100% (1)
Pages:
6 pages/≈1650 words
Sources:
-1
Style:
APA
Subject:
Creative Writing
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 24.3
Topic:

INTL 507 Assignment 2: Securing the Integrity of Intelligence

Essay Instructions:

Turnitin® enabledThis assignment will be submitted to Turnitin®.

Instructions

Instructions:



Within INTL502 you are required to develop a literature review. In this case, it should relate to the issue you identified in your white paper assignments. A literature review sets the context for a subject by explaining what others have found in researching the same or similar issues. It is written in a narrative format. NOTE: Literature reviews can be a bit tricky to write. Check out this video to help you further prepare to write this section of your proposal. This will not be the last time that you are asked to write a literature review in your academic career so its important to master this skill.



Title Page. Ensure you include your title, student name, date of submission.



Introductory Paragraph. A literature review begins with an introductory paragraph in which the writer frames the research topic and its significance, and the puzzle that the researcher is addressing. To do that, the writer will summarize the major relevant arguments on the research subject, highlighting the main issues and how schools of thought might differ. If there are key terms to be defined, the writer should do that here. (1-2 pages).



Body. The body of the literature review tells readers what others have found in their studies about your specific research question (the extent of the current existing knowledge on your specific research question), critiques what is right or wrong (or doesn't go far enough) with these other studies, and discusses how the work is distinguishable from the research study you are proposing. Your review should organize the material by theme or method as it makes sense for your project. This literature review should include a critical review of 10-15 or more appropriate articles, to include scholarly, peer-reviewed articles, material from government publications and reputable websites, or other topic-appropriate sources. (4-5 pages)



Conclusion. The conclusions should summarize the primary "sense of the literature," encapsulating for the reader where the existing literature ends and your research will state as you seek to answer the question that still remains and add to the body of knowledge. (1 page)



References. Provide a "References" list on a separate page at the end of your literature review. The only sources that appear on this list should be the ones you actually make reference to within your paper. Your references should be in Turabian author-date style format.



You are encouraged to refer to Belcher, Wendy Laura. 2009. "Editing Your Sentences." In Writing Your Journal Article in 12 Weeks: A Guide to Academic Publishing Success. Sage. This resource has an excellent step-by-step process for enhancing your writing. Additionally, you should refer to the University of Purdue's Online Writing Lab (OWL) to find out more about writing a white paper.



Submission Instructions:



Submit your literature review under "Assignment 2: Literature Review," as a word document. Once uploaded, your assignment will be submitted to "Turnitin." Due Sunday, 11:55pm EST at the end of Week 5.

Essay Sample Content Preview:

Securing the Integrity of Intelligence
Student’s Name
Institutional Affiliation
Securing the Integrity of Intelligence
The intelligence community remains a vital component of global security currently. The world faces attack threats from multiple sources including drug cartels, terrorists, and cyber-attackers. More people are wary of their security, privacy, and confidentiality because malicious people are always preying on private pieces of information. The challenges that people face on their private pieces of information and confidentiality extend to the national intelligence agencies. Such agencies face constant threats of losing the information that they harbor. The value of such pieces of information is enhanced with the fact that more people demand secrets to evade law enforcement agencies. Securing the integrity of intelligence should be a priority for the intelligence community because any failures can lead to serious safety failures.
Theoretical Framework
The intelligence analysis theory is one of the dominant theoretical frameworks when it comes to addressing the integrity of intelligence. The intelligence analysis theory explores the value of intelligence and various bases that constitute national and international intelligence (Sheftick, 2020). On the grounds of IAT, it has been established that security intelligence is becoming one of the most vital elements of security in contemporary society. The theory emphasizes intelligence as a detailed process that constitutes data collection, analysis, classification, storage, and application in covert operations. With little intelligence, nations can be more susceptible to attacks including terror attacks or cyberattacks aimed at breaching sensitive pieces of information.
The intelligence analysis theory is vital to understanding how to secure the integrity of intelligence in various ways. The theory emphasizes proper inputs in the key elements of intelligence including data collection, analyses, and storage as they affect the integrity of intelligence. For instance, if proper data is not collected, it is impossible to reach the apex of intelligence needs. Poor data analyses also devalue intelligence. At the same time, improper storage of intelligence creates a platform for malicious attacks. With this theory, it becomes easier to understand the extent that the intelligence community must explore to match the needed index of the integrity of intelligence. With this theory, the study is guided on elements including the key elements of the integrity of intelligence, impacts of failing to secure the integrity of intelligence, and the recommendations to reach the required integrity outcomes in intelligence.
The Integrity of Intelligence
The value of intelligence harbored by different agencies stems from the integrity that such pieces of information command. The integrity of intelligence is a concept that demands the custody of intelligence by the right individuals at the required times (Sheftick, 2020). Only specific people should bear some pieces of intelligence at specific times. In different security agencies, the information on various security issues is shared according to the seniority of the stakeholders. That is, integrity begins with trust among individuals and agencies. Those who can be trusted to protect the information bear higher security clearance than those who are less trusted. The intelligence community agencies also train their stakeholders on matters including intelligence integrity, privacy, and confidentiality. Intelligence integrity must begin with the people who work with the agencies.
Technology has also been used to secure the integrity of intelligence besides reliance on the integrity of individual personnel. In an age where security agencies rely on computerized or cloud platforms to store information, multiple challenges emerge. Primarily, security agencies are concerned about cyber attacks (Sheftick, 2020). The intelligence agencies rank above organizations including cryptocurrency exchanges, online casinos, and e-commerce platforms when it comes to the threats of cyberattacks. To protect the integrity of their intelligence, agencies within the intelligence community must have layers of security protocols and firewalls to evade the possibilities of those attacks.
Contextualization of intelligence is another strategy that agencies employ to ascertain integrity. In security agencies, threats are received from every place and every time. Some of the threats are not as serious as others. The challenge is on identifying what could harm security and ignoring the rest. Currently, security agencies emphasize the contextualization of threats to track and mark the integrity of their intelligence. Contextualization of threats means that security agencies classify intelligence to ensure that the right pieces of information are subjected to the necessary pieces of action. With contextualization, the agencies can understand where to reach pieces of intelligence to put them into their utmost use. That enhances integrity. Besides, if intelligence can be tracked appropriately, it eases analyses and storage. Pieces of intelligence that are not classified can easily be breached without any trace. Contextualization has helped in stabilizing intelligence for its primary purposes.
Lack of Integrity in Intelligence
A lack of integrity in intelligence can trigger multiple challenges to the security of a nation or international community. Currently, the biggest security threat that the world is facing emanates from terrorism. Terrorists have shown their intelligence and ability to penetrate highly secured places. Like the intelligence agencies, terrorists are bound to understand who tracks them and the strategies employed by the trackers. Notoriou...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
Sign In
Not register? Register Now!