Business Intelligence and Industrial Espionage – Report Example

Download full paperFile format: .doc, available for editing

The paper "Business Intelligence and Industrial Espionage" is a great example of a report on information technology. For the business to succeed, teamwork is indispensable. Teams are imperative as they can achieve more than an individual can alone. The team that is effective and efficient encompasses a diverse variety of skills, backgrounds, and talents, and can optimally tackle large and complex projects. For any team in the organization to be effective, however, two factors should be considered. Firstly, the team leader should specify explicitly the objective, purpose, or goal, for the team and the team members should work together to accomplish it.

Secondly, the members of the team must understand and consent to each individual’ s role within the team (Levitt, 2013). Mackin (2007) maintains that team members should ideally function well together to accomplish organizational goals, as well as to attain a sense of fulfillment from the teamwork experience. Nonetheless, realizing these criteria does not assure success. For teams to perform effectively, it is imperative that they meet appropriate team requirements. Firstly, there is a need to consider the behaviors and skills profiles of each member and assign roles accordingly.

It is indispensable to acquire a sense of the necessary combination of roles that will deliver optimal results. Besides this, the team leader should be familiar with each of the individual skill sets of the team members. What is more, it is essential to find a way of blending these various behaviors and personalities in order to create a successful team (Kilkenny, 2006). Despite the fact that team members work as a group to accomplish common goals, every member’ s role determines their conduct, contribution to the team, and association with others.

Members should share knowledge and information with each other to meet expectations, develop trust, and enhance good communication (Michaelsen, 2004). In an organization, Collins (2009) claims that a poor performing team is noticeable, as it fails to achieve objectives in a timely and efficient manner. There can be unequal dissemination of team roles, or wrangling among the members. Notably, different members may have a preference for a certain role and contend for it. This might cause ineffectual decision-making and conflict. Thus, in Anahata Technologies Pty Ltd, it is important to understand team dynamics and embrace them to enhance agreement on team roles.

As a team grows and matures, members might want to change roles. This is normal because the experience and demands of a given set of circumstances might change. However, the members in the firm must be kept informed of these changes and of organizational intentions. (Martin, 2005). Figure 1: Teamwork Summary Teamwork is critical for the organization to achieve success. This is because effective teamwork makes it easier for team members to achieve organizational objectives, unlike when employees are acting as individuals.

Teams are also vital in that members have various skills, experiences, and knowledge, which is significant in the smooth operation of the organization. For successful teamwork in the organization, team leaders should consider other team members’ behaviors and expectations (Martin, 2005). This is because every individual member of the team has a different personality and preference for team roles. During the assigning of roles to each member, the knowledge and understanding of every personality and preference are critical in achieving success. It is also crucial to watch out for the performance of the team, as a poor performing team does not achieve its goals in a timely and efficient way (Collins, 2009).

References

Andel, T.R. &Yasinsac, A. (2008).Adaptive Threat Modeling for Secure Ad Hoc Routing Protocols. Electronic Notes in Theoretical Computer Science, 197 (2), 3-14

Andress, J. (2011).Chapter 1 - What is Information Security? The Basics of InformationSecurity. Pp. 1-16

Azad, T.B. (2008). Chapter 1 - Introduction to Security. Securing Citrix Presentation Server in the Enterprise. Pp. 1-67

Basagiannis, S., et al (2009). Probabilistic Model Checking for the Quantification of DoSSecurity Threats.Computers & Security, 28(6),2009, 450-465

Beal, B. (2005).IT Security: The Product Vendor Landscape. Network Security, 2005, (5), 9-10

Bidgoli, H (2006). Handbook of Information Security. Hoboken, N.J: John Wiley. Pp. 18-50.

Bidgoli, H. (2002). Chapter 11 - Security Issues and Measures: Protecting Electronic Commerce Resources. Electronic Commerce. Pp. 363-398

Biere, M. (2003). Business Intelligence for the Enterprise. Upper Saddle River, N.J. London: Prentice Hall PTR. Pp.

Bohlander, G. (2007). Managing Human Resources. Mason, OH: Thomson. Pp. 20-50.

Choo, K.R. (2011). High Tech Criminal Threats To The National Information Infrastructure. Information Security Technical Report, 15(3), 104-111

Choo, K.R. (2011). The Cyber Threat Landscape: Challenges and Future Research Directions. Computers & Security, 30(8), 719-731

Collins, S. (2009). Interpersonal Communication: Listening And Responding. Mason, OH: South- Western Cengage Learning. Pp. 64-70.

Dempsey, J. (2010). Introduction To Private Security. Belmont, CA: Wadsworth Cengage Learning. Pp. 20-40

Dube, D. (2005). Information System Audit And Assurance. New Delhi: Tata McGraw-Hill Pub. Co. Pp. 10-40.

Effy, O. (2009).Management Information Systems. Boston, Mass: Thomson/Course Technology. Pp. 1-30.

Fortune, J. (2005).Information Systems: Achieving Success By Avoiding Failure. Hoboken, NJ: Wiley. Pp. 8-20.

Genco, A. (2010). Pervasive Systems and Ubiquitous Computing. Southampton Boston: WIT Press. Pp. 90-100.

Global, I. (2011).Enterprise Information Systems Concepts, Methodologies, Tools and Applications. Hershey PA: Information Science Reference. Pp. 168-200.

Groom, F. (2004). The basics of voice over internet protocol. Chicago: International Engineering Consortium. Pp. 1-20.

Hall, J. (2013). Accounting Information Systems. Mason, OH: South-Western Cengage Learning. Pp. 209-230.

Hausman, K. (2011). IT architecture for Dummies. Hoboken, NJ: Wiley Pub. Pp. 250-260.

Herold, R. (2011). Managing an Information Security and Privacy Awareness and Training Program. Boca Raton: CRC Press. Pp. 1-30.

Hunter, P. (2002). VOIP The Latest Security Concern: Dos Attack The Greatest Threat. Network Security, 2002(11), Pp. 5-7

Jakobsson, M. (2007).Phishing And Countermeasures: Understanding The Increasing Problem of Electronic Identity Theft. Hoboken, N.J: Wiley-Interscience.Pp.2-18.

Khan, R.A.,& Mustafa, K. (2009).From Threat To Security Indexing: A Causal Chain. Computer Fraud & Security, 2009(5), 9-12.

Khosrowpour, M. (2006).Cases On Strategic Information Systems. Hershey PA: Idea Group Pub. Pp. 1-40.

Kilkenny, S. (2006).The Complete Guide To Successful Event Planning. Ocala, Fla: Atlantic Pub. Group.Pp.53-70.

King, J.L. (2006). Information Systems: The State Of The Field. Chichester, England Hoboken, NJ: J. Wiley & Sons. Pp. 10-30.

Korper, S., &Ellis, J. (2001).10 - Secure Your Investment: Security Threats and Solutions. The E- Commerce Book.Pp.189-210.

Levitt, G. (2013). Team Planning For Project Managers And Business Analysts. Boca Raton, FL: CRC Press. Pp. 20-60.

Mackin, D. (2007). The Team Building Tool Kit Tips And Tactics For Effective Workplace Teams. New York: AMACOM. Pp. 20-50.

Martin, J. (2005). Organizational Behaviour and Management. London: Thomson Learning.Pp. 260-270.

Michaelsen, L.K. (2004). Team-based learning: a Transformative use of Small Groups in College Teaching. Sterling, VA: Stylus Pub. Pp. 1-30

Møller, C. (2012). Re-conceptualizing Enterprise Information Systems 5th IFIP WG 8.9 Working Conference, CONFENIS 2011, Aalborg, Denmark, October 16-18, 2011, Revised Selected Papers. Berlin New York: Springer. Pp. 5-20.

Nasheri, H. (2005). Economic Espionage and Industrial Spying. Cambridge, UK New York: Cambridge University Press. Pp. 10-25.

Oakland, J. (2006). Total Quality In The Construction Supply Chain. Oxford: Butterworth- Heinemann. Pp. 5-30.

Rainer, R. (2011).Introduction to Information Systems. Hoboken, N.J. Chichester: Wiley John Wiley distributor. Pp. 1-20.

Sabherwal, R. (2011). Business intelligence: Practices, Technologies, and Management. Hoboken, NJ: Wiley. Pp.

Sauter, V. (2011).Decision Support Systems for Business Intelligence. Hoboken NJ: John Wiley &Sons. Pp. 10-30.

Scheps, S. (2008). Business intelligence for Dummies. Hoboken, NJ: Wiley.Pp.

Siegel, L. (2012). Criminology. Belmont: Wadsworth/Cengage Learning.

Snedaker, S. (2007).Business Continuity and Disaster Recovery Planning for IT Professionals. Amsterdam: Elsevier. Pp. 119-125

Sparrow, P. (2004).Globalizing Human Resource Management. London New York: Routledge. Pp. 82-100.

Stahl, B. (2008). Information Systems Critical Perspectives. Abingdon New York: Routledge. Pp. 1-20

Stahl, B.C. (2006). Information systems: The State of the Field. Chichester, England Hoboken, NJ: J. Wiley & Sons. Pp. 1-30.

Vacca, J.R. (2009). Computer and Information Security Handbook. Amsterdam Boston Burlington, Mass: Elsevier Morgan Kaufmann.Pp.1-20.

Vacca, J.R. (2009). Computer and Information Security Handbook. Amsterdam Boston Burlington, Mass: Elsevier Morgan Kaufmann. Pp. 600-650.

Whitman, M. (2012).Principles of Information Security. Boston, MA: Course Technology.Pp. 2-30.

Wiles, J. (2007).Techno Security's Guide to Securing SCADA. Rockland, Mass. Oxford: Syngress Elsevier Science distributor.Pp.1-30.

Wiles, J. (2010).Ethical Hacking and Countermeasures. Clifton Park, NY: Course Technology, CENGAGE Learning. Pp. 10-50.

Wiles, J., et al (2012).Chapter 2 – Low Tech Vulnerabilities: Physical Security. Low Tech Hacking. Pp. 31-49

Xenakis, C., &Merakos, L. (2004).Security in Third Generation Mobile Networks. Computer Communications, 27 (7), 638-650.

Yeh, Q. &Chang, A.J. (2007) .Threats, and Countermeasures for Information System Security: A Cross-Industry Study. Information & Management, 44(5), 480-491

Download full paperFile format: .doc, available for editing
Contact Us