SlideShare a Scribd company logo
1 of 18
Unit 7 [140: Introduction to Management]
Page 1 of 2
Assignment Details and Rubric
This week's Assignment consists of reading a scenario about
Sandwich Blitz, Inc. and writing about
how self-managed teams could be used at Sandwich Blitz to
allow Dalman more time to devote to
growing the business.
Lately, Dalman has mostly been visiting the operating locations
and addressing manager operations
concerns. Lei has concentrated on financial matters. Both
Dalman and Lei are pleased with Sandwich
Blitz’s past performance but feel that they are each unable to
devote their time and energy to take the
business to the next level. All of their time seems to be spent
addressing small problems within the
existing operation. Dalman has heard that other businesses have
successfully used a team approach
to managing with good results and wonders if this could help
him as well as the location managers.
After reading the scenario above, the section on “Self-managed
Teams” in your assigned textbook
readings and completing the practice Learning Activities, type a
paper in which you explain the
difference between traditional and team work environments,
how self-managed teams could be
successfully implemented at Sandwich Blitz, and how these
teams could contribute to Sandwich
Blitz’s success.
This Assignment addresses the following unit outcomes:
● Distinguish between traditional versus team environments.
● Describe how teams contribute to an organization’s
effectiveness.
● Explain how an effective team is built.
Submission Instructions:
Draft your Assignment paper at least 2 full double-spaced pages
in length, using size 12 point font in
MS Word format. Be sure your paper is well written in
paragraph form, with correct spelling, grammar,
and punctuation. Be sure to name your file according to the
Kaplan file-naming convention. You may
use external sources in addition to the required unit readings.
Cite any external sources used.
Unit 7 [140: Introduction to Management]
Page 2 of 2
Submit as an attachment to the Unit 7 Assignment Dropbox for
grading before the close of the unit.
AB140 Unit 7 Grading Rubric Percentage Possible
Points
Content, Focus, Use of Text and
Research:Explain the difference
between traditional and team work
environments, how self-managed teams
could be successfully implemented at
Sandwich Blitz, and how these teams
could contribute to Sandwich Blitz’s
success.
50% 20
Analysis and Critical Thinking:
Responses demonstrated critical thinking
and analysis and exhibited application of
information.
30% 12
Spelling, Grammar, and Format:
Clear business writing. Spelling and
grammar are acceptable.
Formatting follows instructions.
20% 8
Total 100% 40
Boko Haram, White Paper:
INTL 434 Threat Analysis
Dr. Joe DiRenzo
September 04, 2016
5
Located in northeast Nigeria, Boko Haram is an Islamic terrorist
group that has primarily focused on battling the Nigerian
government. During the year 2002 was when the group was
founded, since then they have been responsible for over five-
thousand murders to date. In addition to the acts of murder that
the group has committed, they have been responsible for the
displacement of close to two million citizens of Nigeria. Both
of these facts propel Boko Haram into the top list of terrorist
organizations in operation today as far as organization and sheer
brutalization. Much support has been given to the Nigerian
government in their fight against the organization, but the
citizens of Nigeria has been outspoken in their accusations that
the government has not been doing enough to combat the threat
(O.A, 2014).
Founded by Mohammed Yusuf, the organization began to
support poor Muslim Families. Their complex was located in
the capital of Borno. Denouncing the “Westernization” of
Nigerian culture and society, he routinely spoke out against the
Nigerian government and the path that Nigeria’s society was
following. There were significant differences in wealth due to
the influx of western policies. Many of the young Nigerian
citizens who were unable to find employment and wealth were
quickly attracted to the cause and rhetoric that Yusuf was
professing. The division of wealth not only lead the rallying
cries of the group, but the division of Christians into the
commonly Muslim society was a stark difference that the group
was able to capitalize on. Both of these differences gave the
group the cause and reason to support their cause and gain a
solid foothold in the Nigerian country.
From the outset, the group was a peaceful movement that found
acceptance in society and the Nigerian government. The focus
that Boko Haram practiced was called al-amr bi-l-ma`ruf was-l-
nahy `an al-munkar, which translated means; enjoining the good
and forbidding the evil (Cook, 2011). Aligning many of the
practices of the group such as rejection of drugs and alcohol,
many followers of Islam found it easy to fall into the same
beliefs and join the group thus swelling the members. As the
group grew the creation of a militant section took place. With
the group growing through the introduction of many Islamic
practitioners, the primary motivation of the group was and is
still the issues of government neglect and the inequalities
between the poor and the wealthy in the country.
The beginnings of Boko Haram’s terrorist activities against the
military and police began during the year of 2004 in Nigeria and
is considered the transition from non-violent to a violent group
(Cook, 2011). After the attacks had begun, many of the
members of Boko Haram were arrested and discovered to be
armed with bomb-making items and heavy weapons. Due to the
arrests there began a period of riots within the Nigeria country
to retaliate against the police including attacking the actual
police stations. In an attempt to suppress the control that Boko
Haram had demonstrated through the riots, the Nigerian
government attacked the headquarters of the group in the largest
use of force the country had ever seen displayed against
terrorists. Over seven-hundred members of Boko Haram were
killed during the assault on the headquarters including the
leader Mohammed Yusuf (Nossiter, 2009). This left control of
the Organization to Abubakar Shekau who was the second in
command of the organization.
The government of Nigeria believed that the threat of Boko
Haram had ended with the death of their leader. A year after
his death the group freed one-hundred and five members from a
prison. After releasing their members, they conducted a
purification agenda and murdered any member of the military or
police as well as any individual that did not share their
ideology. Their attacks remained constant for the next three
years targeting Nigerian government members and local
villages. The attacks spread out of the Nigerian state of Borno
forcing the other Nigerian states to declare a state of emergency
in the year 2013. This allowed the Nigerian military to expand
its attacks on the group; the group maintained control of
territory on the border of Cameroon; this allowed the group the
ability to fall back into the mountains of Cameroon and hide
from military air strikes.
Estimates have the group Boko Haram responsible for at least
ten-thousand people murdered across four states in Nigeria
since the demise of their founder. The funding that the group
receives is intricate and flows from several sources such as
groups with links to al-Qaeda. Many reports of black market
transactions and the mystery international benefactor are also
credited for their funding, but the act of Kidnapping is the most
recognized tool that the group uses to fund itself (McCoy,
2014).
Boko Haram has primarily functioned within the nation of
Nigeria, however with the United States and other countries
supporting efforts against the group with financial backing,
weapons, and training to the Nigerian government; the potential
for the group to strike against United States citizens and the
nation itself is high. Targets of opportunity could be diplomats
in the Nigerian State or neighboring countries. Boko Haram has
known financial links to the Al-Shabaab terrorist group. They
provide funding and training to the group in Somalia (Busari,
2016). Training on how to conduct suicide attacks and direction
on building various explosives is some of the training that the
group receives from Al Shabaab.
Within the past several years the Nigerian government has seen
some success in thwarting Boko Haram. The group has taken to
employing guerilla tactics as they conduct their operations from
the mountains. Some things that the country might be
successful in doing to better combat the group is to consider
some the complaints the group has concerning the methods by
which the country is run. Possibly demonstrating to the public
that the government is attempting to correct a perceived
problem would give them the sympathy over the group with the
citizens of the country.
.
Works Cited
Busari, S. "Boko Haram Training in Somalia: Security Chief
.com." CNN. Last modified February 25, 2016.
http://www.cnn.com/2016/02/25/africa/boko-haram-al-shabaab-
somalia/.
Cook, D. "Boko Haram: a new Islamic state in Nigeria." Last
modified 2014.
"The Economist Explains: Why Nigeria Has Not Yet Defeated
Boko Haram." The Economist. Last modified November 19,
2014. http://www.economist.com/blogs/economist-
explains/2014/11/economist-explains-10.
"Islamist Group With Possible Qaeda Links Upends Nigeria -
The New York Times." The New York Times - Breaking News,
World News & Multimedia. Last modified August 17, 2009.
http://www.nytimes.com/2011/08/18/world/africa/18nigeria.htm
l?_r=0.
Johnson, T. "Boko Haram Narrative." START.umd.edu. Last
modified April 13, 2011.
https://www.start.umd.edu/baad/narratives/boko-haram.
Logan, Keith Gregory. Homeland Security and Intelligence.
Westport, CT: Praeger Security International, 2010.
"This is How Boko Haram Funds Its Evil - The Washington
Post." Washington Post. Last modified June 6, 2014.
https://www.washingtonpost.com/news/morning-
mix/wp/2014/06/06/this-is-how-boko-haram-funds-its-evil/.
12
WHITE PAPER
MID-TERM ASSIGNMENT
APUS-AMU INTL 434 Threat Analysis
Dr. Christopher Merritt
November 15, 2016
Question 1: In what ways is a non-state actor different from a
nation-state? Please be specific and give examples of each to
support your argument.
State and non-state actors play a significant role in the
foreign policy and international relations of a country.
Understanding the differences between the two categories is
required to fully comprehend the importance of the role that
they serve. The reason for the separate and definitive
categorization of the two is because for a long period of time
state actors were considered the main actor when dealing with
foreign policy, while non-state actors (International
Governmental Organizations (IGO), International Non-
Governmental Organizations (INGO), Economic Agents and the
media) were until recently, considered less impactful regarding
foreign policy. The capabilities and flexibilities of non-states
lends to their ability to affect foreign policy and international
relations much more so than traditional states.
Article 1 of the Montevideo Convention of 1930 states that
“The state as a person of international law should possess the
following qualifications: a) a permanent population; b) a
defined territory; c) government; and d) capacity to enter into
relations with the other states.” (1934) There are a multitude of
definitions for state actors, but this particular statement that
was classified in the Montevideo Convention is often considered
the common accepted term. There are several internationally
disputed cases regarding recognition, but it is widely accepted
that a state achieves the status of full recognition after it is
recognized by a substantial number of others and is admitted to
the United Nations. (UN n.d.) Comment by Christopher: Good
While a state is fairly cut and dry, non-states are much
more extensive and as stated above, non-states include IGOs,
INGOs, economic agents and mainstream media organizations.
IGOs are bodies that are founded by formal political agreements
between its members through treaties. IGOs are unique because
they are fully recognized by international law by their
member/host nations but are not treated as resident institutional
entities of the nations where they reside. (Michigan 2008) IGOs
include such organizations as the United Nations Organization
(UNO), European Union (EU), League of Arab States (LAS),
World Trade Organization (WTO), and the North Atlantic
Treaty Organization (NATO). INGOs are often defined as
private, inter-state, non-profit organizations that are comprised
of individuals that are other than representatives of
states/governments. (UIA n.d.) INGOs are often, although not
exclusively, viewed as non-peaceful, non-settled groups that
include terrorist organizations, and religious or ethical groups.
INGOs function as actors in foreign policy predominantly
through their capacity to influence other actors. The capacity
and ability of INGOs to influence international settings and
agendas is widely recognized. INGOs are capable of putting
articles on the agenda, through their actions, of high-power
decision makers. Through their influence in the public view,
they are quite able to provide or disallow legitimacy to plans
and actions agreed upon by international decision makers. Also,
they are advantageous and often imperative for helping
implement the plans/actions agreed to by global decision
makers. (Commonwealth n.d.) Several prominent INGOs
include Amnesty International, Greenpeace, and Doctors
Without Boarders.
Next, economic agents play a significant role as non-state
actors. Although they have ever-expanding international reach
and influence, multinational companies do not enjoy
unregulated and unsupervised power that is often claimed by
critics. The alleged transfer of power from a government to
large corporations is drastically exaggerated and misunderstood.
The fact is that long-term investments combined with new
techniques that allow for transparency and investors to monitor
the performance of companies projects the illusion of
corporations gaining governmental control. However,
companies are involved with international relationships and
actually rely on them perhaps more than ever before. Global
trades and investments have grown more quickly than what has
been yielded. Political barriers have been removed in critical
areas that have opened new avenues for investment, and this has
in-turn created a much higher level of scrutiny and a new
political agenda around issues such as the environment and
human rights violations. As a reply, large international
companies have become much more involved with change,
expansion, and actors of the international system. The most
important thing that must be monitored and ensured is that the
presence and influence of large international companies in these
agendas is for positive change and not political gain or
corporate greed. (Werker, Ahmed 2007)
Lastly, the role of media has become fundamental in
shaping national and international public opinions. The
coverage or lack thereof of certain events transforms the
mindfulness and attitude of public opinion throughout the globe,
which has great potential to influence international actors. The
recent U.S. Presidential Election is a great example. Many
people believe that the coverage by broadcasters such as Fox
News and CNN had a substantial impact on the outcome. It is
important to remember that traditional media outlets are
becoming antiquated and more so replaced by social media type
platforms such as Facebook and Twitter. (Stratton 2008)
Reference
"About UN Membership | United Nations." UN News Center.
Accessed November 13, 2016.
http://www.un.org/en/sections/member-states/about-un-
membership/index.html.
"International Non-governmental Organisations in the
Commonwealth and beyond." International NGOs. Accessed
November 13, 2016.
http://www.commonwealthofnations.org/sectors/civil_society/in
ternational_ngos/.
"LibGuides: International Governmental Organizations (IGOs):
Guide by Organization: Introduction." Introduction. Accessed
November 13, 2016.
http://libguides.lib.msu.edu/internationalgovernmentorganizatio
ns.
"Montevideo Convention on the Rights and Duties of States."
Council on Foreign Relations. Accessed November 13, 2016.
http://www.cfr.org/sovereignty/montevideo-convention-rights-
duties-states/p15897.
Stratton, Trevin. Power Failure: The Diffusion of State Power in
International Relations. PDF. INFINITY JOURNAL,
November/December 2008.
http://graduateinstitute.ch/files/live/sites/iheid/files/sites/intern
ational_history_politics/shared/student_profiles/Publications/Co
pies/Stratton-Power_Failure.pdf
"Union of International Associations." What Is an International
Non-governmental Organization (INGO)? Accessed November
13, 2016. http://www.uia.org/faq/yb4.
Reference Cont’d
Werker, Eric D., and Faisal Z. Ahmed. What Do Non-
Governmental Organizations Do? PDF. Journal of Economic
Perspectives, 2007. http://www.hbs.edu/faculty/Publication
Files/08-041.pdf
Question 2: Why has the Intelligence Community had to adapt
with the end of the Cold War and the emergence of more and
more non-traditional threats to our national security? Please
discuss the differences between how the Intelligence
Community addressed traditional threats and how we have to
approach the problem today with the addition of the non-
traditional threat problem set. Are there any similarities?
The years following the Cold War were times of change,
particularly for the intelligence community. Threats evolved
from large-scale, traditional state actors to non-traditional and
non-state and these new threats forced intelligence agencies to
adjust accordingly. The big, sluggish, easily visible targets of
the Cold War are no longer; rather targets have become much
smaller, fluid, hidden, and nearly shapeless. During the Cold
War enemies were quite easily located and observed, but proved
rather difficult to neutralize. In the new fight the intelligence
community faces, quite the opposite is true. Our new enemies
are difficult to find, even harder to observe, but once found, are
easily terminated. Smaller, non-traditional, non-state targets use
obscurity to their advantage. They demonstrate very low
signatures and signal/noise ratios, and indicators that are not
unique in any manner that is needed to effectively catch the
eyes of intelligence analysts. During the Cold War the majority
of intelligence consumers could be found near the top of the
national security decision-making totem. Nowadays consumers
are expanding to include state/local officials, infrastructure
managers, and at times, private citizens. A lowly security
officer or even a medical professional now may find themselves
with more of a need to know than the POTUS regarding a
particular threat because they may be in a more timely or
critical position to prevent it. (Treverton, 2009) Also,
intelligence during a conventional/traditional war has been
typically collected by higher-ranking intelligence officials and
sections, and then disseminated to subordinates for action.
Presently the militaries of western civilizations are combating
counterinsurgencies where intelligence is being collected and
acted upon by various unit sizes, from a single platoon to an
entire company or battalion. The flow of intelligence has been
reversed in a sense that it is now more of a bottom-up format, as
opposed to top-down, and this change has created a demand for
new ways of approaching information. For over fifty years
intelligence agencies spent their time and devoted their
resources to the development of complex systems of
classification and compartmentalization designed to minimize
Soviet espionage, however, these systems are now precluding
information from being adequately shared in order to tackle a
new breed of enemy, which has no respect for boundaries.
(Herman, 2003) The intelligence community now is forced to
balance its traditional requirements for exclusion with its need
for extended, horizontal networks of information and
knowledge. The linear problem solving methods of the past
simply will not work with today’s time sensitive and wide
spread targets. Today’s targets require continuous and circular
interaction among the collector, the analyst, and the consumer.
Comment by Christopher: Really? We barely caught the
establishment of nuclear missile bases in Cuba, just as one
example. Comment by Christopher: Are you referring to
terrorist organizations?
Intelligence agencies the world over have reformed their
procedures, some faster than others, in response to the new non-
state threat. Middle Eastern security and intelligence agencies
forced Islamist extremists and fundamentalists away from their
lands, thus causing them to realign their efforts to focus more
on the West, or so-called far enemy. (Gerges, 2005) Conversely,
the small and highly mysterious intelligence community of
Britain has learned to use an appropriate amount of force
against the Irish Republican Army (IRA) in a controlled and
reasonable fashion. Additionally, British intelligence agencies
learned just how critical inter-agency cooperation is, so much
so that it is rumored that throughout the entire United Kingdom,
three out of every four attempted terrorist attacks were thwarted
during the mid-1990s. (Security, 1994) The learning and
understanding that took place throughout the 1990s have paid
off substantially for the British intelligence community, and has
made tackling the threat of Islamist terrorists in recent years a
smooth and timely effort. According to several experts, the U.S.
intelligence community has been very slow at adapting to
current threats. Prior to the attacks of September 11, 2001, the
U.S. intelligence community opposed recommendations by
several commissions to overhaul its practices and procedures.
Following the events of Sept. 11, Congress passed legislation
that effectively closed the distanced between local and state law
enforcement agencies and full-scale intelligence agencies.
Although Congress continued to resent the idea of a single,
domestic intelligence agency, it did however receive and accept
assurances from the Federal Bureau of Investigation (FBI) that
they would modify themselves to be able to predict and prevent
acts of terror as opposed to reacting to them as crime scenes
after the fact. Furthermore, Congress went on to create the
Department of Homeland Security (DHS) in 2002 and the
Director of National Intelligence (DNI) in 2004. (Creation,
2016) (History, 2016)e Through all this, U.S. military
intelligence agencies were among the quickest to adapt to
changing threats. The Department of Defense (DoD) found it
easy to work with other federal agencies to form multiple
National Intelligence Support Teams, since they were already
familiar with the concept of joint intelligence, which led to
Joint Intelligence Operations Centers after the turn of the
century. (DoD, 2006) Intelligence operations and aerial
campaigns have become increasingly synchronized; all while
Special Operations Forces have perfected the philosophy of
find, fix, finish, exploit, and analyze (F3EA). (Flynn, 2008) US
para-military forces became vital and truly grew into their roles
after 9/11. Covert teams from the Central Intelligence Agency
(CIA) worked side-by-side with special operations and
indigenous forces through the winter of 2001 and successfully
overthrew the Taliban in a few, short weeks. (War, n.d.) Shortly
thereafter the U.S. Special Operations Command (USSOCOM)
had become the tip-of-the-spear for global operations against
terrorist networks. Operation Neptune Spear, the operation took
down Usama bin Laden in May 2011, demonstrated that the
convert capabilities of the Pentagon since the days of rescuing
American hostages Teheran. (Rawlings, 2012) The exploitation
portion of the F3EA cycle was vital to launching additional
operations following UBL’s death, which created a pattern of
and pathway for success. While conducting sensitive site
exploitation (SSE) following raids during the post 9/11-
counterinsurgency efforts produced large amounts of valuable
intelligence, the majority of information was recovered from
detainees. This is in stark contrast to how defectors and POWs
would voluntarily release valuable information during the Cold
War. Now the challenge is acquiring information from subjects
that are extremely unwilling to speak, in a timely manner. The
find segment of the F3EA cycle is reliant on HUMINT, but
HUMINT from spies, that were recruited from Ivy League
Schools such as Oxford or Yale, and taught to linger around the
embassy crowds was of zero help in the war against terror.
Unlike the need to have few agents that were strategically
placed in high-ranking positions inside closed systems of the
Cold War, focus was put on having a multitude of agents that
are capable of directing their agencies to clandestine terror
cells. In the years following 9/11, the FBI, through cooperation
with state and local law enforcement via Joint Terrorism Task
Forces (JTTF), has prevented several domestic terror plots.
(Joint, n.d.)
Reference
"Creation of the Department of Homeland Security." Creation of
the Department of Homeland Security | Homeland Security.
Accessed November 15, 2016. https://www.dhs.gov/creation-
department-homeland-security.
"DoD to Set Up Joint Intelligence Operations Centers
Worldwide." April 12, 2006. Accessed November 15, 2016.
http://archive.defense.gov/news/newsarticle.aspx?id=15475.
Flynn, Michael T., Rich Juergens, and Thomas L. Cantrell.
Employing ISR: SOF Best Practices. PDF. NDU Press, 2008.
ndupress.ndu.edu.
Herman, Michael. "Counter-Terrorism, Information Technology
and Intelligence Change." Intelligence and National Security 18,
no. 4 (2003). August 4, 2006. Accessed November 15, 2016.
http://www.tandfonline.com/doi/abs/10.1080/026845203100016
93181?journalCode=fint20.
"History." History. Accessed November 15, 2016.
https://www.dni.gov/index.php/about/history.
"Joint Terrorism Task Forces." FBI. Accessed November 15,
2016. https://www.fbi.gov/investigate/terrorism/joint-terrorism-
task-forces.
Miles, Jim. "Why Jihad Went Global." 2009. Accessed
November 15, 2016. http://www.palestinechronicle.com/why-
jihad-went-global-book-review/?print=pdf.
Reference Cont’d
"News And Speeches." Security and Democracy: Is There a
Conflict? | MI5 - The Security Service. June 12, 1994. Accessed
November 15, 2016. https://www.mi5.gov.uk/news/security-
and-democracy-is-there-a-conflict.
Rawlings, Nate. "Operation Neptune Spear: The New Textbook
for Special Operators." Time. May 2, 2012. Accessed November
15, 2016. http://nation.time.com/2012/05/02/operation-neptune-
spear-the-new-textbook-for-special-operators/.
Treverton, Gregory F. Intelligence for an Age of Terror. New
York, NY: Cambridge University Press, 2009. PDF.
"War in Afghanistan (2001-Present)." Accessed November 15,
2016. http://www.saylor.org/site/wp-
content/uploads/2011/06/War-in-Afghanistan-2001-Present.pdf.

More Related Content

Similar to Unit 7 [140 Introduction to Management] Page 1 of 2 .docx

Military and Civil Action in Combating Terrorism in the North East
Military and Civil Action in Combating Terrorism in the North EastMilitary and Civil Action in Combating Terrorism in the North East
Military and Civil Action in Combating Terrorism in the North EastAJHSSR Journal
 
Top 10 Effective Tips To Hire Your Next Essay Writer T
Top 10 Effective Tips To Hire Your Next Essay Writer  TTop 10 Effective Tips To Hire Your Next Essay Writer  T
Top 10 Effective Tips To Hire Your Next Essay Writer TWendy Belieu
 
Running head TECHNOLOGY INFLUENCES1TECHNOLOGY INFLUENCES4.docx
Running head TECHNOLOGY INFLUENCES1TECHNOLOGY INFLUENCES4.docxRunning head TECHNOLOGY INFLUENCES1TECHNOLOGY INFLUENCES4.docx
Running head TECHNOLOGY INFLUENCES1TECHNOLOGY INFLUENCES4.docxtoltonkendal
 
Community Resilience Response to Boko Haram Insurgency in Yobe State
Community Resilience Response to Boko Haram Insurgency in Yobe StateCommunity Resilience Response to Boko Haram Insurgency in Yobe State
Community Resilience Response to Boko Haram Insurgency in Yobe Stateijtsrd
 
Bear Writing Paper - Durdgereport632.Web.Fc2.C
Bear Writing Paper - Durdgereport632.Web.Fc2.CBear Writing Paper - Durdgereport632.Web.Fc2.C
Bear Writing Paper - Durdgereport632.Web.Fc2.CKathryn Harris
 
(PDF) How To Write A Technical Paper. Online assignment writing service.
(PDF) How To Write A Technical Paper. Online assignment writing service.(PDF) How To Write A Technical Paper. Online assignment writing service.
(PDF) How To Write A Technical Paper. Online assignment writing service.Jeanne Hall
 
Running head INTERNAL AND EXTERNAL STAKEHOLDERS .docx
Running head INTERNAL AND EXTERNAL STAKEHOLDERS                  .docxRunning head INTERNAL AND EXTERNAL STAKEHOLDERS                  .docx
Running head INTERNAL AND EXTERNAL STAKEHOLDERS .docxcowinhelen
 
RELIGIOUS EXTREMISM POWER POINT.pptx
RELIGIOUS EXTREMISM POWER POINT.pptxRELIGIOUS EXTREMISM POWER POINT.pptx
RELIGIOUS EXTREMISM POWER POINT.pptxUniversity of Abuja
 
Terrorism in Bangladesh An Overview
Terrorism in Bangladesh An Overview  Terrorism in Bangladesh An Overview
Terrorism in Bangladesh An Overview BANGLADESH POLICE
 
Bokoharmprestheo
BokoharmprestheoBokoharmprestheo
BokoharmprestheoSara Jean
 
How To Write A Good Hook For A College Essay - How To
How To Write A Good Hook For A College Essay - How ToHow To Write A Good Hook For A College Essay - How To
How To Write A Good Hook For A College Essay - How ToKerry Lewis
 
Boko haram assault on nigeria
Boko haram assault on nigeriaBoko haram assault on nigeria
Boko haram assault on nigeriaAlexander Decker
 
The pull of terrorism by banlaoi
The pull of terrorism by banlaoiThe pull of terrorism by banlaoi
The pull of terrorism by banlaoiRommel Banlaoi
 
Foreign influence on the nigerian terror group
Foreign influence on the nigerian terror groupForeign influence on the nigerian terror group
Foreign influence on the nigerian terror groupAlexander Decker
 
Writing Evaluation - Fill And Sign Printable Template O
Writing Evaluation - Fill And Sign Printable Template OWriting Evaluation - Fill And Sign Printable Template O
Writing Evaluation - Fill And Sign Printable Template OVeronica Rogers
 
Capacity Building of the Nigerian Armed Forces and Security Challenges
Capacity Building of the Nigerian Armed Forces and Security ChallengesCapacity Building of the Nigerian Armed Forces and Security Challenges
Capacity Building of the Nigerian Armed Forces and Security Challengesijtsrd
 
The media and war against corruption in nigeria ppt
The media and war against corruption in nigeria pptThe media and war against corruption in nigeria ppt
The media and war against corruption in nigeria pptEmmanuel Nzeaka
 
International Relations MA Dissertation
International Relations MA DissertationInternational Relations MA Dissertation
International Relations MA DissertationMohammed Abdalla
 
Assessing The Influence Of Nigeria’s Peacekeeping Missions On The Country’s I...
Assessing The Influence Of Nigeria’s Peacekeeping Missions On The Country’s I...Assessing The Influence Of Nigeria’s Peacekeeping Missions On The Country’s I...
Assessing The Influence Of Nigeria’s Peacekeeping Missions On The Country’s I...inventionjournals
 

Similar to Unit 7 [140 Introduction to Management] Page 1 of 2 .docx (20)

Military and Civil Action in Combating Terrorism in the North East
Military and Civil Action in Combating Terrorism in the North EastMilitary and Civil Action in Combating Terrorism in the North East
Military and Civil Action in Combating Terrorism in the North East
 
Top 10 Effective Tips To Hire Your Next Essay Writer T
Top 10 Effective Tips To Hire Your Next Essay Writer  TTop 10 Effective Tips To Hire Your Next Essay Writer  T
Top 10 Effective Tips To Hire Your Next Essay Writer T
 
Running head TECHNOLOGY INFLUENCES1TECHNOLOGY INFLUENCES4.docx
Running head TECHNOLOGY INFLUENCES1TECHNOLOGY INFLUENCES4.docxRunning head TECHNOLOGY INFLUENCES1TECHNOLOGY INFLUENCES4.docx
Running head TECHNOLOGY INFLUENCES1TECHNOLOGY INFLUENCES4.docx
 
Community Resilience Response to Boko Haram Insurgency in Yobe State
Community Resilience Response to Boko Haram Insurgency in Yobe StateCommunity Resilience Response to Boko Haram Insurgency in Yobe State
Community Resilience Response to Boko Haram Insurgency in Yobe State
 
Bear Writing Paper - Durdgereport632.Web.Fc2.C
Bear Writing Paper - Durdgereport632.Web.Fc2.CBear Writing Paper - Durdgereport632.Web.Fc2.C
Bear Writing Paper - Durdgereport632.Web.Fc2.C
 
(PDF) How To Write A Technical Paper. Online assignment writing service.
(PDF) How To Write A Technical Paper. Online assignment writing service.(PDF) How To Write A Technical Paper. Online assignment writing service.
(PDF) How To Write A Technical Paper. Online assignment writing service.
 
Running head INTERNAL AND EXTERNAL STAKEHOLDERS .docx
Running head INTERNAL AND EXTERNAL STAKEHOLDERS                  .docxRunning head INTERNAL AND EXTERNAL STAKEHOLDERS                  .docx
Running head INTERNAL AND EXTERNAL STAKEHOLDERS .docx
 
RELIGIOUS EXTREMISM POWER POINT.pptx
RELIGIOUS EXTREMISM POWER POINT.pptxRELIGIOUS EXTREMISM POWER POINT.pptx
RELIGIOUS EXTREMISM POWER POINT.pptx
 
Terrorism in Bangladesh An Overview
Terrorism in Bangladesh An Overview  Terrorism in Bangladesh An Overview
Terrorism in Bangladesh An Overview
 
Bokoharmprestheo
BokoharmprestheoBokoharmprestheo
Bokoharmprestheo
 
How To Write A Good Hook For A College Essay - How To
How To Write A Good Hook For A College Essay - How ToHow To Write A Good Hook For A College Essay - How To
How To Write A Good Hook For A College Essay - How To
 
PDS 614 Assignment
PDS 614 AssignmentPDS 614 Assignment
PDS 614 Assignment
 
Boko haram assault on nigeria
Boko haram assault on nigeriaBoko haram assault on nigeria
Boko haram assault on nigeria
 
The pull of terrorism by banlaoi
The pull of terrorism by banlaoiThe pull of terrorism by banlaoi
The pull of terrorism by banlaoi
 
Foreign influence on the nigerian terror group
Foreign influence on the nigerian terror groupForeign influence on the nigerian terror group
Foreign influence on the nigerian terror group
 
Writing Evaluation - Fill And Sign Printable Template O
Writing Evaluation - Fill And Sign Printable Template OWriting Evaluation - Fill And Sign Printable Template O
Writing Evaluation - Fill And Sign Printable Template O
 
Capacity Building of the Nigerian Armed Forces and Security Challenges
Capacity Building of the Nigerian Armed Forces and Security ChallengesCapacity Building of the Nigerian Armed Forces and Security Challenges
Capacity Building of the Nigerian Armed Forces and Security Challenges
 
The media and war against corruption in nigeria ppt
The media and war against corruption in nigeria pptThe media and war against corruption in nigeria ppt
The media and war against corruption in nigeria ppt
 
International Relations MA Dissertation
International Relations MA DissertationInternational Relations MA Dissertation
International Relations MA Dissertation
 
Assessing The Influence Of Nigeria’s Peacekeeping Missions On The Country’s I...
Assessing The Influence Of Nigeria’s Peacekeeping Missions On The Country’s I...Assessing The Influence Of Nigeria’s Peacekeeping Missions On The Country’s I...
Assessing The Influence Of Nigeria’s Peacekeeping Missions On The Country’s I...
 

More from marilucorr

Cover LetterOne aspect of strategic planning is to develop a str.docx
Cover LetterOne aspect of strategic planning is to develop a str.docxCover LetterOne aspect of strategic planning is to develop a str.docx
Cover LetterOne aspect of strategic planning is to develop a str.docxmarilucorr
 
Cover Letter, Resume, and Portfolio Toussaint Casimir.docx
Cover Letter, Resume, and Portfolio Toussaint Casimir.docxCover Letter, Resume, and Portfolio Toussaint Casimir.docx
Cover Letter, Resume, and Portfolio Toussaint Casimir.docxmarilucorr
 
Cover Executive Summary (mention organization, key ‘out-take.docx
Cover Executive Summary (mention organization, key ‘out-take.docxCover Executive Summary (mention organization, key ‘out-take.docx
Cover Executive Summary (mention organization, key ‘out-take.docxmarilucorr
 
couse name Enterprise risk management  From your research, dis.docx
couse name  Enterprise risk management  From your research, dis.docxcouse name  Enterprise risk management  From your research, dis.docx
couse name Enterprise risk management  From your research, dis.docxmarilucorr
 
Courts have reasoned that hospitals have a duty to reserve their b.docx
Courts have reasoned that hospitals have a duty to reserve their b.docxCourts have reasoned that hospitals have a duty to reserve their b.docx
Courts have reasoned that hospitals have a duty to reserve their b.docxmarilucorr
 
Court Operations and Sentencing GuidelinesPeriodically, se.docx
Court Operations and Sentencing GuidelinesPeriodically, se.docxCourt Operations and Sentencing GuidelinesPeriodically, se.docx
Court Operations and Sentencing GuidelinesPeriodically, se.docxmarilucorr
 
Course Competencies Learning ObjectivesCourse Learning Objectiv.docx
Course Competencies Learning ObjectivesCourse Learning Objectiv.docxCourse Competencies Learning ObjectivesCourse Learning Objectiv.docx
Course Competencies Learning ObjectivesCourse Learning Objectiv.docxmarilucorr
 
Coursework 2 – Presentation Report The aim of this 1000-word r.docx
Coursework 2 – Presentation Report  The aim of this 1000-word r.docxCoursework 2 – Presentation Report  The aim of this 1000-word r.docx
Coursework 2 – Presentation Report The aim of this 1000-word r.docxmarilucorr
 
CourseOverview-MarketingChannelConceptsLecture1.docx
CourseOverview-MarketingChannelConceptsLecture1.docxCourseOverview-MarketingChannelConceptsLecture1.docx
CourseOverview-MarketingChannelConceptsLecture1.docxmarilucorr
 
course-text-booksKeri E. Pearlson_ Carol S. Saunders - Managing.docx
course-text-booksKeri E. Pearlson_ Carol S. Saunders - Managing.docxcourse-text-booksKeri E. Pearlson_ Carol S. Saunders - Managing.docx
course-text-booksKeri E. Pearlson_ Carol S. Saunders - Managing.docxmarilucorr
 
COURSE  InfoTech in a Global Economy Do you feel that countri.docx
COURSE  InfoTech in a Global Economy Do you feel that countri.docxCOURSE  InfoTech in a Global Economy Do you feel that countri.docx
COURSE  InfoTech in a Global Economy Do you feel that countri.docxmarilucorr
 
Course Themes Guide The English 112 course will focus o.docx
Course Themes Guide  The English 112 course will focus o.docxCourse Themes Guide  The English 112 course will focus o.docx
Course Themes Guide The English 112 course will focus o.docxmarilucorr
 
Course SyllabusPrerequisitesThere are no prerequisites for PHI20.docx
Course SyllabusPrerequisitesThere are no prerequisites for PHI20.docxCourse SyllabusPrerequisitesThere are no prerequisites for PHI20.docx
Course SyllabusPrerequisitesThere are no prerequisites for PHI20.docxmarilucorr
 
COURSE SYLLABUSData Analysis and Reporting Spring 2019.docx
COURSE SYLLABUSData Analysis and Reporting Spring 2019.docxCOURSE SYLLABUSData Analysis and Reporting Spring 2019.docx
COURSE SYLLABUSData Analysis and Reporting Spring 2019.docxmarilucorr
 
COURSE SYLLABUS ADDENDUM INTEGRATED CASE ANALYSIS CRITERIA.docx
COURSE SYLLABUS ADDENDUM INTEGRATED CASE ANALYSIS CRITERIA.docxCOURSE SYLLABUS ADDENDUM INTEGRATED CASE ANALYSIS CRITERIA.docx
COURSE SYLLABUS ADDENDUM INTEGRATED CASE ANALYSIS CRITERIA.docxmarilucorr
 
Course SuccessHabits Matter1. Professors are influenced by you.docx
Course SuccessHabits Matter1. Professors are influenced by you.docxCourse SuccessHabits Matter1. Professors are influenced by you.docx
Course SuccessHabits Matter1. Professors are influenced by you.docxmarilucorr
 
Course ScenarioYou have been hired as the Human Resources Di.docx
Course ScenarioYou have been hired as the Human Resources Di.docxCourse ScenarioYou have been hired as the Human Resources Di.docx
Course ScenarioYou have been hired as the Human Resources Di.docxmarilucorr
 
Course ScenarioPresently, your multinational organization us.docx
Course ScenarioPresently, your multinational organization us.docxCourse ScenarioPresently, your multinational organization us.docx
Course ScenarioPresently, your multinational organization us.docxmarilucorr
 
COURSE RTM 300 (Recreation and Community Development (V. Ward)).docx
COURSE RTM 300 (Recreation and Community Development (V. Ward)).docxCOURSE RTM 300 (Recreation and Community Development (V. Ward)).docx
COURSE RTM 300 (Recreation and Community Development (V. Ward)).docxmarilucorr
 
Course Retail ManagementPart1DraftPart2Fin.docx
Course Retail ManagementPart1DraftPart2Fin.docxCourse Retail ManagementPart1DraftPart2Fin.docx
Course Retail ManagementPart1DraftPart2Fin.docxmarilucorr
 

More from marilucorr (20)

Cover LetterOne aspect of strategic planning is to develop a str.docx
Cover LetterOne aspect of strategic planning is to develop a str.docxCover LetterOne aspect of strategic planning is to develop a str.docx
Cover LetterOne aspect of strategic planning is to develop a str.docx
 
Cover Letter, Resume, and Portfolio Toussaint Casimir.docx
Cover Letter, Resume, and Portfolio Toussaint Casimir.docxCover Letter, Resume, and Portfolio Toussaint Casimir.docx
Cover Letter, Resume, and Portfolio Toussaint Casimir.docx
 
Cover Executive Summary (mention organization, key ‘out-take.docx
Cover Executive Summary (mention organization, key ‘out-take.docxCover Executive Summary (mention organization, key ‘out-take.docx
Cover Executive Summary (mention organization, key ‘out-take.docx
 
couse name Enterprise risk management  From your research, dis.docx
couse name  Enterprise risk management  From your research, dis.docxcouse name  Enterprise risk management  From your research, dis.docx
couse name Enterprise risk management  From your research, dis.docx
 
Courts have reasoned that hospitals have a duty to reserve their b.docx
Courts have reasoned that hospitals have a duty to reserve their b.docxCourts have reasoned that hospitals have a duty to reserve their b.docx
Courts have reasoned that hospitals have a duty to reserve their b.docx
 
Court Operations and Sentencing GuidelinesPeriodically, se.docx
Court Operations and Sentencing GuidelinesPeriodically, se.docxCourt Operations and Sentencing GuidelinesPeriodically, se.docx
Court Operations and Sentencing GuidelinesPeriodically, se.docx
 
Course Competencies Learning ObjectivesCourse Learning Objectiv.docx
Course Competencies Learning ObjectivesCourse Learning Objectiv.docxCourse Competencies Learning ObjectivesCourse Learning Objectiv.docx
Course Competencies Learning ObjectivesCourse Learning Objectiv.docx
 
Coursework 2 – Presentation Report The aim of this 1000-word r.docx
Coursework 2 – Presentation Report  The aim of this 1000-word r.docxCoursework 2 – Presentation Report  The aim of this 1000-word r.docx
Coursework 2 – Presentation Report The aim of this 1000-word r.docx
 
CourseOverview-MarketingChannelConceptsLecture1.docx
CourseOverview-MarketingChannelConceptsLecture1.docxCourseOverview-MarketingChannelConceptsLecture1.docx
CourseOverview-MarketingChannelConceptsLecture1.docx
 
course-text-booksKeri E. Pearlson_ Carol S. Saunders - Managing.docx
course-text-booksKeri E. Pearlson_ Carol S. Saunders - Managing.docxcourse-text-booksKeri E. Pearlson_ Carol S. Saunders - Managing.docx
course-text-booksKeri E. Pearlson_ Carol S. Saunders - Managing.docx
 
COURSE  InfoTech in a Global Economy Do you feel that countri.docx
COURSE  InfoTech in a Global Economy Do you feel that countri.docxCOURSE  InfoTech in a Global Economy Do you feel that countri.docx
COURSE  InfoTech in a Global Economy Do you feel that countri.docx
 
Course Themes Guide The English 112 course will focus o.docx
Course Themes Guide  The English 112 course will focus o.docxCourse Themes Guide  The English 112 course will focus o.docx
Course Themes Guide The English 112 course will focus o.docx
 
Course SyllabusPrerequisitesThere are no prerequisites for PHI20.docx
Course SyllabusPrerequisitesThere are no prerequisites for PHI20.docxCourse SyllabusPrerequisitesThere are no prerequisites for PHI20.docx
Course SyllabusPrerequisitesThere are no prerequisites for PHI20.docx
 
COURSE SYLLABUSData Analysis and Reporting Spring 2019.docx
COURSE SYLLABUSData Analysis and Reporting Spring 2019.docxCOURSE SYLLABUSData Analysis and Reporting Spring 2019.docx
COURSE SYLLABUSData Analysis and Reporting Spring 2019.docx
 
COURSE SYLLABUS ADDENDUM INTEGRATED CASE ANALYSIS CRITERIA.docx
COURSE SYLLABUS ADDENDUM INTEGRATED CASE ANALYSIS CRITERIA.docxCOURSE SYLLABUS ADDENDUM INTEGRATED CASE ANALYSIS CRITERIA.docx
COURSE SYLLABUS ADDENDUM INTEGRATED CASE ANALYSIS CRITERIA.docx
 
Course SuccessHabits Matter1. Professors are influenced by you.docx
Course SuccessHabits Matter1. Professors are influenced by you.docxCourse SuccessHabits Matter1. Professors are influenced by you.docx
Course SuccessHabits Matter1. Professors are influenced by you.docx
 
Course ScenarioYou have been hired as the Human Resources Di.docx
Course ScenarioYou have been hired as the Human Resources Di.docxCourse ScenarioYou have been hired as the Human Resources Di.docx
Course ScenarioYou have been hired as the Human Resources Di.docx
 
Course ScenarioPresently, your multinational organization us.docx
Course ScenarioPresently, your multinational organization us.docxCourse ScenarioPresently, your multinational organization us.docx
Course ScenarioPresently, your multinational organization us.docx
 
COURSE RTM 300 (Recreation and Community Development (V. Ward)).docx
COURSE RTM 300 (Recreation and Community Development (V. Ward)).docxCOURSE RTM 300 (Recreation and Community Development (V. Ward)).docx
COURSE RTM 300 (Recreation and Community Development (V. Ward)).docx
 
Course Retail ManagementPart1DraftPart2Fin.docx
Course Retail ManagementPart1DraftPart2Fin.docxCourse Retail ManagementPart1DraftPart2Fin.docx
Course Retail ManagementPart1DraftPart2Fin.docx
 

Recently uploaded

Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 

Unit 7 [140 Introduction to Management] Page 1 of 2 .docx

  • 1. Unit 7 [140: Introduction to Management] Page 1 of 2 Assignment Details and Rubric This week's Assignment consists of reading a scenario about Sandwich Blitz, Inc. and writing about how self-managed teams could be used at Sandwich Blitz to allow Dalman more time to devote to growing the business. Lately, Dalman has mostly been visiting the operating locations and addressing manager operations concerns. Lei has concentrated on financial matters. Both Dalman and Lei are pleased with Sandwich Blitz’s past performance but feel that they are each unable to devote their time and energy to take the business to the next level. All of their time seems to be spent addressing small problems within the existing operation. Dalman has heard that other businesses have successfully used a team approach to managing with good results and wonders if this could help him as well as the location managers. After reading the scenario above, the section on “Self-managed Teams” in your assigned textbook
  • 2. readings and completing the practice Learning Activities, type a paper in which you explain the difference between traditional and team work environments, how self-managed teams could be successfully implemented at Sandwich Blitz, and how these teams could contribute to Sandwich Blitz’s success. This Assignment addresses the following unit outcomes: ● Distinguish between traditional versus team environments. ● Describe how teams contribute to an organization’s effectiveness. ● Explain how an effective team is built. Submission Instructions: Draft your Assignment paper at least 2 full double-spaced pages in length, using size 12 point font in MS Word format. Be sure your paper is well written in paragraph form, with correct spelling, grammar, and punctuation. Be sure to name your file according to the Kaplan file-naming convention. You may use external sources in addition to the required unit readings. Cite any external sources used. Unit 7 [140: Introduction to Management]
  • 3. Page 2 of 2 Submit as an attachment to the Unit 7 Assignment Dropbox for grading before the close of the unit. AB140 Unit 7 Grading Rubric Percentage Possible Points Content, Focus, Use of Text and Research:Explain the difference between traditional and team work environments, how self-managed teams could be successfully implemented at Sandwich Blitz, and how these teams could contribute to Sandwich Blitz’s success. 50% 20 Analysis and Critical Thinking: Responses demonstrated critical thinking and analysis and exhibited application of information. 30% 12 Spelling, Grammar, and Format: Clear business writing. Spelling and grammar are acceptable.
  • 4. Formatting follows instructions. 20% 8 Total 100% 40 Boko Haram, White Paper: INTL 434 Threat Analysis Dr. Joe DiRenzo September 04, 2016 5
  • 5. Located in northeast Nigeria, Boko Haram is an Islamic terrorist group that has primarily focused on battling the Nigerian government. During the year 2002 was when the group was founded, since then they have been responsible for over five- thousand murders to date. In addition to the acts of murder that the group has committed, they have been responsible for the displacement of close to two million citizens of Nigeria. Both of these facts propel Boko Haram into the top list of terrorist organizations in operation today as far as organization and sheer brutalization. Much support has been given to the Nigerian government in their fight against the organization, but the citizens of Nigeria has been outspoken in their accusations that the government has not been doing enough to combat the threat (O.A, 2014). Founded by Mohammed Yusuf, the organization began to support poor Muslim Families. Their complex was located in the capital of Borno. Denouncing the “Westernization” of Nigerian culture and society, he routinely spoke out against the Nigerian government and the path that Nigeria’s society was following. There were significant differences in wealth due to the influx of western policies. Many of the young Nigerian citizens who were unable to find employment and wealth were quickly attracted to the cause and rhetoric that Yusuf was professing. The division of wealth not only lead the rallying cries of the group, but the division of Christians into the commonly Muslim society was a stark difference that the group was able to capitalize on. Both of these differences gave the group the cause and reason to support their cause and gain a solid foothold in the Nigerian country. From the outset, the group was a peaceful movement that found acceptance in society and the Nigerian government. The focus that Boko Haram practiced was called al-amr bi-l-ma`ruf was-l- nahy `an al-munkar, which translated means; enjoining the good and forbidding the evil (Cook, 2011). Aligning many of the practices of the group such as rejection of drugs and alcohol,
  • 6. many followers of Islam found it easy to fall into the same beliefs and join the group thus swelling the members. As the group grew the creation of a militant section took place. With the group growing through the introduction of many Islamic practitioners, the primary motivation of the group was and is still the issues of government neglect and the inequalities between the poor and the wealthy in the country. The beginnings of Boko Haram’s terrorist activities against the military and police began during the year of 2004 in Nigeria and is considered the transition from non-violent to a violent group (Cook, 2011). After the attacks had begun, many of the members of Boko Haram were arrested and discovered to be armed with bomb-making items and heavy weapons. Due to the arrests there began a period of riots within the Nigeria country to retaliate against the police including attacking the actual police stations. In an attempt to suppress the control that Boko Haram had demonstrated through the riots, the Nigerian government attacked the headquarters of the group in the largest use of force the country had ever seen displayed against terrorists. Over seven-hundred members of Boko Haram were killed during the assault on the headquarters including the leader Mohammed Yusuf (Nossiter, 2009). This left control of the Organization to Abubakar Shekau who was the second in command of the organization. The government of Nigeria believed that the threat of Boko Haram had ended with the death of their leader. A year after his death the group freed one-hundred and five members from a prison. After releasing their members, they conducted a purification agenda and murdered any member of the military or police as well as any individual that did not share their ideology. Their attacks remained constant for the next three years targeting Nigerian government members and local villages. The attacks spread out of the Nigerian state of Borno forcing the other Nigerian states to declare a state of emergency in the year 2013. This allowed the Nigerian military to expand its attacks on the group; the group maintained control of
  • 7. territory on the border of Cameroon; this allowed the group the ability to fall back into the mountains of Cameroon and hide from military air strikes. Estimates have the group Boko Haram responsible for at least ten-thousand people murdered across four states in Nigeria since the demise of their founder. The funding that the group receives is intricate and flows from several sources such as groups with links to al-Qaeda. Many reports of black market transactions and the mystery international benefactor are also credited for their funding, but the act of Kidnapping is the most recognized tool that the group uses to fund itself (McCoy, 2014). Boko Haram has primarily functioned within the nation of Nigeria, however with the United States and other countries supporting efforts against the group with financial backing, weapons, and training to the Nigerian government; the potential for the group to strike against United States citizens and the nation itself is high. Targets of opportunity could be diplomats in the Nigerian State or neighboring countries. Boko Haram has known financial links to the Al-Shabaab terrorist group. They provide funding and training to the group in Somalia (Busari, 2016). Training on how to conduct suicide attacks and direction on building various explosives is some of the training that the group receives from Al Shabaab. Within the past several years the Nigerian government has seen some success in thwarting Boko Haram. The group has taken to employing guerilla tactics as they conduct their operations from the mountains. Some things that the country might be successful in doing to better combat the group is to consider some the complaints the group has concerning the methods by which the country is run. Possibly demonstrating to the public that the government is attempting to correct a perceived problem would give them the sympathy over the group with the citizens of the country. .
  • 8. Works Cited Busari, S. "Boko Haram Training in Somalia: Security Chief .com." CNN. Last modified February 25, 2016. http://www.cnn.com/2016/02/25/africa/boko-haram-al-shabaab- somalia/. Cook, D. "Boko Haram: a new Islamic state in Nigeria." Last modified 2014. "The Economist Explains: Why Nigeria Has Not Yet Defeated Boko Haram." The Economist. Last modified November 19, 2014. http://www.economist.com/blogs/economist- explains/2014/11/economist-explains-10. "Islamist Group With Possible Qaeda Links Upends Nigeria - The New York Times." The New York Times - Breaking News, World News & Multimedia. Last modified August 17, 2009. http://www.nytimes.com/2011/08/18/world/africa/18nigeria.htm l?_r=0. Johnson, T. "Boko Haram Narrative." START.umd.edu. Last modified April 13, 2011. https://www.start.umd.edu/baad/narratives/boko-haram. Logan, Keith Gregory. Homeland Security and Intelligence. Westport, CT: Praeger Security International, 2010. "This is How Boko Haram Funds Its Evil - The Washington Post." Washington Post. Last modified June 6, 2014. https://www.washingtonpost.com/news/morning- mix/wp/2014/06/06/this-is-how-boko-haram-funds-its-evil/. 12
  • 9. WHITE PAPER MID-TERM ASSIGNMENT APUS-AMU INTL 434 Threat Analysis Dr. Christopher Merritt November 15, 2016 Question 1: In what ways is a non-state actor different from a nation-state? Please be specific and give examples of each to support your argument. State and non-state actors play a significant role in the foreign policy and international relations of a country. Understanding the differences between the two categories is required to fully comprehend the importance of the role that they serve. The reason for the separate and definitive categorization of the two is because for a long period of time state actors were considered the main actor when dealing with foreign policy, while non-state actors (International Governmental Organizations (IGO), International Non- Governmental Organizations (INGO), Economic Agents and the media) were until recently, considered less impactful regarding
  • 10. foreign policy. The capabilities and flexibilities of non-states lends to their ability to affect foreign policy and international relations much more so than traditional states. Article 1 of the Montevideo Convention of 1930 states that “The state as a person of international law should possess the following qualifications: a) a permanent population; b) a defined territory; c) government; and d) capacity to enter into relations with the other states.” (1934) There are a multitude of definitions for state actors, but this particular statement that was classified in the Montevideo Convention is often considered the common accepted term. There are several internationally disputed cases regarding recognition, but it is widely accepted that a state achieves the status of full recognition after it is recognized by a substantial number of others and is admitted to the United Nations. (UN n.d.) Comment by Christopher: Good While a state is fairly cut and dry, non-states are much more extensive and as stated above, non-states include IGOs, INGOs, economic agents and mainstream media organizations. IGOs are bodies that are founded by formal political agreements between its members through treaties. IGOs are unique because they are fully recognized by international law by their member/host nations but are not treated as resident institutional entities of the nations where they reside. (Michigan 2008) IGOs include such organizations as the United Nations Organization (UNO), European Union (EU), League of Arab States (LAS), World Trade Organization (WTO), and the North Atlantic Treaty Organization (NATO). INGOs are often defined as private, inter-state, non-profit organizations that are comprised of individuals that are other than representatives of states/governments. (UIA n.d.) INGOs are often, although not exclusively, viewed as non-peaceful, non-settled groups that include terrorist organizations, and religious or ethical groups. INGOs function as actors in foreign policy predominantly through their capacity to influence other actors. The capacity and ability of INGOs to influence international settings and agendas is widely recognized. INGOs are capable of putting
  • 11. articles on the agenda, through their actions, of high-power decision makers. Through their influence in the public view, they are quite able to provide or disallow legitimacy to plans and actions agreed upon by international decision makers. Also, they are advantageous and often imperative for helping implement the plans/actions agreed to by global decision makers. (Commonwealth n.d.) Several prominent INGOs include Amnesty International, Greenpeace, and Doctors Without Boarders. Next, economic agents play a significant role as non-state actors. Although they have ever-expanding international reach and influence, multinational companies do not enjoy unregulated and unsupervised power that is often claimed by critics. The alleged transfer of power from a government to large corporations is drastically exaggerated and misunderstood. The fact is that long-term investments combined with new techniques that allow for transparency and investors to monitor the performance of companies projects the illusion of corporations gaining governmental control. However, companies are involved with international relationships and actually rely on them perhaps more than ever before. Global trades and investments have grown more quickly than what has been yielded. Political barriers have been removed in critical areas that have opened new avenues for investment, and this has in-turn created a much higher level of scrutiny and a new political agenda around issues such as the environment and human rights violations. As a reply, large international companies have become much more involved with change, expansion, and actors of the international system. The most important thing that must be monitored and ensured is that the presence and influence of large international companies in these agendas is for positive change and not political gain or corporate greed. (Werker, Ahmed 2007) Lastly, the role of media has become fundamental in shaping national and international public opinions. The coverage or lack thereof of certain events transforms the
  • 12. mindfulness and attitude of public opinion throughout the globe, which has great potential to influence international actors. The recent U.S. Presidential Election is a great example. Many people believe that the coverage by broadcasters such as Fox News and CNN had a substantial impact on the outcome. It is important to remember that traditional media outlets are becoming antiquated and more so replaced by social media type platforms such as Facebook and Twitter. (Stratton 2008) Reference "About UN Membership | United Nations." UN News Center. Accessed November 13, 2016. http://www.un.org/en/sections/member-states/about-un- membership/index.html. "International Non-governmental Organisations in the Commonwealth and beyond." International NGOs. Accessed November 13, 2016. http://www.commonwealthofnations.org/sectors/civil_society/in ternational_ngos/. "LibGuides: International Governmental Organizations (IGOs): Guide by Organization: Introduction." Introduction. Accessed November 13, 2016. http://libguides.lib.msu.edu/internationalgovernmentorganizatio ns. "Montevideo Convention on the Rights and Duties of States." Council on Foreign Relations. Accessed November 13, 2016. http://www.cfr.org/sovereignty/montevideo-convention-rights- duties-states/p15897. Stratton, Trevin. Power Failure: The Diffusion of State Power in International Relations. PDF. INFINITY JOURNAL, November/December 2008. http://graduateinstitute.ch/files/live/sites/iheid/files/sites/intern ational_history_politics/shared/student_profiles/Publications/Co
  • 13. pies/Stratton-Power_Failure.pdf "Union of International Associations." What Is an International Non-governmental Organization (INGO)? Accessed November 13, 2016. http://www.uia.org/faq/yb4. Reference Cont’d Werker, Eric D., and Faisal Z. Ahmed. What Do Non- Governmental Organizations Do? PDF. Journal of Economic Perspectives, 2007. http://www.hbs.edu/faculty/Publication Files/08-041.pdf Question 2: Why has the Intelligence Community had to adapt with the end of the Cold War and the emergence of more and more non-traditional threats to our national security? Please discuss the differences between how the Intelligence Community addressed traditional threats and how we have to approach the problem today with the addition of the non- traditional threat problem set. Are there any similarities? The years following the Cold War were times of change, particularly for the intelligence community. Threats evolved from large-scale, traditional state actors to non-traditional and non-state and these new threats forced intelligence agencies to adjust accordingly. The big, sluggish, easily visible targets of the Cold War are no longer; rather targets have become much smaller, fluid, hidden, and nearly shapeless. During the Cold
  • 14. War enemies were quite easily located and observed, but proved rather difficult to neutralize. In the new fight the intelligence community faces, quite the opposite is true. Our new enemies are difficult to find, even harder to observe, but once found, are easily terminated. Smaller, non-traditional, non-state targets use obscurity to their advantage. They demonstrate very low signatures and signal/noise ratios, and indicators that are not unique in any manner that is needed to effectively catch the eyes of intelligence analysts. During the Cold War the majority of intelligence consumers could be found near the top of the national security decision-making totem. Nowadays consumers are expanding to include state/local officials, infrastructure managers, and at times, private citizens. A lowly security officer or even a medical professional now may find themselves with more of a need to know than the POTUS regarding a particular threat because they may be in a more timely or critical position to prevent it. (Treverton, 2009) Also, intelligence during a conventional/traditional war has been typically collected by higher-ranking intelligence officials and sections, and then disseminated to subordinates for action. Presently the militaries of western civilizations are combating counterinsurgencies where intelligence is being collected and acted upon by various unit sizes, from a single platoon to an entire company or battalion. The flow of intelligence has been reversed in a sense that it is now more of a bottom-up format, as opposed to top-down, and this change has created a demand for new ways of approaching information. For over fifty years intelligence agencies spent their time and devoted their resources to the development of complex systems of classification and compartmentalization designed to minimize Soviet espionage, however, these systems are now precluding information from being adequately shared in order to tackle a new breed of enemy, which has no respect for boundaries. (Herman, 2003) The intelligence community now is forced to balance its traditional requirements for exclusion with its need for extended, horizontal networks of information and
  • 15. knowledge. The linear problem solving methods of the past simply will not work with today’s time sensitive and wide spread targets. Today’s targets require continuous and circular interaction among the collector, the analyst, and the consumer. Comment by Christopher: Really? We barely caught the establishment of nuclear missile bases in Cuba, just as one example. Comment by Christopher: Are you referring to terrorist organizations? Intelligence agencies the world over have reformed their procedures, some faster than others, in response to the new non- state threat. Middle Eastern security and intelligence agencies forced Islamist extremists and fundamentalists away from their lands, thus causing them to realign their efforts to focus more on the West, or so-called far enemy. (Gerges, 2005) Conversely, the small and highly mysterious intelligence community of Britain has learned to use an appropriate amount of force against the Irish Republican Army (IRA) in a controlled and reasonable fashion. Additionally, British intelligence agencies learned just how critical inter-agency cooperation is, so much so that it is rumored that throughout the entire United Kingdom, three out of every four attempted terrorist attacks were thwarted during the mid-1990s. (Security, 1994) The learning and understanding that took place throughout the 1990s have paid off substantially for the British intelligence community, and has made tackling the threat of Islamist terrorists in recent years a smooth and timely effort. According to several experts, the U.S. intelligence community has been very slow at adapting to current threats. Prior to the attacks of September 11, 2001, the U.S. intelligence community opposed recommendations by several commissions to overhaul its practices and procedures. Following the events of Sept. 11, Congress passed legislation that effectively closed the distanced between local and state law enforcement agencies and full-scale intelligence agencies. Although Congress continued to resent the idea of a single, domestic intelligence agency, it did however receive and accept assurances from the Federal Bureau of Investigation (FBI) that
  • 16. they would modify themselves to be able to predict and prevent acts of terror as opposed to reacting to them as crime scenes after the fact. Furthermore, Congress went on to create the Department of Homeland Security (DHS) in 2002 and the Director of National Intelligence (DNI) in 2004. (Creation, 2016) (History, 2016)e Through all this, U.S. military intelligence agencies were among the quickest to adapt to changing threats. The Department of Defense (DoD) found it easy to work with other federal agencies to form multiple National Intelligence Support Teams, since they were already familiar with the concept of joint intelligence, which led to Joint Intelligence Operations Centers after the turn of the century. (DoD, 2006) Intelligence operations and aerial campaigns have become increasingly synchronized; all while Special Operations Forces have perfected the philosophy of find, fix, finish, exploit, and analyze (F3EA). (Flynn, 2008) US para-military forces became vital and truly grew into their roles after 9/11. Covert teams from the Central Intelligence Agency (CIA) worked side-by-side with special operations and indigenous forces through the winter of 2001 and successfully overthrew the Taliban in a few, short weeks. (War, n.d.) Shortly thereafter the U.S. Special Operations Command (USSOCOM) had become the tip-of-the-spear for global operations against terrorist networks. Operation Neptune Spear, the operation took down Usama bin Laden in May 2011, demonstrated that the convert capabilities of the Pentagon since the days of rescuing American hostages Teheran. (Rawlings, 2012) The exploitation portion of the F3EA cycle was vital to launching additional operations following UBL’s death, which created a pattern of and pathway for success. While conducting sensitive site exploitation (SSE) following raids during the post 9/11- counterinsurgency efforts produced large amounts of valuable intelligence, the majority of information was recovered from detainees. This is in stark contrast to how defectors and POWs would voluntarily release valuable information during the Cold War. Now the challenge is acquiring information from subjects
  • 17. that are extremely unwilling to speak, in a timely manner. The find segment of the F3EA cycle is reliant on HUMINT, but HUMINT from spies, that were recruited from Ivy League Schools such as Oxford or Yale, and taught to linger around the embassy crowds was of zero help in the war against terror. Unlike the need to have few agents that were strategically placed in high-ranking positions inside closed systems of the Cold War, focus was put on having a multitude of agents that are capable of directing their agencies to clandestine terror cells. In the years following 9/11, the FBI, through cooperation with state and local law enforcement via Joint Terrorism Task Forces (JTTF), has prevented several domestic terror plots. (Joint, n.d.) Reference "Creation of the Department of Homeland Security." Creation of the Department of Homeland Security | Homeland Security. Accessed November 15, 2016. https://www.dhs.gov/creation- department-homeland-security. "DoD to Set Up Joint Intelligence Operations Centers Worldwide." April 12, 2006. Accessed November 15, 2016. http://archive.defense.gov/news/newsarticle.aspx?id=15475. Flynn, Michael T., Rich Juergens, and Thomas L. Cantrell. Employing ISR: SOF Best Practices. PDF. NDU Press, 2008. ndupress.ndu.edu. Herman, Michael. "Counter-Terrorism, Information Technology and Intelligence Change." Intelligence and National Security 18, no. 4 (2003). August 4, 2006. Accessed November 15, 2016. http://www.tandfonline.com/doi/abs/10.1080/026845203100016 93181?journalCode=fint20. "History." History. Accessed November 15, 2016. https://www.dni.gov/index.php/about/history. "Joint Terrorism Task Forces." FBI. Accessed November 15,
  • 18. 2016. https://www.fbi.gov/investigate/terrorism/joint-terrorism- task-forces. Miles, Jim. "Why Jihad Went Global." 2009. Accessed November 15, 2016. http://www.palestinechronicle.com/why- jihad-went-global-book-review/?print=pdf. Reference Cont’d "News And Speeches." Security and Democracy: Is There a Conflict? | MI5 - The Security Service. June 12, 1994. Accessed November 15, 2016. https://www.mi5.gov.uk/news/security- and-democracy-is-there-a-conflict. Rawlings, Nate. "Operation Neptune Spear: The New Textbook for Special Operators." Time. May 2, 2012. Accessed November 15, 2016. http://nation.time.com/2012/05/02/operation-neptune- spear-the-new-textbook-for-special-operators/. Treverton, Gregory F. Intelligence for an Age of Terror. New York, NY: Cambridge University Press, 2009. PDF. "War in Afghanistan (2001-Present)." Accessed November 15, 2016. http://www.saylor.org/site/wp- content/uploads/2011/06/War-in-Afghanistan-2001-Present.pdf.