INTL301_Assg 1- Megan Patterson
docx
keyboard_arrow_up
School
American Public University *
*We aren’t endorsed by this school
Course
301
Subject
Business
Date
Feb 20, 2024
Type
docx
Pages
15
Uploaded by DeanGalaxy14946
1
Strategic Intelligence Collection:
Does More Data Mean More Answers?
Megan Patterson
Introduction to Intelligence Studies
Course number: INTL301
23 Jan, 2022
2
Introduction
Strategic intelligence collection and subsequent strategic forecasting is a delicate balance of policy-driven bias, in-depth knowledge and insight of the adversary, and some abstract understanding which subject matter experts assess to be future plans and actions. While some claim increased strategic intelligence collection enables more timely and accurate assessments, the overwhelming amount of information available, various stovepipes within the intelligence community (IC), and disconnect between policy and intelligence coupled with analyst bias has resulted in stagnation of an excess of information collected. With growing resources and capabilities, analysts must limit their scope in order to reasonably understand the information they are responsible for, ultimately leading to a lack in
collaboration, missed information, and insufficient analysis for true strategic forecasting.
The Case for Strategic Intelligence
The Evolution of Intelligence and Bureaucratic Processes
In order to understand the role and importance of intelligence, it is imperative that one
understands the evolution of the IC and how decision-makers are integrated throughout the analytical process. The IC has a long history that can be traced back to the late 19
th
century; however, more recent events following the 9/11 terrorist attacks have significantly impacted the way in which the IC operates. Reforms meant to better fuse the intelligence analyst with policymakers have instead resulted in “politicized” intelligence whereby policymakers lose trust in allowing analysts to competently operate without constant oversight (Heidenrich 2007, 13). In a role that serves best when partisan politics are checked at the door, balancing the relationship between intelligence and the consumer is paramount to ensuring objectivity in analysis (Johnson 2006a, 128).
3
Intelligence collection and strategic forecasting has a history fraught with ambiguous and at times partisan political direction and guidance as well as controversial methods and assessments. With the 2005 creation of the Office of the Director of National Intelligence (ODNI), the IC underwent a fundamental shift in how it collects, analyzes, and delivers intelligence and counterintelligence information to America’s leaders (Office of the Director of National Intelligence n.d.). The shift from a Director of Central Intelligence (DCI) to the Director of National Intelligence (DNI) was a key component of IC reform and intelligence integration and collaboration (Office of the Director of National Intelligence 2017). By design, such reforms were initiated with the intention of not only improving the capabilities of the IC, but also to ensure a higher degree of intelligence oversight and delivery of actionable intelligence to decisionmakers.
Disconnects in Analysis and Policy
During times of reform, immediate repercussions include the growing pains of navigating new layers of bureaucracy, overcoming doubt surrounding the establishment of new roles and perspectives, and budgetary concerns regarding congressional authorizations and prioritization of intelligence efforts (Clark 2007, 121-135). Despite efforts to improve the
working relationship between intelligence analysts and political leaders, the long-term impact
of the reform of U.S. security structures and the IC has long been an observed issue of national defense. More recently, this became apparent with the shift from counter-terrorism to
great power competition. The Intelligence Reform and Terrorism Prevention Act of 2004, which established the ODNI in 2005, was justified at the time in its focus on countering terrorism. However, this narrow scope of intelligence efforts and increased drive by decisionmakers for near-term intelligence has atrophied the IC’s skillset for strategic analysis and long-term forecasting of near-peer adversaries.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4
In addition, there exists a growing policymaker perception that the IC consists of nothing more than news reporters providing unactionable intelligence. This mentality brings forth two possible outcomes. Coupled with concerns surrounding a lack of trust in long-term assessments, it drives a wedge between the IC and those policymakers who would question their ability to provide key judgments. For those policymakers who are more influential, or potentially during times when analysts are less sure of their assessments, it can lead to analytical production that is tailored to the personal interest and agenda of an elected official (Johnson 2006a, 143).
Prioritizing “Now”: Reactionary Intelligence over Strategic Forecasting and Assessments
Aside from both the short and long-term impacts of reforms, there also exists a strained relationship between national security policy and the IC most readily evidenced through the National Intelligence Estimate (NIE). While policymaker interest in the NIE ebbs
and flows based on the personalities in office and current events, the majority tend to focus on more immediate, pressing concerns and view the longer timelines needed to produce an NIE, along with the potential for bias and overall estimative language, as less than useful (Johnson 2008). “The production and use of strategic intelligence by the United States government has
plunged to egregiously low levels. This decline is badly out of sync with the broader needs of
the republic, fails to meet the nation's foreign policy requirements, ill-serves the country's many national security officials, and retards the developing prowess of its intelligence analysts” (Heidenrich 2007, 3). Political pressures often result in efforts to mold intelligence to fit policy instead of maintaining an objective stance of exposing the truth in the data. The desire to be first to the table with exquisite intelligence overrides long-term research and analysis, ultimately perpetuating the prioritization of “now” over strategic intelligence.
5
Information Management
The NSA’s belief that more data is always good, and that it’s worth doing anything in order to collect it, is wrong. There are diminishing returns, and the NSA almost certainly passed that point long ago.
- Bruce Schneier
Navigating Information: Pitfalls of Never-Ending Data
Advances in the technological era of the 20
th
and 21
st
century have presented the IC with an abundance of information collection capabilities and, therefore, an overwhelming amount of data to process (Kennedy 2008, 85-86). In a world of intelligence collection which
never sleeps, the issue of too much information is often overlooked due to an insatiable desire
from policy leaders to obtain as much information as possible. However, efforts by the IC to leverage emerging technologies for collection purposes often outpace exploitation capabilities. While artificial intelligence and automated processing have the potential to relieve the strain currently placed on analysts to overcome these shortfalls, it has only in recent years even been considered an option and has yet to be fully realized (Katz 2020). Currently, there exists a need for restructured processes within the intelligence cycle along with an entirely new set of skills in order to maximize utility of the amount of information which is constantly being collected and stored. These processes are long and consist of years of trial and error. The vast databases of information yet to be exploited could very well contain a critical piece of information that would change the tide in a war, but until the matter
of managing the data is addressed, the U.S. runs the risk of failing to provide adequate strategic assessments. The Need for Human Review While Confronting Human Limitations
Current limitations in artificial intelligence/machine learning as incorporated into processing of intelligence sheds light on the shortfalls of an understaffed intelligence agency
6
as more analysts are needed to sift through a seemingly endless mountain of information. This need for more analysts is a concern for funding as well as a talent consideration as the IC desperately needs to retain certain skills in order to ensure quality of analysis in defense of
the nation. Unfortunately, there are those who measure success merely as the collection of data as opposed to the actual exploitation and successful analysis of relevant information; therefore, a critical examination of where the U.S. is spending its national intelligence budget
is needed to ensure the focus is not solely on the apparatus used to collect and store data, but rather the quality of the human element in the analytical process (Schneier 2013).
Aside from personnel issues, there’s also inherent human limitations that come into play with an overabundance of information and a heavy workload. It has been shown that an overwhelming flow of information often leads to an inability to distinguish relevant information and adequate focus on key elements to be passed to decisionmakers (Kimmelmann 2017, 38). Intelligence analysts are faced with a seemingly impossible task of not only processing vast amounts of information, but also interpreting that information with an intimate understanding of the intent of the nation’s policymakers to ensure relevancy and impact - all this while also working to incorporate strategic forecasts in an attempt to influence policymakers to consider issues yet to be brought to their attention (Kimmelmann 2017, 38).
Juggling Act: Ensuring Public Transparency with Consideration for Sensitive Sources
Throughout the IC and its multiple facts of intelligence collection, there are analytical components which are required to operate covertly. In some circumstances, the level of secrecy and need to protect sources and methods hinders the IC’s ability to be fully transparent to the public and, on occasion, with policymakers themselves. The concerns which this may cause are apparent in the various hearings and investigations into warrantless
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
7
surveillance and overall lack of intelligence oversight within the U.S. Take, for example, the Church Committee Hearings of the 1970’s, or the actions of the NSA conducting electronic surveillance inside the U.S. following the September 11
th
, 2001 attacks. Determining the relationship between secrecy, privacy, and efficacy is a challenge that has yet to be overcome. The danger behind a lack of proper policy to safeguard privacy while enabling security is defined by an inability to determine the efficacy of such covert actions and signals intelligence which ultimately may bring about more harm than good (Johnson 2006b, 36-37). Hence, efforts within the IC to retain such covert capabilities is often faced with public scrutiny and the information itself wrought with the dangers of false positives among a sea of data. Credible Probability
Deception and Its Impact on Long-Term Analysis
Denial and deception have long been tactics employed by militaries worldwide. However, deception in particular takes a much more proactive effort through disinformation and misinformation to mislead an opponent, potentially resulting in a nation reaching a false conclusion (Kennedy 2008, 88). Considering the vast amounts of information available to an analyst, the introduction of deceptive techniques only serves to further complicate strategic intelligence assessments. Not only is an analyst at odds to find the key elements for primary concerns of national defense, now they must also carefully navigate potentially false information and long-term implications of following the wrong lead. In the face of deception techniques, even a seasoned veteran of intelligence analysis is
at risk of falling victim to misinformation (Grabo 2002, 119). Yet, deception still stands apart
as one of the least understood and least researched aspects of intelligence and military operations. This is surprising considering even a primitive deception effort threatens
8
generating enough uncertainty in a nation’s decision-making process to distract already limited resources away from reliable intelligence (Grabo 2002).
Verifying Credibility: A Case of Confirmation Bias
Human nature is fraught with culture-bound preconceived notions, and the IC is certainly no exception to such cognitive biases. Understanding this inherent shortcoming within the human analytical process is essential not only for analysts to produce truly objective assessments, but also in their approach to establishing a deeper understanding of adversaries and their own culture-driven biases (Johnson 2006a, 132). The need for an independent, unbiased intelligence service that is removed from politics is the highest standard to which the IC can aspire in its efforts to meet the needs sets forth by policy makers
(Grabo 2002, 140).
When it comes to strategic intelligence, the outcome of long-term assessments influenced by biases and such subjectivity is a matter of great concern. The argument could be made that no analyst is capable of acting without some bias, and such analytical judgements that must be made with limited information are inherently going to carry over some degree of individual perspective (Grabo 2002, 147-148). These conditions of group-
think and predispositions throughout the IC as well as American leadership present a truly insidious capacity to undermine interpretations of a given situation (Kennedy 2008, 90). Instead of pursing a topic and plausible intelligence assessment that may fall outside of previously known norms, analysts may cling to the comfort of the status quo, thereby squandering analytical prowess and advancement of actionable strategic intelligence (complexities of national intelligence, 91). “In general, the farther one proceeds in the indications process from the collection of raw data to the final judgment of the adversary’s
9
course of action, the greater the spread of opinion or interpretation is likely to be.” (Heidenrich 2007, 134)
The Risk Matrix: Conveying Strategic Intelligence to Formulate Plans
There is nothing a Government hates more than to be well-informed; for it makes the process of arriving at decisions much more complicated and difficult.
- John Maynard Keynes
The 9/11 Commission Report provided a critical look at the IC’s failure to provide assessments which could prevent the attacks; however, it is possible that this failure blamed on policymakers and the IC was actually a previously unrealized limitation of strategic intelligence as restricted by policy directives (Kimmelmann 2017, 22-24). Much like the cognitive bias that plagues an analyst’s ability to convey objective assessments, policy makers are inherently drawn to that information which would help them implement their policies and to address the crisis of the moment (Johnson 2006a, 143). Further complicating the policymaker psyche in consideration of strategic assessments was the perceived invincibility of the U.S. and its status of being impervious to outside attacks. Such resistance to a change in worldview that would require a significant shift in policy and plans exacerbates the issue of decisionmakers rejecting such information that doesn’t fit their preconceived mold, along with a high probability of scorning the messenger (the IC) for proposing such an assessment (Jervis 2010, 195). Regardless of bias, political stance, or desires for personal gain, leaders must take calculated risks in order to be successful. The tenuous relationship between the IC and policymakers is further strained by strategic intelligence which points out ambiguities, uncertainties, and the various risks of certain policies (Jervis 2010, 187). However, the best policy is one which incorporates intelligence early and often. Therefore, it is imperative that
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
10
the IC be able to present such intelligence that would otherwise be dismissible by policymakers in such a way as to capture the extent of the risks involved. With the development and consistent use of a standard risk matrix framework, the IC is better equipped to present information that could otherwise be perceived as ambiguous in interpretation in a way that policymakers might be more willing to confront as logical and relevant. Conclusion
In conclusion, in the current internet age of “immediate answers” and the need for instant access and rapid ingestion of information, strategic intelligence is often overlooked for the more timely and tangible tactical intelligence and policy solutions. The boom of the technological era brought increased and enhanced strategic collection capabilities, further driving a response for immediate reactions
as opposed to long-term analysis and strategic planning
. Meanwhile, uncertainty surrounding strategic collection and analysis leads to decision paralysis which is further exacerbated by an acute awareness of a potential for vast amounts of information yet to be exploited, incorporated, or fully vetted for inclusion. While the demand for strategic intelligence tends to ebb and flow depending upon the needs and interests of current policymakers, the skill itself is crucial to maintain in order to ensure the U.S. remains the predominant world force in future conflicts.
11
References
Clark, J. Ransom. 2007. “CHAPTER 6: Where Do We Go from Here?” In Intelligence and National Security: A Reference Handbook
, pp 115-139. Praeger: Greenwood Publishing Group, Inc. https://psi-praeger.com.ezproxy2.apus.edu/Topics/Display/ 2014780?cid=137&sid= 2014780.
Grabo, Cynthia M. 2002. Anticipating Surprise: Analysis for Strategic Warning
. Joint Military Intelligence College Washington Dc Center for Strategic Intelligence Research. https://www.ni-u.edu/ni_press/pdf/Anticipating_Surprise_Analysis.pdf.
Heidenrich, John G. 2007. “The State of Strategic Intelligence: The Intelligence Community’s Neglect of Strategic Intelligence.” Studies in Intelligence
51 no. 2 (2007). https://www.cia.gov/static/789d2c84e758c9111bdaaa2adb8c628a/the-state-of-
strategic-intelligence.pdf
Jervis, Robert. 2010. “Why Intelligence and Policymakers Clash.” Political Science Quarterly
125 no. 2 (2010): 185-204. doi:10.1002/j.1538-165X.2010.tb00672.x.
Johnson, Loch K. 2006a. Strategic Intelligence: Volume 1, Understanding the Hidden Side of
Government
. Praeger: Greenwood Publishing Group, Inc. https://psi-praeger-
com.ezproxy2.apus.edu/Topics/Display/ 2068893?cid=137&sid=2068893.
Johnson, Loch K. 2006b. "2: The Challenge of Global Intelligence Listening." In Strategic Intelligence: Volume 2, the Intelligence Cycle, the Flow of Secret Information from Overseas to the Highest Councils of Government,
pp 23-37. Praeger: Greenwood Publishing Group, Inc. https://psi-praeger-com.ezproxy2.apus.edu/Topics/Display/ 2068894?cid=138&sid=2068822.
Johnson, Loch K. 2008. “Glimpses into the Gems of American Intelligence: The President's Daily Brief and the National Intelligence Estimate
.
”
Intelligence and National Security
23:3, 333-370 (23 Jun 2008). DOI: 10.1080/02684520802121257.
Katz, Brian. 2020. “The Collection Edge: Harnessing Emerging Technologies for Intelligence
Collection.” Center for Strategic & International Studies. Posted on Jul 13, 2020. https://www.csis.org/analysis/collection-edge-harnessing-emerging-technologies-
intelligence-collection
Kennedy, Robert. 2008. "4: Analysis: Torments of Sisyphus." In Of Knowledge and Power: The Complexities of National Intelligence,
pp 77-110. Greenwood Press: Greenwood Publishing Group, Inc. https://psi-praeger-com.ezproxy1.apus.edu/Topics/Display/ 2004672?cid=138&sid=2003963.
Kimmelman, Susann. 2017. "Indications and Warning Methodology for Strategic Intelligence." Homeland Security Affairs
(Dec 2017). https://www-proquest-
com.ezproxy2.apus.edu/scholarly-journals/indications-warning-methodology-
strategic/docview/2206253979/se-2?accountid=8289.
Office of the Director of National Intelligence. 2017. “ODNI Factsheet.” Revised Feb 02, 2017. https://www.dni.gov/files/documents/FACTSHEET_ODNI_History_
and_Background_2_24-17.pdf
Office of the Director of National Intelligence. n.d. “How the IC Works.” Accessed Oct 22, 2021. https://www.intelligence.gov/how-the-ic-works.
12
Schneier, Bruce. 2013. “The Limitations of Intelligence.” Blog: Schneier on Security. Posted on September 17, 2013 https://www.schneier.com/blog/archives/2013/09/ the_limitations.html.
https://www.cia.gov/static/d9628799b5dd4794df943aff16e838ce/revisiting-sherman-kents-
defense.pdf
https://www.cia.gov/static/aa47b490ac1c52c04c467a248c5cbace/Kent-Profession-Intel-
Analysis.pdf
1012-1016-1021-1061-2001-4012-4013-5301-5401-6001-6602-6802-
7102- and, 7107
CRS Report summarizing the Act
SEC. 1012. REVISED DEFINITION OF NATIONAL INTELLIGENCE. Sec. 1016. Information sharing.
Sec. 1021. National Counterterrorism Center. Sec. 1061. Privacy and Civil Liberties Oversight Board. Sec. 2001. Improvement of intelligence capabilities of the Federal Bureau of Investigation. Sec. 4012. Advanced airline passenger prescreening.
Sec. 4013. Deployment and use of detection equipment at airport screening checkpoints.
Sec. 5301. In person interviews of visa applicants.
Sec. 5401. Bringing in and harboring certain aliens.
Sec. 6001. Individual terrorists as agents of foreign powers.
Sec. 6602. Receiving military-type training from a foreign terrorist organization. Sec. 6802. Weapons of mass destruction.
Sec. 7102. Terrorist sanctuaries.
Sec. 7107. United States policy toward dictatorships.
The Intelligence Reform and Terrorist Prevention Act of 2004 (IRTPA) represents the most dramatic change to the Intelligence Community (IC)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
13
since the passing of the National Security Act of 1947. Following along the
theme of the USA Patriot Act and brought forth following the 9/11 Commission report, IRTPA drastically expanded various powers across IC agencies under the guise of combating international and domestic terrorism despite concerns regarding the potential for adverse effects on civil liberties. Most of the IC-specific reforms were outlined in Title I of the Act: “Reform of the Intelligence Community”. Reforms included restructuring of the IC in an attempt to limit duplication of effort. Additionally, the IRTPA provided a framework for the creation of the Director of National Intelligence (DNI) position and its National Counter-
Terrorism Center (NCTC). The DNI position was a direct replacement for the Director of the Central Intelligence Agency (DCIA) charged with integration of the IC through budgetary powers. Additionally, it is worth noting Title II and its call for improvements of Federal Bureau of Investigation (FBI) intelligence functions specifically regarding training in criminal justice and national intelligence matters. This is critical in understanding the importance of information-sharing across the IC, especially as it pertains to preventing domestic terrorism and threats from U.S. borders. Reforms striving to increase collaboration typically result in some form of database or task force assigned to a specific threat. For example, the Foreign Terrorist Tracking Task Force (FTTTF) and the National Joint Terrorism Task Force (JTTF) are headed by the FBI in a much larger collaboration effort that includes multiple organizations such as the Department of Homeland Security’s Bureau of Immigration and Customs Enforcement and Customs and Border Protection, the Department of Energy, and more (Pistole, 2007). Although the creation of such task forces and organizations such as NCTC (as brought forth by the IRTPA) stimulate interagency cooperation, such efforts to prevent terrorists and their weapons from entering the U.S. often fall short due to the redundancy in lines of effort – the exact opposite of what the IRTPA set out to do. These various organizations ultimately act as a band-aid over a bandage under which a festering wound has already bled through; while it may stop the bleeding from showing for a time, the wound is still not healing and eventually the proof will bleed through. Therefore, the unfortunate truth is that they do little to ensure effective and efficient information collection and sharing.
Aside from major IC reforms, Titles V and VI of the IRTPA significantly altered the way in which law enforcement conducted border protection against the threat of domestic terrorism due to porous borders. Considering America’s vast expanse of border territory, steps in the IRTPA to increase the number of agents and enforcement investigators was one critical step in a positive direction. Couple that with approvements for advanced patrol techniques, such as through use of remotely piloted aircraft (RPAs), and on paper the IRTPA seems to provide a construct for improved security. However, technological advances continue to obscure terrorist movements and communications while the sheer size of the problem is further exacerbated by politics and an inability for analysts and
14
agents to see and be everywhere at once. As stated by the Department of
Homeland Security (DHS), “While DHS employs a number of concrete metrics to track border security operations, it is difficult to precisely quantify illegal flows because illegal border crossers actively seek to evade detection...” (Department 2018). This is not a new difficulty within intelligence realms, as measuring success is much more abstract than measuring failures. Ethically, this national security problem-set is made even more complicated by its divisive nature. While Title V, Section D includes requirement for an outreach program to educate the public on the risks of bringing in and harboring aliens, various administrations have done little to message the negative aspects of illegal border crossings. Despite efforts to ensure the safety of illegal aliens while also working to tamper such security threats, there exists a widespread national sentiment of just wanting to defend those who would cross our borders illegally with no regard for national security. References
Congress.gov. “S.2845 - 108
th
Congress (2003-2004): Intelligence Reform and Terrorism Prevention Act of 2004.” December 17, 2004. https://www.congress.gov/bill/108
th
-congress/senate-bill/2845
Department of Homeland Security. 2018. “Measuring Effectiveness.” Last modified June 12, 2008. https://www.dhs.gov/measuring-effectiveness
Pistole, John. 2007. “Implementing the Intelligence Reform and Terrorism Prevention Act.” Statement before the Senate Select Committee on Intelligence
, January 25, 2007. https://archives.fbi.gov/archives/news/testimony/implementing-the-
intelligence-reform-and-terrorism-prevention-act
Shedd and Farraro recommend:
Information-sharing between the Department of Homeland Security and the Intelligence Community remains elusive for several reasons: different bureaucratic cultures, an absence of clear data-sharing policy, and incompatible information technology within the Executive branch. We need to do better. Consider how a more integrated system might work: A foreigner entering the U.S. from Mexico arouses suspicion. Border patrol searches his cell phone, which reveals calls made to Syria. That information is passed to an intelligence analyst in Washington who identifies the numbers as associated with Islamic extremists. The foreigner is prevented from entering the country where he intended to
15
launch an attack. Connecting these kinds of data is critical to improving our ability to protect the homeland.
David Shedd and Matthew F. Ferraro, “Intelligence Reform 2.0,” Defense One, April 21, 2015, accessed October 21, 2015,
http://www.defenseone.com/ideas/2015/04/intelligence-reform-
20/110659/
https://archives.fbi.gov/archives/news/speeches/the-threat-of-homegrown-terrorism
https://digitalcommons.coastal.edu/cgi/viewcontent.cgi?article=1051&context=honors-theses
https://archives.fbi.gov/archives/news/testimony/implementing-the-intelligence-reform-and-
terrorism-prevention-act
https://www.cbp.gov/border-security
https://www.dhs.gov/topic/border-security
http://usbordersecurity.info
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Documents
Recommended textbooks for you

Management, Loose-Leaf Version
Management
ISBN:9781305969308
Author:Richard L. Daft
Publisher:South-Western College Pub

Purchasing and Supply Chain Management
Operations Management
ISBN:9781285869681
Author:Robert M. Monczka, Robert B. Handfield, Larry C. Giunipero, James L. Patterson
Publisher:Cengage Learning
Recommended textbooks for you
- Management, Loose-Leaf VersionManagementISBN:9781305969308Author:Richard L. DaftPublisher:South-Western College PubPurchasing and Supply Chain ManagementOperations ManagementISBN:9781285869681Author:Robert M. Monczka, Robert B. Handfield, Larry C. Giunipero, James L. PattersonPublisher:Cengage Learning

Management, Loose-Leaf Version
Management
ISBN:9781305969308
Author:Richard L. Daft
Publisher:South-Western College Pub

Purchasing and Supply Chain Management
Operations Management
ISBN:9781285869681
Author:Robert M. Monczka, Robert B. Handfield, Larry C. Giunipero, James L. Patterson
Publisher:Cengage Learning