StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Where do we draw the line between Business Intelligence and Industrial Espionage - Research Paper Example

Cite this document
Summary
The paper will describe these terms in detail and then, with the help of examples and scholars’ viewpoints, will explain where…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94% of users find it useful
Where do we draw the line between Business Intelligence and Industrial Espionage
Read Text Preview

Extract of sample "Where do we draw the line between Business Intelligence and Industrial Espionage"

Download file to see previous pages

organized by an enterprise to collect, store, access and analyze information about the market and competitors so that better business decisions are made possible (Biere, 2003; Scheps, 2008). These corporate databases (Loshin, 2003, p. 1) of information have turned raw data into valuable business information asset that has enabled the enterprise users to look at and manipulate information in a different way leading to fruitful business decisions that are in corporate benefit. Moss and Atre (2003, p. 4) have listed activities which are assisted by BI decision-support programs.

These include Online Analytical Processing (OLAP), data mining, forecasting, business analysis, analytic analysis, knowledge management and so on; and, BI decision support databases include data mining databases, operational data stores, operational marts, web warehouses, and etcetera. To monitor BI activities and databases and companies organize BI groups within the organization and also hire professionals from outside who analyze the company’s performance, strengths and weaknesses, and compares the gathered information to predict where the company stands in the market.

This helps increase profitability, reduce costs, improve customer relationship management, and decrease business risks (Loshin, 2003, p. 2). Research by Subramanian and IsHak (1998) also found that US companies who used advanced BI systems for competitor analysis enjoyed greater profitability than the companies which did not. Guttman (1995, p. 26) has defined Industrial Espionage (IE) as an “act of gathering proprietary data from private companies or the government for the purpose of aiding other company(ies)”.

Companies may get involved in IE for their competitive advantage and governments may use IE to support other companies. Whatever, the case, the information has to be processed through computers and thus it becomes liable to threats regarding information security. The biggest threat employee sabotage, that is, the

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Where do we draw the line between Business Intelligence and Industrial Research Paper”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1569541-where-do-we-draw-the-line-between-business-intelligence-and-industrial-espionage
(Where Do We Draw the Line Between Business Intelligence and Industrial Research Paper)
https://studentshare.org/miscellaneous/1569541-where-do-we-draw-the-line-between-business-intelligence-and-industrial-espionage.
“Where Do We Draw the Line Between Business Intelligence and Industrial Research Paper”, n.d. https://studentshare.org/miscellaneous/1569541-where-do-we-draw-the-line-between-business-intelligence-and-industrial-espionage.
  • Cited: 0 times

CHECK THESE SAMPLES OF Where do we draw the line between Business Intelligence and Industrial Espionage

The Role of Counter-Intelligence and Counter-Espionage Today

Are counter-intelligence and counter-espionage priorities mainly during major state-against-state geopolitical confrontations, and do they have any significant role in the 21st Century security environment?... Counter-intelligence and counter-espionage priorities are not only during major state-against-state geopolitical confrontations, but they are relevant to the routine and day to day geopolitical balancing.... Researchers have been talking about the need for establishing an “international intelligence model…[which can]…establish shared concepts and procedures in the exchange of intelligence and common national and international intelligence work....
22 Pages (5500 words) Essay

Irish Revolt Issues

It came as a major humiliation for the British intelligence and equally showcased the efficiency of the Irish Intelligence.... In the separation of Ireland from the United Kingdom, intelligence played a very important role especially in the underground war in Ireland from 1916-1922.... So, the Irish nationalists collectively took a decision to bleed Great Britain slowly by starting an unconventional war against it through guerilla war tactics and intelligence played a very vital role in this....
11 Pages (2750 words) Essay

Security Planning and the History of Security Services

The Office of Naval intelligence and the Army's Military Intelligence Division were formed in 1880.... During the war of independence, espionage, counterintelligence, and covert operations were the principal strategies adopted against the well established British forces.... In 1898 when the Spanish – American war broke out, many of the officers of these organizations were employed for espionage.... In 1917, Army and Navy intelligence were strengthened, the National Security Agency was established and the first federal espionage law was enacted....
9 Pages (2250 words) Assignment

The Chinese Intelligence Service

The Chinese focus on mid-level technology and seldom draw the interest of US law enforcement (Eftimiades).... he pervasiveness of the Chinese system makes prosecuting espionage cases problematic for law enforcement.... "The Chinese intelligence Service" paper focuses on one of the most insidious foreign threats that are currently infiltrating and operating within the borders of the US.... The services operate under two divisions known as the Ministry of State Security and the Military intelligence Department....
7 Pages (1750 words) Assignment

Leadership Style and Motivation

hile it is always useful to delve into the wealth of publicly available information to gain an understanding of the general state of affairs, seldom is generally published knowledge helpful in discovering the actions and intentions of organizations that may pose a threat to the country is to seek out and obtain secret intelligence concerning their activities, for purposes of analysis and forecasting.... This research proposal "Leadership Style and Motivation" seeks to establish the relationship between the leadership style and the degree to which employees are motivated in their work, and the quality of work being accomplished....
14 Pages (3500 words) Research Proposal

Inadvertent Use or Distribution of Company Data

In the paper “Inadvertent Use or Distribution of Company Data” the author tries to answer the question: Is industrial espionage ethical?... The ramifications of industrial espionage are dependent on the long-term impact to business strategy and integrity in order to be labeled grossly unethical.... National security issues, in the case of industrial espionage, are nearly non-existent as threats to corporate stability are a common outcome in a free market society....
10 Pages (2500 words) Research Paper

Counter-Intelligence and Counter-Espionage Priorities

This paper declares that counter-intelligence and counter-espionage priorities are not only during major state-against-state geopolitical confrontations, but they are relevant to the routine and day to day geopolitical balancing.... Researchers have been talking about the need for establishing an “international intelligence model…[which can]…establish shared concepts and procedures in the exchange of intelligence and common national and international intelligence work....
22 Pages (5500 words) Essay

Need for Sound Information Security Management

Small and Medium Enterprises (SMEs) can be described as business units with fewer employees and low turnover as compared to large firms.... A company is a business entity that holds or processes information, some of which is confidential.... From an employee's perspective, business loss in smaller companies due to security hitches could possibly cause a reciprocal impact on workers in terms of loss of revenue due, layoff, retrenchment, or downscaling (Stamp, 2006)....
16 Pages (4000 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us