South Chinas Intelligence Augmentation

Abstract

The paper is devoted to the description of intelligence augmentation as one of the possible options to improve the functioning of USINDOPACOM on the background of Chinese attempts to expand its presence in the South China Sea. It also includes the contingency plan regarding the three possible options. The work outlines ways to increase readiness and awareness levels, along with the strategies that can be implemented to guarantee active resistance to potential aggression.

Intelligence Augmentation

Today, the U.S. Pacific Command faces multiple challenges associated with the active position of China in the Asian region and its attempts to spread its control over strategically important areas. Under these conditions, the ability of USINDOPACOM to respond to emerging threats and implement a specific plan of action to minimize potential harm acquires the top priority as one of the possible ways to preserve stability in the region. Information plays a critical role in these activities as it offers many opportunities for the creation of effective strategies, improves flexibility, and provides additional Intelligence support. Thus, the establishment of the contingency Intelligence Augmentation Plan is one of the possible options to attain existing goals and prevent China from establishing substantial administrative control over the South China Sea.

Background

Today, the South China Sea is the issue that attracts the attention of states governments and international organizations, including military ones. Chinas activity in the given region is considered as an attempt to expand the sphere of its influence throughout the area regardless of its strategic importance to the USA and the presence of its troops and warships (Beech, 2018). In such a way, it transforms into a center of a political and, which is more important, the military struggle between Beijing and Washington (Kuok, 2019). Both parties have their allies in are also interested in controlling the Sea as it guarantees diplomatic and material rewards (Jaffer, 2019). Under these conditions, the U.S. Pacific command faces the need for effective strategies and plans that would be able to resist Chinese attempts to move forward.

In the opposition of these two states, information becomes the most valuable resource as it demonstrates the further intentions of opponents and their current goals. In this regard, the implementation of innovative technologies becomes a preferable option for improved data collection. Intelligence augmentation is one of the ways to attain success as it presupposes the application of the newest digital technology, such as machine learning, to support and improve current human capabilities in spheres of information search, analysis, and planning (Cha, 2019).

Intelligence augmentation (IA) differs from artificial intelligence (AI) as the last one is more focused on the automation of processes when IA works close with specialists and under their supervision to provide multiple opportunities for the generation of better outcomes.

Possible Options

China Initiates Information Warfare

The first option of the proposed contingency plan assumes that China initiates the information warfare with the primary goal to create its positive image, justify its attempts to expand its influence in the region, and deteriorate the image of the USA as the main rival. It might presuppose the massive dissemination of false information, manipulation with media, and the use of Internet resources.

There is a high probability of this scenario, as the modern digitalized world offers multiple opportunities for implementing this strategy (Johnson, 2019). The USINDOPACOMs preparation in terms of this plan presupposes the integration of IA in the work of the intelligence department to monitor the current state of media and trace any alterations in the modality or mood used by China to represent the information (The Hague Centre for Strategic Studies, 2017). It will contribute to the acquisition of relevant information and increased readiness of the U.S. Pacific Command. The response presupposes countermeasures invented by using IA that will minimize the harm done by this threat.

Chinese Military Operation

Another possible option that should be considered by the contingency plan is the Chinese military operation organized with the primary goal to grasp control over the sea and the whole region. The probability of this step is low because of the current state of the international discourse and the presence of U.S. forces in the area (Romaniuk & Burgers, 2019). However, to increase USINDOPACOMs preparation preparedness and situational warning, the IA can be implemented as the tool to collect data about possible strategies and main directions of attacks planned by China (Cummings, 2017).

The availability of this information will make responses more effective as they will be organized to counter the enemys troops in the most effective ways. The effectiveness of this approach is evidenced by successful military campaigns based on intelligence data (Cummings, 2017). For this reason, the given option becomes a sufficient measure to respond to the emerging threat.

Chinese Provocative Act

Finally, the third option of the contingency plan presupposes that China organizes a provocative act that discredits the USA, its policy, and forces in the area and justifies the further expansion of the Chinese presence in the region as the only possible way to resist the U.S aggression and preserve peace. There is an average probability of this event as it might be used by means of media or other Internet resources (The Hague Centre for Strategic Studies, 2017). Preparation for the given scenario presupposes the use of IA as the way to analyze information about the would-be event as such a significant provocation cannot remain unnoticed (Del Monte, 2018). For this reason, the monitoring of reliable sources along with tracing the alterations in the behavior of Beijing and its strategy will precondition the growth of USINDOPACOMs awareness and ability to introduce effective measures to reveal the planned act of aggression and gather the support of the international community.

Preparedness, Awareness, Response

The proposed contingency plan and three possible options contribute to the increase in the level of preparedness, readiness, and situational awareness. The integration of the IA into the functioning of USINDOPACOM will guarantee a significant improvement in collecting, managing, and analyzing data related to the would-be and current operations of the Chinese government in the region. Accepting the fact that relevant data is the most valuable resource of modern warfare, the given outcome can be considered a serious advantage generated by the U.S. Command due to the adherence to the proposed plan (Koda, 2019).

Additionally, the existence of the proposed options will help to respond to outlined threats the most effectively and hold leading positions in the region (Sayers, 2018). It can also be recommended to continue using innovative technologies in the sphere of intelligence and data collection. The use of AI, IA, and other elements of machine learning might contribute to the decreased impact of the human factor and the achievement of better outcomes (Russel & Norvig, 2009).

Conclusion

Altogether, the use of IA in planning military operations or improving the work of USINDOPACOM is justified by the opportunity to generate a certain advantage and increase preparedness and awareness levels. Enhanced data collection contributes to more effective responses and strategies that help to preserve leading positions and avoid direct confrontation by providing the international community with evidence of the enemys maleficent actions or intentions. For this reason, an intelligence augmentation is a promising approach that might guarantee better cooperation between various departments and their ability to react to undesired events or even attacks.

References

Beech, H. (2018). . The New York Times. Web.

Cha, J. (2019). Appsilon. Web.

Cummings, M. (2017). . Chatham House. Web.

Del Monte, L. (2018). Genius weapons: Artificial intelligence, autonomous weaponry, and the future of warfare. Prometheus.

Jaffer, K. (2019). Revealed: Chinas deadly plan to control the South China Sea. Express. Web.

Johnson, J. (2019). The AI-cyber nexus: Implications for military escalation, deterrence and strategic stability. Journal of Cyber Policy, 4(3). Web.

The Hague Centre for Strategic Studies. (2017). Artificial intelligence and the future of defense: Strategic implications for small and medium-sized force providers. HCSS. Web.

Koda, Y. (2019). . Japan Times. Web.

Kuok, L. (2019). . Brookings. Web.

Russel, S., & Norvig, P. (2009). Artificial intelligence: A modern approach (3rd ed.) Pearson.

Romaniuk, S., & Burgers, T. (2019). . The Diplomat. Web.

Sayers, E. (2018). . War on the Rocks. Web.

Central Intelligence Agencys Structural Analysis

Introduction

The Central Intelligence Agency or the CIA is a foreign intelligence service that is supervised by the United States federal government. It collects and analyzes foreign intelligence that can potentially impact national security by using human intelligence.

The CIA is possibly one of the largest governmental organizations that is often perceived as a mythical spy agency. I have discovered it through American and European movies and TV series that often present it as a powerful governmental tool that collects both domestic and foreign intelligence. My interest in it rose as I began to study organizational structure as an organization with such difficult tasks and assignments that relate to sensitive information must be highly formalized and standardized to avoid information leaks or human/technology errors. The aims of the essay are to conduct a structural analysis of the CIA to understand how it is organized. Coordination mechanisms of the CIA will be presented and discussed as well.

Organization: CIA

Purpose

According to the CIA (2016a), its primary mission is to collect intelligence that matters, producing objective all-source analysis, conducting effective covert action as directed by the President, and safeguarding the secrets that help keep our Nation safe (para. 2). The task undertaken by the organization is the collection of information via various channels: open sources such as radio, newspapers, TV news, etc., satellite images, decrypt coded messages, and the collection of information from foreign citizens (CIA 2016a).

Structure

The CIA is a centralized organization that is divided into five basic components: the Directorate of Operations, the Directorate of Analysis, the Directorate of Science and Technology, the Directorate of Support, and the Directorate of Digital Innovation (CIA 2015b). However, all staff of the agency is subordinate to the Director of the Central Intelligence Agency (D/CIA). Centralized organizations are characterized as those that provide the authority to make decisions to top managers (Jones 2013).

Other characteristics of centralized organizations are as follows: generic/uniform decisions, formal organizational culture, and slowly changing industry/product (service, in this case) (Vallabhaneni 2013). The CIAs decisions are bound by security and each of the Directorates aims, although they might not always be generic as the advancement in intelligence gathering (e.g., the use of IT and other technologies) requires a new approach toward decision-making. Organizational culture is highly formal and requires total participation (personal commitment), accountability, and constant development (CIA 2017).

Employees responsibilities and duties are clearly outlined and have an emphasis on research-based analytic work and report filing (CIA 2008). Due to confidentiality issues, employees are prohibited from disclosing any information about their work to third parties, including families and loved ones. Since its founding in 1947, the CIAs structure has undergone some changes, but its services and aims remained the same, which indicates the slow change process in the industry/organization.

The formalization of the CIA is also at a high level, as due to security protocols and other regulations, actions of employees and their responsibilities are regulated by policies and formal rules. For example, the CIAs policy and procedures show that only the Executive Director of the Central Intelligence Agency (EXDIR) is allowed to establish policies, procedures, and guidance for their implementation (CIA n.d.).

He or she is also responsible for coordinating novel collection methods and monitoring compliance with established policies and procedures. At the same time, agency personnel shall comply with the principles, policies, and procedures of this regulation, whereas no allowance on suggestions about policies and regulations are granted (CIA n.d., p. 5). Additionally, other managers at the top of the hierarchy have responsibilities somewhat similar to those of the EXDIR, although not as extensive: implement the policies, procedures, and guidance established by this regulation in coordination with the EXDIR; working with the EXDIR or designee, participate in the policy review process, etc. (CIA n.d., p. 8).

As can be seen, hierarchical, top-down reporting common for organizations with a high degree of formalization can be seen in the CIA. It seems that a high level of formalization is necessary for the CIA as it clarifies role expectations, enhances perceptions of fairness, and emphasizes procedural justice (Hempel, Zhang & Han 2012; Morrow, McElroy & Scheibe 2012;). At the same time, formalization can negatively influence employees motivation and result in unnecessary bureaucracy.

The CIA is an organization with a tall (more than 100,000 employees and ten directorates and mission centers), mechanistic, geographic + market structure (see Table 1) (Morgan 2006). It should be noted that some directorates and functions are classified and therefore cannot be mentioned in documents for open access. Mechanistic structures are defined through individual specialization (all employees have specifically assigned tasks), simple integrating mechanisms (authority is the dominant integrating mechanism), centralization (top executives control assignment completion, communication is vertical), and rules and policies used extensively to control tasks (Jones 2013).

As described in policies above, agencys employees are clearly instructed on their tasks, all task outputs are provided to top executives who direct those to the EXDIR, and communication is vertical (from employees to supervisors to top executives to EXDIR or in reverse order). Jones (2013) defines bureaucracy as a form of organizational structure where the personnel can be held accountable for their actions because standards and organizational policies guide their actions; the personnel needs to adhere to it. Thus, the CIA is a bureaucracy.

Table 1: CIAs Organizational Structure.

Coordination Mechanisms

Five coordination mechanisms are used by the CIA: hierarchy of authority, direct contact, liaison role, task force, and teams. Although hierarchy of authority is more common for highly standardized and formalized organizations, the CIA uses other mechanisms as well due to its organizational complexity and the complexity of the tasks it performs. Hierarchy of authority implies that employees are instructed about who reports to whom; in this case, directorates staff reports to top managers of those, whereas these top managers report to the EXDIR.

Direct contact also takes place between different offices; for example, the Office of Congressional Affairs works with the Office of the Director of the Central Intelligence Agency to ensure successful events with the Hill (CIA 2016b, para. 6). Liaison roles also exist in all departments; e.g., directorate components (all five directorates at the CIA) work together at arranging, supporting, and documenting congressional briefings (CIA 2016b).

Task forces are used quite often by the CIA, although mostly in the field operations. For example, a task force was formed to conduct a review of the Khowst attack, during which several CIA agents were killed (CIA 2010). The use of task forces was often required to conduct complex, classified missions that relied on the military support or were related to terrorism. During the invasion of the South Korea by the North Korea, the task force was established to provide analytic reports about communistic behavior on the peninsula (CIA 2013).

When the war on terrorism began, the CIA established a complex multi-agency task force that collected and analyzed intelligence about al-Qaidas plans and intentions (CIA 2012). Eventually, exactly due to the actions and successes of this task force, the agency was able to track down and kill Usama Bin Ladin, Americas most wanted terrorist at that date.

One of the most recent investigations conducted by the CIAs task forces related to the possible Russian funding of the Donald Trumps campaign; the US counterintelligence task force, established in 2016, was responsible for this investigation (Bertrand 2017). It was also a multi-agency task force and included professionals from the FBI, the National Security Agency (NSA), the Treasury and Justice Departments, and the Office of the Director of National Intelligence. The task force investigated the ties of Donald Trump to Russia that were described in an audio recording handed to the Director of the CIA (LoBianco 2017). The current status of the investigation is unknown and might be classified due to its sensitivity.

The CIAs use of teams is also extensive. For example, one of the most famous teams was the Ames mole hunt team, which helped the agency disclose Aldrich Ames as a spy for the USSR (CIA 2009). The teams in the CIA can have various responsibilities and are often involved in profoundly different tasks. The investigation of the nuclear potential of Iraq in 2004 consisted of five teams (Team Alpha, Team Bravo, Team Charlie, Team Delta, and Team Golf) that either analyzed satellite images or worked on site (CIA 2007).

As can be seen, teams in the CIA also mostly work in the field, although not all of them. For example, during a simulation competition in 2011, the team that consisted of the Directorate of Intelligences professionals evaluated the contestants ability to prepare effective briefings (CIA 2011). In this case, the team worked on promoting the prestige of the agency, educating and considering possible recruitment of suitable participants in the future. No integrating roles or departments are used in the CIA as each of the directorates has a Liaison Group that actively cooperates with others.

Conclusion

The Central Intelligence Agency is a bureaucracy: a standardized, formalized, tall, mechanistic organization that regulates the actions of its employees with policies and rules and holds every employee accountable for their actions. Due to the specifics of the agency and its work with sensitive information that might influence national security, it has to be highly standardized and formalized, because without security protocols and policies information leaks would be unavoidable.

As the CIA works on complex and sometimes dangerous tasks, it usually does not provide generic or uniform decisions, focusing on the integration of technologies and IT in its processes (e.g., cyberintelligence). The organization consists of five directorates, regional mission centers, and the Executive Staff. All of them are accountable to the Executive Director of the CIA. The agency uses the hierarchy of authority, direct contact, liaison role, task force, and teams as the main coordination mechanisms.

The first three mechanisms are usually used in the agency, whereas task forces and teams often conduct investigations and intelligence collection overseas. Due to safety rules, some organizational directorates might be classified and therefore are not included in this analysis.

Reference List

Bertrand, N 2017, . Web.

CIA 2007, Team results. Web.

CIA 2008, Chapter eight. Web.

CIA 2009, The people of the CIA& Ames mole hunt team. Web.

CIA 2010, Message from the Director: lessons from Khowst. Web.

CIA 2011, DC, Maryland, and Virginia Area College students participate in Central Intelligence Agency simulation competition held at Georgetown University. Web.

CIA 2012, The final chapter in the hunt for Bin Ladin. Web.

CIA 2013, . Web.

CIA 2015a, . Web.

CIA 2015b, . Web.

CIA 2016a, . Web.

CIA 2016b, . Web.

CIA 2017, Our culture. Web.

CIA n.d., Signals intelligence activities. Web.

Hempel, PS, Zhang, ZX & Han, Y 2012, Team empowerment and the organizational context: decentralization and the contrasting effects of formalization, Journal of Management, vol. 38, no. 2, p. 475-501.

Jones, G 2013, Organizational theory, design, and change, Pearson Education, London.

LoBianco, T 2017, . Web.

Morgan, G 2006, Images of organization, Berrett-Koehler Publishersm, Oakland, CA.

Morrow, PC, McElroy, JC & Scheibe, KP 2012, Influencing organizational commitment through office redesign, Journal of Vocational Behavior, vol. 81, no. 1, pp. 99-111.

Vallabhaneni, SR 2013, Wiley CIA exam review 2013, internal audit practice, John Wiley & Sons, New York, NY.

Intelligence Agency Operation Improvement

The formation of a powerful intelligence agency to take care of the matters of military intelligence did not include a plan for coordination of intelligence activities between security agencies (Truman 4). Several decades later, the structure of the office of the DNI was instituted to control the various intelligence authorities that had emerged.

However, this office has been consistently unable to perform its duties as expected. The office of the director of national intelligence has failed to perform its duties to the expected level in its capacity. There was speculation that inadequate finance was the cause of the failures of the office.

An increase in the annual funding for the office has failed to improve the condition. However, there are several measures involving organisational change that can streamline and co-ordinate duties at the office of DNI (Stuart 52).

The first necessary solution is to have a unified leadership that will make decisions, rather than have separate authorities delegate similar duties (Stuart 23). One of the major problems facing the office of DNI is the lack of a well-coordinated leadership.

Assignment of duties at the office has been erratic with leaders overseeing intelligence work in various regions lacking coordination. Separate plans by different levels of leadership have resulted to duplication of duties and improper handling of matters of intelligence due to the separate approaches of different offices.

A new channel for reporting will make sure that the proper chain of command is used for reporting matters of intelligence. The current organisation does not assign duties to intelligence officers with due responsibility. This has left the intelligence officers to handle their duties in a manner that one chooses (DoD 5).

Thus, the duties of the intelligence community do not present as obligations, but appear as missions that the intelligence community embark on at will (Stuart 16).

Although significant will is needed for the intelligence community to go about its duties, a clear framework outlining the responsibility of each section or office in the intelligence work will improve efficiency. All these objectives can only be achieved by establishing a decisive leadership, which can outline the duties of the members of the intelligence community.

The second necessary action is the unification of the whole of intelligence community so that the office of DNI can monitor all activities and plans. Although the office of the DNI is expected to control the whole intelligence community, it is not possible to accomplish this for all members of the intelligence community in the country in the prevailing situation.

There is no proper law that brings the control of all members of the intelligence community that are concerned with major intelligence issues under the control of the office of DNI (DoD 11). In addition, there are efforts by some agencies to undermine the office of the DNI by preferring to isolate their activities.

The isolation of these sections of the intelligence community makes it impossible for the office of DNI to draw a realistic and accurate budget plan. Procedures of procurement and other projects that affect the budget of the intelligence community are executed separately making the planning for the allocated resources a difficult task (DoD 13).

It is important to ensure that all the sections of the intelligence community are obligated to cooperate under the office of DNI. This can be achieved by bringing institutions such as the DIA and the CIA under the authority of DNI

The third reason the office of DNI is not able to offer effective leadership to the intelligence community is the lack of constitutional law to put it in a position to deal with all the issues arising in the whole of the intelligence community.

Major intelligence bodies such as the CIA and DIA, which are considered major arms of intelligence, are finding it difficult to report to the office of the DNI since the constitution does not explicitly express that the intelligence agencies should report to that office.

Furthermore, CIA, the major member of the intelligence community, has traditionally reported to other offices, which are thought to be of a higher authority. In a more simplistic interpretation, all sections of the intelligence community need to report to the office of the DNI, which should then report to the president.

Intelligence deals with gathering of information of significance to security. It is important to ensure that the members of the intelligence community are able to pool the information gathered in their separate intelligence activities in order to provide security for the nation. Currently, the DNI oversees the operations of the members of the intelligence community as completely separate entities with no proper platform for sharing information (DoD 17).

There is need for enactment of a law that obligates the members of the intelligence community to share information without any restriction. This will establish the intelligence community as one intelligence body that works in unity to combat security problems. In addition, there should be a clear policy that governs the manner in which the intelligence is shared.

A plan on how to avert the danger of having information leaked to the public or to those who intend to compromise security is necessary in the implementation of a policy to lay foundation for information sharing.

With an elaborate system, it is easier to establish security for the countrys citizens and interests. The current reluctance of the members of the intelligence community to share information is partly due to the danger presented by knowledge of classified information by many people. Moreover, the state of information in the intelligence community is limited, with the members sharing information regarding terrorist threats alone.

Works Cited

DoD, DTIC. The National Intelligence Strategy of the United States of America. Ft. Belvoir: Defense Technical Information Center, 2009. Print.

Stuart, Douglas T.. Creating the national security state: a history of the law that transformed America. Princeton, N.J.: Princeton University Press, 2008. Print.

Truman, Harry S.. National Security Act of 1947: communication from the President of the United States

Effective Intelligence Assessment System

Introduction

The Balkans organized crime is affecting many countries not only in Europe but also in North America. The United States is one of their biggest markets for those who are dealing with drug trafficking and other contraband goods while Europe is the major market for human traffickers (Arsovska, 2015). The victims of these organized crimes are innocent citizens. It is important to come up with strategies that can help in combating this problem. Dealing with organized crime is not easy. These groups are deeply entrenched in the security systems of many countries that it becomes almost impossible to crack them down. They have financial and military power. They use the carrot and stick strategy to ensure that they are always a step ahead of the authorities trying to track them down. They bribe top security officials or those specifically assigned the task to track them down.

These cartels always have the right information through these corrupt officials who not only help them to cover their tracks but also enable them to inform them when the government is trying to lay a trap for them. For the officers who refuse to participate, these criminals have a hit squad that is used to kill them before they can become a major problem to these criminal groups. Some of them have links to the highest offices in some governments because they finance campaigns that put those top government officials into office. As such, the government of the United States, while fighting Balkans organized crime, must understand that it is dealing with a very complex problem that needs dedication, time, commitment, and above all a sophisticated intelligence-gathering system that can be used to collect information about the operations of these groups. In this paper, the researcher will look at how drug trafficking, human trafficking, and trade in contraband goods can be combated through effective intelligence assessment system.

Drug Trafficking

According to Abadinsky (2016), drug trafficking is one of the biggest problems that the United States government is faced with currently. Walton (2010) once described drug trafficking as a near-immortal animal that grows a new head whenever its head is chopped off. It just does not disappear despite the effort that the government has put in to eliminate it. In the 1990s, the United States government successfully arrested and jailed top drug lords from Columbia and other nations around the world. Some of them were killed during the operations because it was almost impossible to arrest them. They had their own armies fully equipped and the only way of reaching their boss was to engage in a fierce exchange of fire. Arsovska (2015) says that most of the drug trafficking gangs have a military wing that is responsible for eliminating any threat that cannot be destroyed using drug money. The past experiences have clearly demonstrated that the best way of fighting these criminal gangs is to improve strategies used in intelligence gathering.

Fighting the Balkans organized drug traffickers requires a lot of patients, a highly talented team of officers, enough financial resources, and sophisticated communication technologies. The team must first appreciate the fact that some of the officers and political leaders in the foreign governments who are expected to fight this vice are actually protecting it because they benefit a lot from it. As Abadinsky (2016) says, the officers assigned to deal with this very dangerous problem must, therefore, trust nobody. This is so because it has been proven that whenever the investigative authorities share their plans with the authorities of the foreign governments, the targeted criminals often have a way of accessing such classified information, enabling them to act before they can be attacked. In most cases, they prefer killing the investigators as a way of thwarting the investigation and passing a warning to others who may want to investigate them in the future. As such, the investigative officers should act in secrecy and avoid making sudden moves that may alert the criminals in any way.

The primary aim of the intelligence assessment will not be to arrest these criminals but to understand their criminal web, how they operate, their strengths and weaknesses, their relationships with other criminal gangs, how their income flows into their hands and how they deliver their products to the market, the kind of security they get from various governments and security apparatus in various parts of the world. The United States government has succeeded before in uprooting some of the drug cartels that were very notorious in the recent past through effective intelligence gathering and assessment. One of the ways of doing this is to infiltrate these cartels in the same way they have infiltrated several governments around the world. Security agents can be instructed to join these groups. They can pretend to be former military or FBI officers who were unfairly dismissed from work and are willing to do everything to get back at the government. Arsovska (2015) states that these groups often value people with a security background, especially those who are currently struggling to earn a living.

These officers must be highly skilled and talented in everything that they do. They should also be aware that they are handling a very delicate and dangerous case that can easily result in their murder if they make the slightest mistake and reveal their cover. These officers should earn the trust of the top officials in these cartels and ensure that they monitor everything that takes place. Such operations can take several months and in some cases even years. At first, they can avoid any direct communication with their other officials. Through sophisticated telecommunication tools, they can always pass a message to the relevant authorities about their activities and events going on. As soon as they have gathered the information needed, then they should help in bringing such cartels down. In such operations, Kan (2012) advises that it may be necessary to capture all the top operatives and all their lieutenants as a way of ensuring that the group is completely eliminated. If possible, the identity of investigative authorities should never be revealed. They can be arrested alongside other members of such cartels, tried together with them, but sent to different prisons where they are soon released to help in further intelligence gathering.

Human Trafficking

Slave trade was once one of the most lucrative businesses in the world, but it was successfully brought to an end soon after the independence of the United States of America (Arsovska, 2015). However, a new trend is emerging in the modern society where humans are once again being considered a commodity of trade against their own wish. Criminal gangs are kidnapping and selling people in a black market for different reasons. A report by Mallory (2012) showed that prostitution is the primary reason why human trafficking is once again becoming popular in the modern society. Although several countries have not legalized prostitution, it is a fact that it is an activity that is going on in most parts of the world with full knowledge of the authorities. The increasing size of the middle class has increased the demand for entertainment services. The victims are always innocent girls who are lured to traps before being sold off to night clubs or brothels where they are forced to serve clients against their wish.

Gathering intelligence from cartels who engage in human trafficking may not be as challenging as handling drug cartels. Given that their primary commodities are people, they can easily be tracked, from the time they kidnap a victim, the means used in transporting these victims, and the final destination of their commodity. Destroying their market is also simpler than fighting the market for hard drugs. Officers can pose as victims, and with special chips implanted in them, the entire movement can be mapped to help in destroying these cartels.

Trade in Contraband Goods

Trade in contraband goods can also be combated effectively through effective intelligence collection and assessment. The problem is not as complex as that of drug trafficking, but it is still one of the Balkans organized crime that the government will need to fight to promote legal trade. In most of the cases, these contraband goods find their way into the country through our porous borders. The United States border with Mexico has particularly been blamed as the point where contraband goods find their way to the United States market. Several strategies have always been used such as border patrols and aerial surveillance to ensure that activities taking place at the countrys borders are closely monitored. This strategy should continue.

The aerial surveillance is very effective because these cartels will be monitored without their knowledge. Their track can be uncovered by studying how their sneak through the borders, the routes they take, and how they store their products before finally taking it to the market. The movements of such goods can be further tracked till such a time that it reaches the final consumer. In a report by Benedek (2010), some of the contraband goods sold in the United States is facilitated by leading retailers and suppliers who benefit a lot from the illegal business. Through such surveillance, it will be possible to determine the specific stores where these products are taken to once they pass through the borders. The owners of such chain stores may help the government with the investigations.

Conclusion

The Balkans organized crime is a major issue that the government of the United States has been trying to deal with in the recent past. These cartels are engaged in drug and human trafficking and trade in contraband goods. The government has been successful in reducing their activities in the country, but it has not been easy to eliminate this problem completely. It is important to come up with intelligence gathering and assessment techniques when fighting this group. Through this intelligence assessment approach, government agencies will be able to infiltrate these criminal gangs, understand their strategies, and come up with effective ways of uprooting them.

References

Abadinsky, H. (2016). Organized crime. Basingstoke, UK: Palgrave Macmillan Publishers.

Arsovska, J. (2015). Decoding Albanian organized crime: Culture, politics, and globalization. Hoboken, NJ: Wiley & Sons.

Benedek, W. (2010). Transnational terrorism, organized crime and peace-building: Human security in the Western Balkans. Basingstoke, U.K.: Palgrave Macmillan.

Kan, P. R. (2012). Cartels at war: Mexicos drug-fueled violence and the threat to U.S. national security. Washington, D.C: Potomac Books.

Mallory, S. L. (2012). Understanding organized crime. Sudbury, MA: Jones & Bartlett Learning.

Walton, T. R. (2010). Challenges in intelligence analysis: Lessons from 1300 BCE to the present. New York, NY: Cambridge University Press.

Homeland Security Intelligence and Its Effective Use

The primary role of Homeland security is to protect all states within the US against terrorist activities (Homeland Security). As a security umbrella, Homeland Security Enterprise has a serious duty of ensuring that all Americans are safe. As such, DHS has a responsibility to reduce terrorism vulnerability, minimize the damage that occurs as a result of terrorist attack, and help American citizens recover from this kind of disaster (Alperen 2011, 23). Therefore, this memorandum will highlight a number of ways that Homeland Security Enterprise can approve to increase effective use of intelligence within the organization.

There is no doubt that ensuring the national homeland security is one of the biggest challenges of the 21st century due to the high level of technology and a number of problems that may arise when protecting the homeland. These problems are deeply rooted in the over-centralization, pervasive complacency, and entrenched politics (Mayer, Carafano, and Zuckerman 2012). These kinds of problems often make different states work improperly. As such, there is a need to increase the use of intelligence in order to ensure that these and many other obstacles are eradicated for safety of the American citizens.

Effective use of the intelligence will ensure that all the security enterprises are steps ahead of security threats caused by their enemies. This will not only guarantee national security but will also help in ensuring that all infrastructures are safe, and there is no data breach (Alperen 2011, 33). The use of effective intelligence security measures will improve multiple security products as well as minimize vulnerability of all security systems. Now, the question is how Homeland Security Enterprise can increase the effective use of intelligence.

First, there is a need to review the mandate and structure of Homeland Security Department (Homeland Security). Since the creation of Department of Homeland Security, its structure has not been reorganized. Therefore, there is a need to review and make numerous changes in the homeland security organization structure. This will ensure that the Homeland Security Enterprise is flexible. The restructuring of the organization should be based on the past and present security threats.

Secondly, there is a need to adopt an approach that would ensure the decrease of illegal immigration to the US (Homeland Security). The Homeland Enterprise should, therefore, adopt a fair, honest and realistic approach to immigration enforcement policies (White 2011, 27). This will make the local authority responsible for maintaining and implementing all the policies that discourage illegal border immigration. These measures are important in ensuring maximum border security as they pose a major threat to national security.

Thirdly, Homeland Security Enterprise should adopt policies that will ensure it focuses on its vision and mission (White 2011, 45). These policies involve maintaining the use of major counterterrorism tools. They consist of those authorized by the USA PATRIOT Act. In addition to these policies, there is a need to establish a national domestic counterterrorism and intelligence structure (Mayer, Carafano, and Zuckerman 2012). Such a structure will help the organization develop its intelligence, and eventually become steps ahead in combating terrorism.

In addition to this, there is a great need to re-evaluate the Transportation Security Administration (TSA) (Mayer, Carafano, and Zuckerman 2012). Evaluating this docket will imply restructuring its mission. The mission of this department is to provide air transport services (Homeland Security). By re-evaluating the department, the Homeland Security Enterprise should also ensure that security policies are effectively adopted and implemented. This will call for improvements in air security through adoption of new and effective screening procedures.

In addition, the Department of Homeland Security should also be ready to work with other departments to increase its effectiveness (Mayer, Carafano, and Zuckerman 2012). As such, it should work with modal administrations and other departments that have adopted a regulatory system and implemented an operational and enforcement body in its security system (Homeland Security). Working hand-in-hand with such partners will help the DHS understand other systems and sectors (especially, the transportation industry, which is more vulnerable) in order to adopt and implement better intelligence security policies (Mayer, Carafano, and Zuckerman 2012). Collaboration with other department will also ensure that DHS will be able to handle hazardous materials and respond adequately to any emergency cases.

Last but not least, there is a need to enhance the process for declaring federal disasters and giving out homeland security grants (Homeland Security). With such measures, resource wastage will be effectively minimized, and security department will be more efficient in terms of emergency and disaster preparedness. This is because the system in place will effectively utilize all the resources for disaster management.

In summary, due to the high level of security threat, which has increased because enemies have adopted modern technology and techniques, there is a great need to increase effective use of intelligence within the Department of Homeland Security. Such measures will ensure that the national security will be improved, and Americans will be safe. To increase the use of intelligence, the DHS should review its structure, focus on its primary mission, work with other administrative bodies, adopt an approach to decrease illegal immigration to the US, and re-evaluate the Transportation Security Administration (TSA) (Homeland Security).

Reference List

Alperen, Martin. 2011. Foundations of Homeland Security: Law and Policies. New Jersey: John Wiles and Sons Publisher.

Homeland Security. 2012. The National strategy for Homeland Security. Web.

Mayer, Matt, Carafano, James and Jessica Zuckerman. 2012. . Web.

White, Jonathan. 2011. Terrorism and Homeland Security. Belmont: Wadsworth Publisher. Web.

Defining and Measuring Intelligence

A persons proficiency in crisis management involving features such as responsiveness, insight, analysis, decision making and conclusion can be termed as intelligence. In simple words, how a person tackles situations is called his/her intelligence.

Theories of Intelligence

Discussions have been held on whether intelligence is a single skill or it has various features. But there hasnt been a universal acceptance on any one ideology. Different psychologists have evolved different theories of intelligence over the past 100 years. Following are some of them:

Charles Spearman:

British psychologist, Charles Spearman, noticed that people who scored well in a mental aptitude test, scored well in others as well and those who scored poorly in one test, scored poorly in others as well. This was called the factor analysis and Charles termed it as General Intelligence or the g factor.

Louis L. Thurstone:

Thurstones centre of attention was seven different aspects of mental abilities namely, verbal comprehension, reasoning, perceptual speed, numerical ability, word fluency, associative memory, and spatial visualization.

Howard Gardner:

Gardner developed eight kinds of intelligences namely, visual-spatial intelligence, verbal-linguistic intelligence, bodily-kinesthetic intelligence, logical-mathematical intelligence, interpersonal intelligence, intra personal intelligence, musical intelligence and naturalistic intelligence.

Robert Sternberg:

According to Robert Sternberg, intelligence is a mental activity directed towards purposive adaptation to, selection and shaping of, real-world environments relevant to ones life. According to him, intelligence has three factors namely, analytical intelligence (abilities to solve problems), creative intelligence (innovation), and practical intelligence (adaptation to changes).

Its very difficult to understand human nature and more specifically, human behavior (including intelligence). In my opinion, the debate on different meanings or theories of intelligence will continue for times to come and new theories will keep on being evolved.

How can intelligence be measured?

Measuring of intelligence is called the intelligence quotient (IQ). Based on the aforementioned theories, there are various ways of measuring the intelligence quotient. The most common method of measuring the intelligence of a person is the multiple aptitude test. But this method is gradually becoming out-dated.

The most favored method of testing the IQ is the Standardization method where everything, except the childs answers, has a standard set of criterion. This is a good method because after the scoring is over, a childs performance can be compared to the rest of the children in the same age group. His/her scores can be compared to the average scores. Another favorable test is the spatial ability test, where the persons ability of hands is also tested. There are other intelligences also that help us succeed in life.

All human beings dont have the same biological features. Intelligence is also such a feature that develops at different ages for different people. But in schools and colleges, the same questions are given to all students. How can a student, whose intelligence hasnt developed yet, answer the questions in a manner that an intelligent student will do.

Some have the intelligence to solve problems; some have the intelligence to grasp fast, some do well in academics, while some have the intelligence to succeed in life.

So who is more successful? Would you call a person intelligent who can solve a complex mathematics problem but doesnt know how to write? Would you call the Managing Director of a company intelligent if he couldnt clear his board exam? On the other hand, a slum boy, who hasnt gone to school and got his IQ tested, could be more intelligent and smarter than a school going boy.

Intelligence inherited or developed

It is a proven fact that we inherit qualities from our parents and ancestors. These may be physical and/or mental. These qualities are determined by our genes. In order to prove that intelligence is more of inherited than developed; we shall take an example of twins (identical). Identical twins are brought up in the same environment and share the same kind of amenities. Moreover, they have the same kind of genes (non-identical twins have half of their genes common).

They even share the same kind of food. Studies have revealed that the correlation factor in twins is up to 0.95 (whereas a perfect correlation factor is 1). In non-identical twins, this factor is 0.6. This illustration shows that genes do play an important part in the development of a persons personality and his/her intelligence.

Intelligent parents tend to have intelligent children. In our daily lives, we see traits of parents in their children. Even in our homes, we see the similarities. A good politicians son is more likely to become a good politician as well. A vandals son will, most probably, become a ruffian too, except if there is a chance of improvement due to influence of some good people.

Human brain has two parts namely, the grey matter and the white matter. The grey matter consists of brain cells and the white one consists of filaments that carry messages to the rest of the body. Magnetic Resonance Imaging (MRI) has proved that it is the grey matter that is linked to intelligence. It means the more grey matter a person has, the more intelligent he/she is. The quantum of this grey matter depends on the genes. So it can be said that intelligence is inherited as well as developed, but it is more of inherited.

The Importance of the Logical  Mathematical Intelligence in Mathematics Teaching

Howard Gardner provides a number of intelligence which can be exploited by a teacher in a teaching  learning environment. Gardners approach simply advocates for the adjustment of instructional techniques in order to cater for individual needs (Brualdi, 2001). While teaching mathematics, teachers should pay attention to logical  mathematical intelligence.

This kind of intelligence expresses the ability of a learner to identify a blueprint, form a reason to a specific mathematical answer, and ultimately employ logical thoughts in any kind of response (Brualdi, 2001).

Mathematical- logical intelligence is evident in young kids when they involve themselves in organizing and re-organizing things (Brualdi, 2001). As time goes by, children are able to do simple calculations without the aid objects. With progression of this kind of intelligence, some learners gain access to abstract world consequently recording a success in mathematics field.

This category of learners is systematic in reasoning complex and integrated mathematical procedures. They therefore form the backbone of a classroom where other learners can rely on for guidance. Moreover, students with abstract reasoning are fast in calculating mathematical questions. These features are evident early in a childs life.

Math and science are co-related but also diverse in nature. While mathematics exploits the abstract world, science operates with realism. Scientist applies scientific tools and procedures in a bid to proof actuality. On the other hand, mathematicians are more concerned with patterns.

A teacher is under strict obligation to discover students with ability to form patterns and subsequently integrate them into groups with other kinds of students in order to achieve higher performance. This forms a reason for the development of mathematical  logical intelligence.

Curriculum design

Integrated curriculum design is applicable to disciplines like mathematics because of the existence of its sub  units comprising of geometry, algebra, statistics, arithmetic, calculus, probability, and ordinary deferential equations. Other social sciences including sociology, geography and political science can also be integrated to form social studies.

The benefit attached to integrated curriculum is that knowledge and skill gained is more beneficial to a learner. Subsequently, a teacher can expand the choice of subject matter i.e. geometry or algebra (Webb, 2009). On a higher note, integrated curriculum allows integration of different areas of study like science and mathematics to form futuristic which is more beneficial to a learner.

Since a teacher prepares a student for future lifes challenges, there is need for a more diversified knowledge and skills. Integrated curriculum design is widely employed at a lower level of learning where a combination of subjects like art and music can be taught concurrently for a short period of time.

To further develop mathematical  logical intelligence at a higher learning level, subject  centered design is most appropriate since it distinguishes the importance of the subject in development of intellect. This also forms a reason for going through the education system. Webb (2009) states clearly that Notwithstanding the fact that subject  centered curriculum has been in existence for centuries, it is supported by essentialist and perennialist educational theories.

In this case, essentialist maintains that the curriculum must represent the knowledge and skills imperative in a society. This is why mathematics is presented from a subject  area curriculum design where a subject is taught so as to propagate the norms and values of a society. The design is employed at an advanced study level i.e. a university or any other institution of higher learning.

Reference List

Brualdi, A. (2001, April 16). Multiple Intelligences: Gardners Theory. Eric Digest. V33 (4), P48-53.

Webb, D., Metha, A., & Jordan. F. (2009). Foundations of America Education. Upper Saddle River, New Jersey: Prentice Hall.

The Importance of Business Intelligence

In todays business world, the information gathered is very critical because it constitutes the important part of decision making in the organization.

Intelligent decisions needs to be made to drive business forward thus the importance of business intelligence which is the computer based applications and technologies for gathering, storing and analyzing business data such as sales revenue and turnover to help in decision making in the organization.

Systems application for business provide business people and organizations with the ability to interact with the organizations database and the ability to manage assets, finances, personnel, cost accounting, materials and production operations which are critical to the organization.

This application popularly known as SAP has also some problems in consumer and customer management where it has straggled to penetrate (Dipen, 2010).

The strategy of business intelligence helps and benefits the forward thinking business in reaching their goals.

It helps the organization to learn the enterprise efficiently capitalizing on the available data, the system can be implemented in different ways and the organization would need to figure out the kind of business intelligence applications it would need to use for the maximum benefit.

In order to streamline the operations and have an advantage the application prays a crucial role in tracking and analyzing data. Based on its output the management is able to make decisions which are in line with the business operations (Doan, 2000).

This is of great benefit to the business since it cuts down the cost and produces results which are more accurate unlike the traditional system which heavily relies on the intelligence and experience of the involved person and in some cases can be prone to errors.

Informed decisions are made using this software. Employees in the organization also gain knowledge and thus become informed through the software on how to position there product in the market and edge out competition.

Every business has different requirements and therefore it is important to ensure that it gets a business system developed and customized by developers who truly understand the requirements of the business and thus can provide the services required and can deliver accordingly.

The software provides up-to-date information which is used by management to act accordingly. Despite its popularity and importance the business information software has its drawbacks which in some cases can be critical (Linthicum, 2009).

Roman Stanek advices that business intelligence is a luxury and only big organization can cope with its failure due to their financial power.

Its use of single true parameters which in some cases is not based on real time to aid the management, its non scalability to cope with the changes in the organization and its success not being easily measured constitutes a big factor in its lack of success.

The lack of communication with the business to get the real needs since many of the questions which needs to be answered for its success are psychological and sociological and not technical which are mainly used (Roseti, 2005).

The system may have its shortcomings but its practically impossible for many organizations to operate and make informed decisions without the business intelligence software which in recent times has become part of big organizations.

Organizations like Microsoft and oracle use SAP to manage and run their business. These organizations are among the best in the world thus clearly depicting the importance of computerizing the decision making process.

Political and other interference are drastically reduced using the system applications in the business and increases productivity and success (Loraine, 2008).

References

Dipen, V. (2010). Business Success without Business Intelligence is Possible? Web.

Doan, A. (2000). . Web.

Linthicum, D. (2009). Leveraging Information and Intelligence. Web.

Loraine, L. (2008). SAP Needs More than Tech Help to Fix Problems This Week. Web.

Roseti, L. (2005). Business Intelligence. Web.

Designing and Evaluating Competitive Intelligence Capacity

Abstract

Basically, the Business Intelligence systems also abbreviated BI, has apparently played very critical and decisive roles relating to making effective decisions in corporations.

This implies that the responsibility assumed by the BI systems has enabled corporations such as IBM, Mitsubishi as well as other undersized and standard size businesses to perk up corporate business prospects and performances through effortlessly accepting the setting that contain the methodical organizations info procedures.

However, mounting the Business Intelligence structures materializes to be constrained and imperfect as a result of the lofty overheads incurred in the BI scheme crafting.

When SOMAS tool is utilized to build up the multifaceted business intelligence scheme, the construction overheads drawn on are expected to be abridged devoid of unavoidably upsetting the BI schemes dependability as well as scalability.

Thus, this particular research report paper offers a novel competitive Business Intelligence system framework that is derived from the low cost technology dubbed as the Self Organized Multi-Agent technology.

Effective business intelligence capacity

In order for industrial groups to carry out the persistently increasing trade demands and rivalries, it is obligatory that resolution building procedures be perceived to undertake very considerable responsibilities. This implies that suitable knowledge and information play very prominent roles in effectual decision making.

Besides, trade dealings info materializes to be concerned with historical resolutions, statistical records as well as both the peripheral and interior milieus including administration policies, climatic settings and procedural progress.

In such a set-up, knowledge management and knowledge repositories systems have advanced to generate and manage knowledge. On account of proper facts generation from such depositories, there has been reputed progress in business intelligence schemes in addition to resolution support schemes.

Business Intelligence schemes, BI, have permitted business enterprises such as Mitsubishi and IBM firms to get hold of effectual decisions by means of logical info progression. In a range of corporations, the implemented business intelligence structures have for the precedent periods emanated to become long-term resolution building mechanisms.

According to the available literature, Business Intelligence has been described as an extensive category of technologies and applications analyzing, storing, collecting and offering admittance into the available pertinent data and information to assist venture users in making enhanced decisions in business. Basically, BI often simplifies the analysis and discovery of information.

This makes it feasible for resolution designers at every stage of the industry to operate on the accessible report and records wherever and any moment as well as to team up, investigate, comprehend and contact such reports with much ease.

Business intelligence tenders the provision for statistical examination and combination along with the aptitude to process statistical records and other info into implementable resolution vessels.

In fact, Business Intelligence might enhance enterprise competitiveness via the use of diverse sources of information such as market, operations and customers. The admiration and extension of Business Intelligence structures have considerably held up as a result of the lofty structuring expenditures and the construction involvedness consequences.

Business Intelligence. Literature review

The reality of the current socio-economic needs has made most of the modern organizations look for ways through which information can easily be processed.

That is, there is need for businesses to encompass those tools that will make possible effective attaining, processing and evaluating immense quantity of information that come from diverse and unrelated sources and that would serve as some basis for discovering new knowledge (Celina & Ziemba, 2007).

Revolutions that are taking place in the marketplace have timely administrators of corporations to swiftly respond in an attempt to continue being aggressive. In order to react quickly to the changes that take place in the market place, there is need for organizations to have management information system that will enable efficient analysis of different information (Bigus & Bigus, 2001).

In addition, organizations need efficient systems that can easily recognize the fast changing business dynamics and challenges. Further, efficient systems should enable organizations respond promptly and accurately to the challenges and dynamics of current business environment (Parunak, 1997).

Moreover, organizations need an information system that can enable them anticipate market trends, easily identify new opportunities, enable them transform their strategies and re-channel their resources so as to become highly competitive (Bussler, 2003).

Organizations constantly collect significant volumes of data and even have access to larger volumes of data from outside the business (Di-Marzo, Gleizes & Karageorgos, 2005). Therefore, they must be capable of transforming this raw data into actionable information through consolidation, organizing, capturing, distributing, storing, analyzing and providing quick feedback as well as easy access.

This will make the company have competitive advantage over others (Gleizes, Camp & Glize, 1999). All these functions are the major objective of Business Intelligence (BI) within an organization. In essence, BI helps organizations create knowledge from the processed information.

This information will enable the organizations make better decisions and convert those decisions into meaningful action that will immensely benefit the organization (Wu, Barash & Bartolini, n.d.).

Besides, BI helps organizations deal with critical issues including getting areas with increased growth opportunities, understanding the competitiveness of the organization in the market place, understanding the areas of profits and losses, understanding and recognizing the trends in the customer behavior, determining the organizations key performing indicators as well as altering the business processes in order to increase productivity (Bigus & Bigus, 2001).

Using the BI systems, organizations can easily analyze the historical data that was created by the business or resulting from the external sources such as the demographic data or that relating to the climatic conditions.

In addition, BI would be useful in studying and understanding particular line of business or function. Furthermore, the information analyzed can be used in understand the business trends, weaknesses, strengths as well as understanding the behavior of the competitors and the situation of the market (Ariyachandra & Watson, 2005).

Before the discovery of the BI technologies, businesses relied on the conventional standard methods to convert data into actionable information. Using conventional methods required labor and time. Moreover, the process required a huge amount of resources and in most cases accompanied with immense human error.

In due course, the info structures have progressed to exceedingly smart Business Intelligence schemes from the customary management info schemes.

The information systems that have been there over the years include Management Information System (MIS), Decision Support System (DSS), Enterprise Systems (ES), Enterprise Intelligent Systems (EIS) and the Business Intelligence (BI) Systems which are the most current information systems (Na,Yun & Xin, 2007). See the evolution of the information system below.

Figure A: Info Schemes progression.

In administration provisions, business intelligence has often been utilized in the description of know-how that corporations like Mitsubishi and IBM exploit to amass statistical info, examine info, stockpile info and supply that info for enhanced resolution making procedures.

In most cases, the information being provided always concern the enterprise. It is asserted that proficient business intelligent schemes proffer the unsurpassed resolutions to the most refined amenities and tasks for successful examination of business statistical info. This is done so as to improve and to support management decisions making process across a wide range of business activities (Bigus & Bigus, 2001).

The BI systems are built upon the integration of Databases, Web Services, Data Mining technologies, Data Warehousing technologies and advanced visualized Interfaces (Ariyachandra & Watson, 2006).

In the execution course, the BI structures ought to be noshed with lofty speed set of connections to convey the statistical info from the disseminated info resource basis to the innermost resources stockrooms or warehouses. In addition the centralized data warehouses should be voluminous enough to store the large data that are being transmitted. These high speed networks and large volume warehouses are always costly (Parunak, 1997).

Business Intelligence (BI) is all about providing information to the organization. One of the most important components of the BI system is the centralized data warehouse. It is the component that stores huge amount of data that the organization needs.

BI infrastructure is not just built for the organizations to get a particular advantage rather as a business necessity (Parunak, 1997). The requirement of the BI is for the organizations to have a structured and organized information environment.

In the structure, the businesses will have different types and organizations of data which can further be organized into a structured environment as an information pyramid (Rodriguez, Hilaire & Koukam, 2003).

Building a BI data infrastructure is costly to most organizations (Di-Marzo, Gleizes, & Karageorgos, 2005). Attributable to the soaring overheads implicated, small as well as medium business ventures generally get troubles in constructing and upholding the business intelligence schemes.

Moreover, the complexities in establishing and maintain the high speed networks as well as the high level storage devices is beyond reach of most small and medium enterprises (Bigus & Bigus, 2001). Though various frameworks as well as architectures have been developed over the years to reduce the cost of BI systems, most of the businesses are still finding it difficult to implement.

A BI system design that is based on the self organized Multi agent technology has been found to reduce cost of establishment and sustainability (Gleizes, Camp & Glize, 1999). This in effect will increase the affordability of the BI to the small and medium enterprises.

BI systems are built in such a way that they work with agents to create an end user results. Agents are considered to be something that can be seen as understanding the immediate environment through sensors and acting on that environment through effectors (Na,Yun & Xin, 2007).

There are three functions that are normally being performed by the intelligent agents that include the awareness of lively and ever changing circumstances in the environment, taking actions to affect these conditions that exist in the environment and have analytic capability to deduce perceptions, draw inferences, solve problems and determine actions (Rodriguez, Hilaire & Koukam, 2003).See figure B below.

Figure B: A typical BI System Architecture.

The MAS (Multi-Agent Systems) has been chosen by majority to be the best in developing the most complex systems because of its scalability as well as the reliability with reduced building cost (Armugam & Devadas, 2010). There are a number of agents that make the Multi-agent systems.

These agents have the duty of implementation the tasks assigned. For these agents to complete these tasks there must be communications between themselves. In other words, there must be coordination between the agents in order to complete the assigned task. MAS have the advantage of reducing the developing time as well as the complexities of implementing the software agents (Hayes-Roth, 1995).

Agents that are used in the MAS can be categorized as the static agents or the mobile agents. Static agents normally reside in the original location and the information is exchanged with the outside world through the mechanism of communication and at the same time collaborates with other agents (Lin, Hong & Chen, 1998).

Attributes of the static gents includes autonomy, reaction, interaction and inventiveness. On the other hand, cellular phone mediators terminate the consumer responsibilities not at the initial point, but while stirring from diverse joints that are offered. Mobile agents are characterized by the parallelism, mobility, synchronism and resources optimization (Na,Yun & Xin, 2007).

Integrating multi-agent technology with self organization will handle agent organization effectively (White, 2006,). In a self organized multi-agent system the driving forces also called the agents might be well thought-out into arrangements for constructive appliances devoid of commanding peripheral innermost runs.

These independent units are supposed to cognizant of the immediate surrounding environment and communicate accurately with the environment then relay the message (Gleizes, Camp & Glize, 1999). In other words, the units are supposed to be self-regulating and in so doing make decisions that will be useful in implementing the given assignment

Figure C: Framework of the Multi Agent System.

BI systems have been applied in various core functions of an organization. These core functions include operations, finance, customer services, human resources management and marketing (Russell & Norvig, 2005). In the operations, the BI systems are used by the organization management to meet their operational performance measurements.

For instance, in Retail Company each manager can receive a digital dashboard containing summaries of key performance indicators in their respective areas of responsibility (Gleizes, Camp & Glize, 1999). These areas may include the store, merchandise department, loss prevention, risk or cash flows.

In circumstances where the performances have fallen below the preset requirement, the BI systems can be useful in sending signals to the managers identifying the potential problems.

This will enable the mangers to monitor the performance matrices, analyze the information, make the proactive decisions and act on those decisions (Nicholls, 2006). With the BI systems managers can easily visualize the impact of the changes that has been made as a result of changing the performance indicators on the dashboard (Rodriguez, Hilaire & Koukam, 2003).

In finance core competence, BI systems provide an immediate access to financial budgeting and forecasting data (Na,Yun & Xin, 2007). This will enable businesses make accurate decisions based on the current financial information.

The current data may be needed by management to make decisions including personalized views of revenue information by customer, product, merchandize, region and store as well as time period (Rodriguez, Hilaire & Koukam, 2003). BI systems also enable organization managers develop a trend in revenues for speedy and accurate forecasting.

Moreover, financial information will enable managers to compare and contrast the organization revenues with goals as well as identifying areas in which the organization is performing better or worse. In such a situation the organization is armed with accurate information that will enable them act promptly and accurately (Ariyachandra & Watson, 2006).

In customer services, BI enables the organizations to assess various market segments. The BI systems also help companies identify new customers, as well as new potential business areas as well as retaining the existing business (Power, 2001).

For instance, BI makes it easy to correlate the sales information with that of the customers. Those organizations that focus on customers relations and services have typically realized the significant competitive advantage (Klein & Tichy, n.d).

Further, BI systems have been used by the organizations to support their human resources activities including employee retention, recruitment and career development. Organizations can align the staffing needs with the strategic goals by mapping those goals with the skills needed to achieve them (Gleizes, Camp & Glize, 1999).

The organizations then can go further to identify the recruitment methods and practices that will bring in high quality and skilled individuals on board. In addition, the organization can further identify new potential candidates for management. BI is also important in critical areas such as the compensation planning, employee benefit planning, productivity planning and skills rating (Bigus & Bigus, 2001).

Marketing is the core competency within an organization where BI is highly needed. Within most organizations that have adopted BI systems, marketing is the area that have greatly benefited from BI systems (Rodriguez, Hilaire & Koukam, 2003).

In marketing, BI is vital in identifying various business trends, revenue analysis on daily basis, high performance identification, quantifying the impact of price changes as well as identifying the opportunities for growth (Douglas, 1993).

For instance a tracking company can use the BI to identify and analyze the fuel rate increase in order to determine things such as the impact on profitability and revenue, identifying the low/heavy impact segments, obtaining the optimizing tracking routes as well as identifying the multi-modal routing opportunities.

The selected technology

To minimize the high construction costs and the effect of building complexities associated with the BI systems, technology dubbed as Self Organized Multi-Agent System (SOMAS) is seen to be very supportive.

The technology supports robustness and high level scalability as it creates complex systems at the least cost possible. To build a multifaceted system such as Business Intelligence system anchored on SOMAS technology might definitely guarantee a minimal cost outlay resolution.

Thus, this research report paper tends to introduce a very novel approach through the use of SOMAS technology in designing a minimal cost BI system. The organization of the paper is as follows. The second section offers a brief literature review as regards to a variety of information systems.

The third section presents novel SOMAS framework design, Self Organized Multi-Agent System that can be used to build Business Intelligence at minimum cost. That is, all the inputs, outputs and BI capabilities will be identified and evaluated in the third section.

Any eminent problems in the BI system will be identified and analyzed in the fourth section (Gleizes, Camp & Glize, 1999). The conclusions and recommendations for improvement on the BI system will consequently follow.

A framework design for Business Intelligence System (BI) based on Self-Organized Multi-Agent System Technology (SOMAS Technology)

When companies such as Mitsubishi and IBM Corporation use Self Organized Multi-Agent technology to implement the Business Intelligent Systems, they are likely to minimize the associated costs.

This is made possible as a result of various tasks execution by agents namely data mining, analyzing, querying, metadata extraction and data cleansing. In fact, whilst various Business Intelligence tasks are being executed using such agents, data storage and transfer are likely to be reduced hence minimizing the allied costs (Douglas, 1993).

The diagram below shows a framework design of the Business Intelligence system anchored on the technology called Self Organized Multi-Agent system.

BI capabilities inputs and outputs as well as an evaluation of BI capabilities performance

The present BI system framework built on SOMAS technology comprise of four notable layers. However, every layer has special dedication of executing a solitary key task of the Business Intelligence system.

In the BI system framework, it is apparent that all upper layers freely network with the all the layers via the well designed web services. The four distinctive layers of the self organized multi-agent technology support business intelligence framework include:

  • The data source layer
  • The data cleansing layer
  • The business layer and,
  • The application layer

From the above framework, the Application Layer plays a critical role of presenting the users interfaces to each of the users through setting up decisive connections for providing several services. The services include data mining, analysis and querying to the end users in a visualized and interactive mode.

The Data Source Layer found in the BI system framework plays the central functionalities of offering the basic data services to the Data cleansing Layer from assorted data resources. This layer similarly establishes and maintains the restricted metadata.

The Business Layer offers central functionalities to the layer dubbed as the Application Layer (Rodriguez, Hilaire & Koukam, 2003). Within the Data Cleansing Stratum or layer, the available pertinent data undergoes through the process of refinement in order to maintain the integrity and accuracy of data. The process materializes to assist the corporations in improving the correctness of information.

On the other hand, the SOMAS technology based BI system framework above comprises of manifold agents. The core agents in the framework which are bound to play critical roles when the BI system is being implemented are:

  • The data source agent (DSA).
  • The data cleansing agent (DCA).
  • The data mining agent (DMA).
  • The Tasks allocation agent (TAA).
  • The User control agent (UCA).
  • The user agent (UA).
  • The data source management agent (DSMA).
  • The online or web analytical processing agents (OLAPA).

Within the application layer, there is the existence of the User Agent. In fact, any new user agent is created by the User Control Agent anytime the users of the system log into the SOMAS technology based Business Intelligence system. Such new user agents are then destroyed each time the system users log out.

This systems User Agent functionalities to the corporations such as Mitsubishi and IBM Companies is to offer Business Intelligence services to all users as well as sending each request that has been made to the list of requests (Ariyachandra & Watson, 2006).

Consequently, the ensuing effects from diverse agents are obtainable to the users of the system. This is done within the preferences of end users of the system normally in cooperative and envisaged approach.

The User Control Agent (UCA) on the other hand is present within systems Business Stratum or layer. Basically, the User Control Agent plays a critical role pertaining to; the sharing of knowledge, maintenance of the users profiles and controlling the systems user agent alongside the provision of the joint results querying by intelligently accomplishing some tasks in support of the SOMAS technology based Business Intelligent systems users as indicated by the history of the users.

Conversely, it is within the Systems Business Layer where Task Allocate agent is situated. Such an agent plays the core duty of assigning numerous contractual obligations and tasks founded on the services and requests made. Further, the Task Allocate Agent manages both the service lists as well as the requests lists.

Practically, the Task Allocate Agents carry out the system users requests through handing most of such requests over to the analogous or subsequent system services.

The online or web analytical processing agents also called OLAPA agent is similarly situated within the Business Stratum or Layer. The OLAPA instrument presents the investigative online handling services comprising of examination of the data systems. It also permits various reviewing as well as screening of the organization data.

However these are done online curtail delays that may exists. Besides, the OLAPA agent in the SOMAS technology based Business Intelligent system offers the critical function called multidimensional analysis of the systems data (Gleizes, Camp & Glize, 1999).

In the Systems Data Cleansing Layer, there is equally the presence and existence of the Data Cleansing Agent. While executing its tasks to the systems users, the DCA agent applies services relating to the cleansing of the systems data to any data acquired from the systems numerous data resources.

In most cases, the DCA (Data Cleansing Agent) plays a significant role pertaining to the detection and removal of the data inconsistencies and errors and improving on the systems data quality for purposes of processing (Rodriguez, Hilaire & Koukam, 2003).

In the systems Business Layer, there is the Data Mining Agent (DMA). Within the SOMAS technology based Business Intelligent system, the DMA agent provisionary offers the systems data mining services founded on different data mining algorithms and techniques. The DMA agent is always very intuitive.

Hence it allows for improved insight that goes above the online or web analytical processing agents, by analyzing the systems large databases. This DMA agent functionality helps the system in solving various business decisions making problematic upshots.

The Data Mining Agent furthermore predicts the systems prospective behaviours as well as trends, thus enabling corporations to craft knowledge driven and proactive business decisions. More often, the Data Mining Agents in the system may respond to the business tailored problems and queries which were deemed to be customarily time involving being resolved (Bigus & Bigus, 2001).

Within the systems Data Cleansing Layer, there is similarly the existence of the Data Source Management Agents (DSMA). In essence, the DSMA agent plays a decisive role relating to the monitoring of different sources of the systems data as well as the localized metadata found in most springs of data.

The Data Source Management Agents also assists in managing the system users universal metadata bases. The DSMA agent always obtains scores of the systems data inquiries particularly those that ensue from the SOMAS technology based Business Intelligent system upper layer (Klein & Tichy, n.d).

The received inquiries are thereafter propelled to the respective data resource agents who assimilate the outcomes which are then taken back by the systems agent of the data source.

Finally, from the SOMAS technology based Business Intelligent system above, it emanates that within the Data Source Stratum, there is the existence of the Data Source Agent (DSA). The DSA attempts to manage all the heterogeneous and assorted data sources for purposes of providing the upper layer with central data services.

From the systems framework diagram, the central data services incorporate data queries receipt, data mining and extraction for the accomplishment of the respective tasks, the provision of various data sets for analytical and querying purposes along with the management of the localized metadata (Na,Yun & Xin, 2007). These are then sent to the systems upper layer to maintain the universal metadata.

Problems associated with the SOMAS technology based Business Intelligent system

The intelligent agents and the Business Intelligent have come out to be variant areas of research. Recently, research attempts to link the two areas.

Whereas Business Intelligent has been used successfully to provide info and data from various structured sources, the BI system has frequently failed at both the Mitsubishi and IBM corporations to provide data and info from the disseminated sources where such data and info are kept in the unstructured files and document.

In addition to this, there exist various other unresolved problems within the existing frameworks of the Business Intelligent system. It is recommended that to solve most of the looming unresolved problems, a corporation such as IBM Corp could integrate the present intelligent agents within the Business Intelligent system.

Conclusion and Recommendations

The Business Intelligence field has been evolving since time in memorial. This implies that, its business use significance has been very well established. While some new BI issues have surfaced requiring research attention, other BI system issues have progressively matured with time.

It is however worth noting that Business Intelligence systems dynamically try to support the activities conducted by corporations managers in an attempt to gain some insights into the corporations processes and outcomes. This requires that use of technologies and tools like advanced reporting, data mining, ETL processes and data warehousing.

Such technologies and tools have greatly handled structured info and data in various organized environments. Nevertheless, they have limited capacities to handle BI systems data and info which are unorganized and those that do not essentially derive from well classified sources.

The Business Intelligent system framework above that has been derived from Self Organized Multi-Agent technology has the capacity of improving the reliability and scalability of the BI system.

This is because it can be put up at minimal building cost which in turn helps in the improvement of the Business Intelligence Systems affordability by both the medium and small scale business enterprises as well as large corporations such as Mitsubishi and IBM Company.

However, the failure of the BI system to provide data and info from the unstructured distributed documented sources persists to be a challenging problem to most corporations. Integrating the Business Intelligent systems intelligent agents is one sure way to deal with the encountered problem.

References

Ariyachandra, T & Watson, H 2005, Key factor in selecting a data warehouse architecture, Business Intelligence Journal, vol.10 no.2, pp.26-59.

Ariyachandra, T & Watson, HJ 2006, Which data warehouse architecture is most successful, Business Intelligence Journal, vol.11 no.1, pp.71-92.

Armugam, B & Devadas, J 2010, Object oriented intelligent multi-agent system data cleaning architecture to clean preference based text data, International Journal of Computer Applications, vol.9 no.8, pp.57-65.

Bigus, JP & Bigus, J. 2001, Constructing intelligent agents using java, John Wiley & Sons, New York.

Bussler, B, 2003, B2B integration: Concept and architecture, Springer, Berlin Heidelberg.

Celina, MO & Ziemba, E. 2007, Approach to building and implementing business intelligence systems, Interdisciplinary Journal of Information, Knowledge, and Management, vol.2 no.5, pp.24-36.

Di-Marzo, SG, Gleizes, MP & Karageorgos, A. 2005,Self-organisation and emergence in mass: an overview, Informatica, this issue, vol.3 no.1, pp.15-20.

Douglas, H. 1993, Business intelligence: competing against time, Twelfth Annual Office Information Systems Conference, vol.10 no.2, pp.27-33.

Gleizes, MP, Camp, V & Glize, P. 1999, A theory of emergent computation based on cooperative self-organisation for adaptive artificial systems, 4th European Congress of Systems Science, vol.1 no.3, pp.90-99.

Hayes-Roth, B. 1995, An architecture for adaptive intelligent systems, Artificial Intelligence: Special Issue on Agents and Interactivity, vol.72 no.1, pp.66-71.

Klein, F & Tichy, M. n.d, . Web.

Lin, WJ, Hong, JL & Chen, XH. 1998, Expert systems and multi- agent cooperative systems, Computer Science, vol.25 no.1, pp.27-58.

Na, X, Yun, ZW & Xin, P. 2007, Research on business intelligence model based on agent, Computer Applications and Software, vol.24 no.3, pp.110-131.

Nicholls, C. 2006, BI 2.0: how real time business intelligence is irrevocably changing the way that we do business, In Search Insight.

Parunak, VH. 1997, Go to the ant: engineering principles from natural multi-agent systems, Annals of Operations Research, vol.75 no.1, pp.69-101.

Power, D. 2001, , Proceedings of the Informing Science and IT Education Conference. Web.

Rodriguez, S, Hilaire, V & Koukam, A. 2003, Towards a methodological framework for holonic multi-agent systems, Proceedings of the Fourth Workshop on Engineering Societies in the Agents World (ESAW03), vol.10 no.4, pp.31-45.

Russell, SJ & Norvig, P. 2005, Artificial intelligence a modern approach, Prentice Hall International, Englewood Cliffs, NJ.

White, C. 2006, Business intelligence network: The vision for BI and beyond.

Wu, L, Barash, G & Bartolini, C. n.d, Service oriented architecture for business intelligence. Web.

Is Intelligence Analysis a Profession

Code of ethics in establishing and sustaining a profession

Ethics and ethical standards can be defined as the basic common rules that govern the mode and manner of conduct within a profession. The majority of professions it is formally incorporated n the employment contract while in others it is left to external bodies that are responsible for the setting maintenance and implementation of professional ethics.

A code of ethics is therefore and agreed on set of rules and regulations enforced within a given profession with the intention of ensuring uniformity and continuity in the profession.

The code of ethics differs from any other set f rules by the fact that it is universal across the participants of the profession. It is therefore a compromise of a set of agreed on rules and regulations by the maj0ority of the members of the profession. It serves several purposes including the following.

To begin with, the code of ethics is a compromise of all the interests of the players and participants in the profession. The code therefore cuts across all the relevant interests therefore provide a sense of uniformity in as far as the standard and quality of the services rendered by the profession are concerned.

This is important in maintaining a consistent enforcement mechanism in as far as standardization is concerned. Accountants for instance the ethical standards prohibit the practitioners from rendering substandard services. This means that the ethical code has a set benchmark of the minimum allowable service for members of the accounting profession.

The ethical code in a profession also serve t regulate and control the entry and exit into and from the profession. It provides for the procedures and practices that are to be observed when entering and leaving a given profession. This ensures that there is a clear and smooth flow of members into and out of the profession.

This is regulated through the use of standard certificates of practice to those who are deemed to have qualified to be in the profession. The issuance of certificates or licenses also allows the members of the profession to collectively form opinions and identify the number of members within a certain region or market segment. It therefore facilitates the distribution and allocation into the market.

The ethical code acts as a grievance resolution mechanism. It mediates and mitigates the pertinent problems and concerns that may arise in the profession and cause conflict. Such conflicts are therefore referred to set committees such as the ethics committee in the legal profession for resolution. This also serves to maintain a good picture of the profession and protect the various diverse interests in a dispute.

The role and importance of an ethical code in any profession goes to the self-preservation of the profession concerned. It plays an irrefutably relevant role in maintaining continuity in a profession.

Is intelligence analysis a profession?

For an engagement to be considered a profession or in the alternative a craft it must poses the basic prescriptions characters and elements of the specific work category. An engagement can be termed as a profession if it bears majority of the following characteristics.

It must require and involve a significant amount of training those appeals to both intellectual and practical skills. This therefore allows a trainee to be measured and evaluated on their level of competence and performance. This is done by an agreed on independent body or institution of learning that follows a particular well-defined curriculum.

It must also involve a certain degree of liability on the part of the professional. This therefore implies that the professional can be held accountable for the failures additions and omissions during the interactions with their clients. It also means that the passing of the basic training and intellectual performance alone does not guarantee that the occupation is a profession.

Lawyers and engineers for-instance are deemed to have entered a contractual agreement with their clients that attracts liability for negligence, the professional is therefore held liable and accountable for their acts or omissions. The occupation or engagement should be self-regulating and should therefore bear a self-sustaining structure and protocol.

The occupation should bear a defined set of principles of practice and procedure. This ensures that the client is aware and conscious of the amount quantity and standards of goods and service to expect (Barker 1992).

Intelligence analysis in these measures does not fit the prescription of a profession. It does not have a self-governing structure and therefore varies with the practitioners. It also has a very slim margin of liability and responsibility on the practitioner.

Despite the fact that it bears public interest, it fails to guarantee a standard and measure of quality partly due o the lack of a forma measure of such standard and partly due to the lack of a formalized mode of training.

Reference

Barker F. (1992). What Is a Profession? Professional Ethics Multidisciplinary Journal, Volume 1 Numbers 1 and 2. 73-99