Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceTarget AudienceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
223,477
result(s) for
"Business Intelligence."
Sort by:
Open source intelligence methods and tools : a practical guide to online intelligence
by
Hassan, Nihad A., author
,
Hijazi, Rami, author
in
Open source intelligence.
,
Business intelligence.
2018
Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring intelligence about individuals and other entities. This book will also improve your skills to acquire information online from both the regular Internet as well as the hidden web through its two sub-layers: the deep web and the dark web. The author includes many OSINT resources that can be used by intelligence agencies as well as by enterprises to monitor trends on a global level, identify risks, and gather competitor intelligence so more effective decisions can be made.
Chinese Industrial Espionage
by
Hannas, William C.
,
Puglisi, Anna B.
,
Mulvenon, James
in
Business intelligence
,
Business intelligence -- China
,
Business intelligence -- United States
2013
This new book is the first full account, inside or outside government, of China's efforts to acquire foreign technology.
Based on primary sources and meticulously researched, the book lays bare China's efforts to prosper technologically through others' achievements. For decades, China has operated an elaborate system to spot foreign technologies, acquire them by all conceivable means, and convert them into weapons and competitive goods-without compensating the owners. The director of the US National Security Agency recently called it \"the greatest transfer of wealth in history.\"
Written by two of America's leading government analysts and an expert on Chinese cyber networks, this book describes these transfer processes comprehensively and in detail, providing the breadth and depth missing in other works. Drawing upon previously unexploited Chinese language sources, the authors begin by placing the new research within historical context, before examining the People's Republic of China's policy support for economic espionage, clandestine technology transfers, theft through cyberspace and its impact on the future of the US.
This book will be of much interest to students of Chinese politics, Asian security studies, US defence, US foreign policy and IR in general.
Business Intelligence and Analytics: From Big Data to Big Impact
by
Storey, Veda C.
,
Chen, Hsinchun
,
Chiang, Roger H. L.
in
Analytics
,
Betriebliches Informationssystem
,
Big data
2012
Business intelligence and analytics (BI&A) has emerged as an important area of study for both practitioners and researchers, reflecting the magnitude and impact of data-related problems to be solved in contemporary business organizations. This introduction to the MIS Quarterly Special Issue on Business Intelligence Research first provides a framework that identifles the evolution, applications, and emerging research areas of BI&A. BI& A 1.0, BI&A 2.0, and BI&A 3.0 are defined and described in terms of their key characteristics and capabilities. Current research in BI&A is analyzed and challenges and opportunities associated with BI&A research and education are identified. We also report a bibliometric study of critical BI&A publications, researchers, and research topics based on more than a decade of related academic and industry publications. Finally, the six articles that comprise this special issue are introduced and characterized in terms of the proposed BI&A research framework.
Journal Article
The Role of Business Intelligence and Communication Technologies in Organizational Agility: A Configurational Approach
by
Fiss, Peer
,
Park, YoungKi
,
Sawy, Omar
in
Big Data
,
Boundary conditions
,
Business intelligence
2017
This study examines the role that business intelligence (BI) and communication technologies play in how firms may achieve organizational sensing agility, decision making agility, and acting agility in different organizational and environmental contexts. Based on the information-processing view of organizations and dynamic capability theory, we suggest a configurational analytic framework that departs from the standard linear paradigm to examine how IT's effect on agility is embedded in a configuration of organizational and environmental elements. In line with this approach, we use fuzzy-set qualitative comparative analysis (fsQCA) to analyze field survey data from diverse industries. Our findings suggest equifinal pathways to organizational agility and the specific boundary conditions of our middle-range theory that determine what role BI and communication technologies play in organizations' achieving organizational agility. We discuss implications for theory and practice and discuss future research avenues.
Journal Article
Business Intelligence Capability: The Effect of Top Management and the Mediating Roles of User Participation and Analytical Decision Making Orientation
by
Robles-Flores, Jose
,
Kulkarni, Uday
,
Popovič, Aleš
in
Advantages
,
Business
,
Business intelligence
2017
In this study, we draw on the structurational model of technology in an institutional setting to investigate how top management affects the development of a firm's business intelligence (BI) capability. We propose a multiple mediator model in which organizational factors, such as user participation and analytical decision making orientation, act as mediating mechanisms that transmit the positive effects of top management championship to advance a firm's BI capability. BI capability has two distinct aspects: information capability and BI system capability. Drawing on data collected from 486 firms from six different countries, we found support for the mediating effects of top management championship through user participation and analytical decision making orientation. These findings contribute to a nuanced understanding of how firms can develop BI capability. This study is one of the first to comprehensively investigate the antecedents of BI capability.
Journal Article
Applied Microsoft business intelligence
This book shows how to leverage the complete set of Microsoft tools including Microsoft Office and SQL Server to better analyze business data. It provides best practices for building complete BI solutions using the full Microsoft toolset. Topics include: how to effectively use SQL Server Analysis and Reporting Services, along with Excel, SharePoint, and other tools to provide effective and cohesive solutions for the enterprise; BI architecture; data queries; semantic models; multidimensional modeling; data analysis and visualization; performance monitoring; data mining; practical business analysis and reporting.
Swarm intelligence and bio-inspired computation : theory and applications
by
Yang, Xin-She
,
Gandomi, Amir Hossein
,
Cui, Zhihua
in
Algorithms
,
Biologically-inspired computing
,
Computational intelligence
2013
Swarm Intelligence and bio-inspired computation have become increasing popular in the last two decades.Bio-inspired algorithms such as ant colony algorithms, bat algorithms, bee algorithms, firefly algorithms, cuckoo search and particle swarm optimization have been applied in almost every area of science and engineering with a dramatic increase.