Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Reading LevelReading Level
-
Content TypeContent Type
-
YearFrom:-To:
-
More FiltersMore FiltersItem TypeIs Full-Text AvailableSubjectPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
426
result(s) for
"Espionage Congresses."
Sort by:
Spy chiefs
Throughout history and across cultures, the spy chief has been an essential advisor for heads of state and the leader of the state security apparatus. In democracies, the spy chief has become a public figure, and intelligence activities have been largely brought under the rule of law. In authoritarian regimes, the spy chief was and remains a frightening and opaque figure who designs intrigue abroad and fosters repression at home. This second volume of Spy Chiefs provides a close-up look at intelligence leadership, good and bad. The contributors to the volumes try to answer the following questions: how do intelligence leaders operate in different national, institutional and historical contexts? What role have they played in the conduct of international relations? How much power do they possess? What qualities make an effective intelligence leader? How secretive and accountable to the public have they been? This book goes beyond the commonly studied spy chiefs of the United States and Britain to examine leaders from Renaissance Venice to twentieth century Russia, Germany, India, Egypt, and Lebanon.
Business Intelligence and Mobile Technology Research
by
Eom, Sean B
,
Laouar, Mohamed Ridda
in
Business enterprises
,
Business enterprises -- Information technology -- Congresses
,
Business intelligence
2014
All business organizations strive for increasing their growth by seizing new opportunities, reducing enterprise costs, attracting new customers and retaining old customers. In doing so, business intelligence and analytics allow business organizations to make better plans, informed decisions, and monitor their progress towards planned goals and objectives. The more disruptive power of IT technologies comes synergistically. Individual IT technologies do not work in isolation. Business intellige.
Tableau your data!
2016,2013
Transform your organization's data into actionable insights with Tableau Tableau is designed specifically to provide fast and easy visual analytics. The intuitive drag-and-drop interface helps you create interactive reports, dashboards, and visualizations, all without any special or advanced training.
Spy Chiefs
by
McGarr, Paul M
,
Iordanou, Ioanna
,
Hechelhammer, Bodo V
in
Case studies
,
Congresses
,
Espionage
2018
This second volume of Spy Chiefs goes beyond the commonly studied spy chiefs of the United States and the United Kingdom to examine leaders from Renaissance Venice to the Soviet Union, Germany, India, Egypt, and Lebanon in the twentieth century.
Coordination and information
by
Naomi R. Lamoreaux
,
Daniel M. G. Raff
in
Business intelligence
,
Business intelligence -- Congresses
,
Comparative organization
1995
Case studies that examine how firms coordinate economic activity in the face of asymmetric information—information not equally available to all parties—are the focus of this volume. In an ideal world, the market would be the optimal provider of coordination, but in the real world of incomplete information, some activities are better coordinated in other ways. Divided into three parts, this book addresses coordination within firms, at the borders of firms, and outside firms, providing a picture of the overall incidence and logic of economic coordination. The case studies—drawn from the late nineteenth and early twentieth century, when the modern business enterprise was evolving, address such issues as the relationship between coordination mechanisms and production techniques, the logic of coordination in industrial districts, and the consequences of regulation for coordination. Continuing the work on information and organization presented in the influential Inside the Business Enterprise, this book provides material for business historians and economists who want to study the development of the dissemination of information and the coordination of economic activity within and between firms.
Learning by doing in markets, firms, and countries
by
Naomi R. Lamoreaux
,
Daniel M. G. Raff
,
Peter Temin
in
Business
,
Business -- History -- Congresses
,
Business enterprises
1999,1998
Learning by Doing in Markets, Firms, and Countries draws out the underlying economics in business history by focusing on learning processes and the development of competitively valuable asymmetries. The essays show that organizations, like people, learn that this process can be organized more or less effectively, which can have major implications for how competition works. The first three essays in this volume explore techniques firms have used to both manage information to create valuable asymmetries and to otherwise suppress unwelcome competition. The next three focus on the ways in which firms have built special capabilities over time, capabilities that have been both sources of competitive advantage and resistance to new opportunities. The last two extend the notion of learning from the level of firms to that of nations. The collection as a whole builds on the previous two volumes to make the connection between information structure and product market outcomes in business history.
DO YOU HAVE TO KEEP THE GOVERNMENT'S SECRETS? RETROACTIVELY CLASSIFIED DOCUMENTS, THE FIRST AMENDMENT, AND THE POWER TO MAKE SECRETS OUT OF THE PUBLIC RECORD
2015
Now you see it. Now you don't.
This is not a magician's incantation. It is a description of retroactive classification, a little-known provision of U.S. national security law that allows the government to declassify a document, release it to the public, and then declare it classified later on. Retroactive classification means the government could hand you a document today and prosecute you tomorrow for not giving it back. Retroactive classification can even reach documents that are available in public libraries, on the Internet, or elsewhere in the public domain.
Journal Article
Field Evaluation in the Intelligence and Counterintelligence Context
by
Council, National Research
,
Education, Division of Behavioral and Social Sciences and
,
Board on Behavioral, Cognitive, and Sensory Sciences
in
Cognitive psychology
,
Congresses
,
Military intelligence
2010
On September 22-23, 2009, the National Research Council held a workshop on the field evaluation of behavioral and cognitive sciences-based methods and tools for use in the areas of intelligence and counterintelligence. Broadly speaking, the purpose of the workshop was to discuss the best ways to take methods and tools from behavioral science and apply them to work in intelligence operations. More specifically, the workshop focused on the issue of field evaluation-the testing of these methods and tools in the context in which they will be used in order to determine if they are effective in real-world settings.
This book is a summary and synthesis of the two days of presentations and discussions that took place during the workshop. The workshop participants included invited speakers and experts from a number of areas related to the behavioral sciences and the intelligence community. The discussions covered such ground as the obstacles to field evaluation of behavioral science tools and methods, the importance of field evaluation, and various lessons learned from experience with field evaluation in other areas.
Alger Hiss and the Battle for History
2009
Books on Whittaker Chambers and Alger Hiss abound, as countless scholars have labored to uncover the facts behind Chambers's shocking accusation before the House Committee on Un-American Activities in the summer of 1948-that Alger Hiss, a former rising star in the State Department, had been a Communist and engaged in espionage.
In this highly original work, Susan Jacoby turns her attention to the Hiss case, including his trial and imprisonment for perjury, as a mirror of shifting American political views and passions. Unfettered by political ax-grinding, the author examines conflicting responses, from scholars and the media on both the left and the right, and the ways in which they have changed from 1948 to our present post-Cold War era. With a brisk, engaging style, Jacoby positions the case in the politics of the post-World War II era and then explores the ways in which generations of liberals and conservatives have put Chambers and Hiss to their own ideological uses. An iconic event of the McCarthy era, the case of Alger Hiss fascinates political intellectuals not only because of its historical significance but because of its timeless relevance to equally fierce debates today about the difficult balance between national security and respect for civil liberties.
Embracing the Fog of War
2012
The unpredictable counterinsurgency environment challenges centralized, quantitative campaign assessment. A comprehensive examination of the centralized, quantitative approach to assessment, as described in the literature and doctrine and applied in two primary case studies (Vietnam and Afghanistan), reveals weaknesses and gaps and proposes an alternative process: contextual assessment.