VA.

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 16 (4895 words) Sources: 24 Document Type:Case Study Document #:27491269

… state behavior while cyber attack is unacceptable. This study seeks to answer the question, “How is cyber espionage an acceptable state behavior for intelligence gathering though it potentially damages relations between nation-states?” The qualitative case study examined existing studies on this issue and employed thematic analysis to … since it plays a key role in cyber warfare, helps to establish appropriate countermeasures against cyberattacks and potential threats in cyberspace, and enhances intelligence gathering. While the study provides significant insights on this topic, future studies should examine the issue based on empirical or primary data.
Keywords: … on this topic, future studies should examine the issue based on empirical or primary data.
Keywords: cyber espionage, acceptability, state behavior, cyberattacks, relationship, intelligence gathering, national security, cyber warfare, cyber capabilities.
Introduction
Cyberspace has become an important element in the operations of any given country since we … operations of any given country……

References

Bibliography

Ablon, L. “Data Thieves: The Motivations of Cyber Threat Actors and Their Use and Monetization of Stolen Data.” RAND Corporation, March 2018.  https://www.rand.org/content/dam/rand/pubs/testimonies/CT400/CT490/RAND_CT490.pdf 

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf 

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Baxter, P. & Jack, S. “Qualitative Case Study Methodology: Study Design and Implementation for Novice Researchers.” The Qualitative Report 13, no. 4 (2008).

Brown, G. “Spying and Fighting in Cyberspace: What is Which?” Journal of National Security Law & Policy 8, (2017).

Connell, M. & Vogler, S. “Russia’s Approach to Cyber Warfare.” CNA Analysis and Solutions, 2017.  https://www.cna.org/CNA_files/PDF/DOP-2016-U-014231-1Rev.pdf 

Creswell, J.W. Research design: Qualitative, quantitative, and mixed methods approaches, 4th ed. Thousand Oaks, CA: Sage Publications Inc.

Diplomacy Data. “Cyber Security and Cyber Espionage in International Relations.” Diplomacy Data, 2015.  http://diplomacydata.com/cyber-security-and-cyber-espionage-in-international-relations/

Studyspark

Study Document Study Document

Angleton S Counterintelligence Program And What Went Wrong

Pages: 9 (2657 words) Sources: 8 Document Type:Essay Document #:36485484

intelligence Thesis Proposal
Abstract
This proposal describes the need for an ethical standard in intelligence. It discusses how an analysis of the formation of the intelligence program under Angleton can provide insight into what went wrong with intelligence and how those problems can be prevented in the future. It uses a combination of conflict theory, structural functionalism and critical theory to … can be prevented in the future. It uses a combination of conflict theory, structural functionalism and critical theory to explore the dimensions of intelligence in the 1950s, 1960s, and 1970s. The research design is qualitative with the case study approach to Angleton’s intelligence serving as the method. The aim of the research is to provide an ethical framework that could be used to help the intelligence enterprise collaborate more effectively with the private sector in the future.
Introduction
intelligence and intelligence operations have always been a part of……

References

Reference List

Bailey, Christopher and Susan M. Galich. “Codes of Ethics: The Intelligence Community.” International Journal of Intelligence Ethics 35.2 (2012), 77-99.

Bartos, C. and P. Wehr. 2002. Using conflict theory. UK: University of Cambridge.

Bellaby, Ross. "What's the Harm? The Ethics of Intelligence Collection." Intelligence and National Security 27, no. 1 (2012): 93-117.

Church Committee. “Final report of the Select committee to study governmental operations With respect to Intelligence activities United states senate Together with Additional, supplemental, and separate Views.” Intelligence.senate.gov, 1976. https://www.intelligence.senate.gov/sites/default/files/94755_I.pdf

Coyne, John, Peter Bell, and Shannon Merrington. "Exploring ethics in intelligence and the role of leadership." Interntional Journal of Business and Commerce 2, no. 10 (2013): 27-37.

Erskine, Toni. "'As Rays of Light to the Human Soul'? Moral Agents and Intelligence Gathering." Intelligence & National Security 19, no. 2 (2004): 359-381.

Nakashima, Ellen. “Top counterintelligence official challenges the private sector to step up defenses against foreign spying.” Washington Post, 2020.  https://www.washingtonpost.com/national-security/top-counterintelligence-official-challenges-the-private-sector-to-step-up-defenses-against-foreign-spying/2020/02/10/d842d83c-4c15-11ea-9b5c-eac5b16dafaa_story.html 

Studyspark

Study Document Study Document

Evaluating The Ideology Of The IRA

Pages: 9 (2717 words) Sources: 15 Document Type:Essay Document #:29993032

The Tactics of the British intelligence against the IRA
History of the IRA
The Provisional IRA formed in response to a war between the Irish Republican Army and the … IRA converted itself into a cell structure as mass arrests were occurring and the ranks of the IRA were being dismantled by British intelligence. Co-founder and devout Catholic Sean MacStiofain believed violence was necessary to end Northern Ireland’s occupation by the British but was arrested in Dublin … the IRA was to use force and to show to the British through the use of shocking violence that the Irish nationalists meant business. MacStiofain’s idea was that the best tactic was escalation in hopes of wearing down the British as there was really no way the … by the 1980s the IRA essentially consisted of little more than secretive street gangs, there was a need for more use of British intelligence.……

References

References

Bamford, B. (2005). The Role and Effectiveness of Intelligence in Northern Ireland. Intelligence and National Security, 20(4), 581-607.

Branch, S., Shallcross, L., Barker, M., Ramsay, S., & Murray, J. P. (2018). Theoretical Frameworks That Have Explained Workplace Bullying: Retracing Contributions Across the Decades. Concepts, Approaches and Methods, 1-44.

Coogan, T. P. (2002). The IRA. New York: Palgrave.

Hilton, J. L., & Von Hippel, W. (1996). Stereotypes. Annual review of psychology, 47(1), 237-271.

IRA Green Book. (1977). Accessed 14 Dec 2015 from https://tensmiths.files.wordpress.com/2012/08/15914572-ira-green-book-volumes-1-and-2.pdf

Lumen. (2019). Theoretical perspectives on deviance. Retrieved from https://courses.lumenlearning.com/sociology/chapter/theoretical-perspectives-on-deviance/

Maloney, E. (2010). Voices from the Grave: Two Men’s War in Ireland. NY: Faber, Faber.

McLeod, S. (2008) Social Identity Theory. Simply Psychology. Retrieved from http://www.simplypsychology.org/social-identity-theory.html

Studyspark

Study Document Study Document

Leadership Development Plan

Pages: 5 (1638 words) Sources: 7 Document Type:Essay Document #:72976137


Communicate more effectively by:
· Engaging in active listening
· Obtaining feedback from workers
· Communicating a vision
· Using social and emotional intelligence skills
· Gain cultural competence
· Ask for input from workers and listen attentively when it is given
· Establishing regular meeting times … need to communicate effectively (Ruben & Gigliotti, 2017). This skill is one that actually includes a number of other competencies: emotional and social intelligence acquisition, cultural competence, the ability to listen and obtain and accept and reflect on feedback; the ability to communicate and express a vision ……

References

References

Atkin-Plunk, C. A., & Armstrong, G. S. (2013). Transformational leadership skills and correlates of prison warden job stress. Criminal Justice and Behavior, 40(5), 551-568.

Doody, O., & Doody, C. M. (2012). Transformational leadership in nursing practice. British Journal of Nursing, 21(20), 1212-1218.

Leininger, M. (2008). Transcultural nursing: Its importance in nursing practice. Journal of cultural diversity, 15(1), 37-43.

Mikkelson, A. C., York, J. A., & Arritola, J. (2015). Communication competence, leadership behaviors, and employee outcomes in supervisor-employee relationships. Business and Professional Communication Quarterly, 78(3), 336-354.

Ruben, B. D., & Gigliotti, R. A. (2017). Communication: Sine qua non of organizational leadership theory and practice. International Journal of Business Communication, 54(1), 12-30.

Shanks, N. H. & Buchbinder, S. B. (2012). Introduction to health care management. Burlington, MA: Jones & Bartlett Learning. 

Warrick, D. D. (2011). The urgent need for skilled transformational leaders: Integrating transformational leadership and organization development. Journal of Leadership, Accountability and Ethics, 8(5), 11-26.

Join thousands of other students and

"spark your studies".