Thursday, September 3, 2020

Business Ethics Essay -- Papers

Business Ethics Business morals is a differing field that can't be characterized with a solitary definition. This territory tends to various issues, issues, and predicaments inside the administration of organizations. Does this through various viewpoints and strategies. Obviously, so as to introduce the complexities of business morals, we should investigate the kinds of issues that business experts are ceaselessly stood up to with. To comprehend one must know the meaning of corporate morals just as recognizing what the morals of obligation are. In the wake of characterizing what morals are, we at that point need to perceive how these are happened inside administration. This will show the decay and fall of business morals after some time and how whistle blowing has had its impact. Business morals depict people, yet in addition how organizations treat the earth. Most of European and U.S. Chief's and higher positioning supervisors characterize corporate morals as a subject that will be managed at three levels; (1) the corporate crucial, voting public relations, and (3) strategies and practices. The corporate crucial the most effectively perceived and broadly relevant classification. Officials state that the endeavor wherein they are occupied with, and the items or administrations that they advertise, should fill a basically moral need and that an organizations first moral obligations are characterized by the idea of their destinations (Madsen and Shafritz, 1990). Administrators additionally discuss voting demographic relations while defining their organization's moral guidelines. This normally requires the production of explanations of corporate duties regarding every individual organization. The greater part of the codes depict the organization's responsibility toward specific gatherings instead of... ...from all. Business morals are entangled, multi-issue issues that are ever changing in our quick paced world. It is an extremely perplexing issue involving numerous things from corporate morals to the morals of duty. Whistle blowing is one aftereffect of declining corporate morals and the decay of morals has declining corporate morals and the decrease of morals has prompted negative effect on the earth. These intricate issues must be tended to or a consistently expanding premise later on. REFERENCES Madsen, Peter. Shafritz, Jay, M. (1990). Fundamentals of Business Ethics. New York, NY: Author. The Wall Street Journal. (1989). Dow Jones and Company Inc. Magnet, Myron. (1988). The Decline and Fall of Business Ethics. Fortune: Time Inc. Benson, G. C. S. (1982). Business Ethics in America. Lexington MA: D.C. Heath and Company.

Saturday, August 22, 2020

The Importance of Staff Development in Nursing

The motivation behind this paper is to distinguish the instructive requirement for and choice of an instructive program. Explicitly this paper will concentrate on characterizing the objectives and results for the instructive program and portray the learning destinations just as the structure model and student attributes. The paper will likewise survey the instructional techniques to receive for conveyance and give instances of assets to be utilized in the study hall. In conclusion the paper will audit strategies for assessing the learning of the crowd. In view of the assessments directed during weeks two and three, there is an unmistakable requirement for an instructive program that centers around correspondence preparing and relationship working inside the basic consideration nursing power. Correspondence and coordinated effort are among the most basic work abilities fundamental for accomplishment in the social insurance field. Without sufficient correspondence, mistakes are probably going to result and wasteful conveyance of social insurance administrations are likely. Increasingly more social insurance associations are requiring individuals from their workforce to team up to convey quiet consideration and capacity as a unit (Caspi and Reid, 2002). Consequently it is indispensable that instructive projects center around upgrading officeholders abilities in these regions to guarantee critical thinking, dynamic and joint effort are successful and valuable in the human services condition. As Gerber and McGuire (1999) noted it is imperative that medical caretakers gain proficiency with the correspondences and joint efforts aptitudes important to upgrade correspondence in the working environment, which will eventually improve the adequacy of work capacities and conveyance of administration in the medicinal services setting. The instructive program will likewise concentrate on upgrading medical attendants innovation aptitudes so they are progressively fit for working in the cutting edge nursing or basic consideration unit where mechanical advancements are progressively being utilized due to legitimate need (Zalumas, 1995). In a basic consideration nursing condition, without correspondence medical attendants can't work productively with other basic consideration suppliers to guarantee the eventual benefits of the patient are done. The objectives and results of the instructive mediation chose include: (1) upgrading correspondence inside the basic consideration nursing unit (2) advancing more noteworthy coordinated effort among work groups by encouraging the significance of relationship building and (3) improving basic consideration groups working information on mechanical developments including their comprehension of the commitments innovation makes to the nursing workplace. The instructive mediation or program structured will work to improve staff individuals comfort level working in a group domain and energize individuals from the group to issue comprehend together in an effective and beneficial way. Learning Objectives and Design Model For reasons for this educational program an errand situated or focused structure model will be embraced to encourage learning among basic consideration attendants. This model offers steps and methodologies for showing officeholders â€Å"how to do† things inside the workplace and frameworks a progression of exercises and steps that can happen to empower people to achieve learning and work destinations (Caspi and Reid, 2002). This model was initially evolved to help advance instructive management, yet can be handily changed to oblige the necessities of basic consideration laborers. The model expect field guidance is imperative to the achievement and capacity of understudies to move abilities from the study hall to the workplace, some portion of the explanation this model bodes well for basic consideration laborers (Caspi and Reid, 2002). The assignment arrange model contains three particular stages; the starting stage where laborers initially meet and framework their objectives and the errands they will take part in, just as arrange â€Å"potential obstacles†; the center stage and the end stages, where the occupants survey and organize objectives, select undertakings important to accomplish them, and audit the outcomes (Caspi and Reid, 2002). During these last stages understudies may adjust their objectives and destinations or strategy to encourage better advancement or upgrade their results if essential. The learning targets for the instructive model chose incorporate upgrading understudies capacity to connect and discuss successfully with various staff and patient populaces, just as improving understudies capacity to work with mechanically propelled programs. The instructive program will likewise work to improve joint effort between work groups and decrease pressure and tension among laborers related with utilizing advances that understudies may not be acquainted with at first. Techniques for defeating boundaries to correspondence and coordinated effort inside the workplace will likewise be examined and featured as a major aspect of the learning destinations for this instructive program. Student attributes that will be assessed as a major aspect of the instructive program are various and differed. They incorporate individual attributes including members age, sexual orientation, encounters and instructive objectives just as ecological qualities. For the instructive points and goals of this program to be met it is imperative the training procedures embraced consider every understudy's learning qualities separately. As called attention to beforehand, understudies in a nursing setting frequently seek educators and teachers for direct direction and backing, seeing them as power figures in an instructive setting. Hence an immediate learning approach is important as is one that advances self heading among understudies. This will urge understudies not exclusively to embrace the strategies and goals proposed by educators yet in addition urge understudies to depend more on their inherent capacity to distinguish the projects and methods well on the way to encourage higher learning and training in the homeroom condition. Almost certainly, as understudies become increasingly OK with the instructive program created and strategies for coordinated effort proposed by the program, their learning qualities may change. In this manner it will be indispensable that teachers consider student advancement at each phase of the learning procedure, adjusting the instructive program as important to meet understudy's developing needs. The instructional strategies embraced ought to incorporate direct encouraging methodologies joined with vocation or work based training that encourages a more multi dimensional â€Å"educational experiences† increasingly purpose on getting ready occupants for â€Å"career accomplishment in a full scope of occupations† (Ciaccio et al. 2002, p. 300). The instructional model will likewise remember educating for a network based setting where basic consideration medical attendants are urged to collaborate with individuals from the network and speak with network pioneers and agents (Lough, 1999). Lough (1999) bolsters the significance of building up scholastic and network organizations where instructive foundations work with scholarly educators to help recognize holes in administration and help upgrade the viability of learning programs. A work based instruction will include showing understudies at work or giving hands on preparing. This will require assessment of understudy's correspondence and cooperation building exercises in the work environment. To encourage this, a chief will be selected or tutor that will routinely assess an understudy's correspondence endeavors and innovative capacity at work and off. The instructional model embraced will permit in house or study hall educators to adjust their educational program dependent on information accumulated from the workplace. Understudies will likewise be given the chance to analyze encounters they gain at work with those they increase off the activity and fill in the holes in their instruction where essential. No instructive program is powerful or complete without student assessment. Student assessment like instructive guidance ought to be multi faceted to be successful and gainful for all gatherings partaking. Toward the finish of instructional meetings, educators ought to assess understudies to evaluate whether educational plan materials were conveyed proficiently and in a way that accomplishes the objectives and targets of the program. To accomplish student assessment, educators should study understudies and ask them to self report on how well they see the structure of the instructive program to be. Understudies ought to likewise give proposals to adjusting the instructive educational plan later on to more readily support their necessities and help coordinate their needs dependent on their free student qualities. Student assessment will likewise come in the method of work execution surveys, which will assist educators with recognizing whether understudies are accomplishing their objectives from a work point of view.

Friday, August 21, 2020

Taxonomy on existing techniques of reducing false alarms in Annotated Bibliography

Scientific classification on existing methods of diminishing bogus alerts in sensor-based human services observing frameworks - Annotated Bibliography Example As indicated by Qassim, Patel and Modzhin (2014), fluffy rationale hazard investigation is actualized to diminish bogus alert occasions and keep up adequate degree of protection from genuine assaults in interruption and recognition frameworks. The basic role of an interruption and location framework is to recognize assailants attempting to invade a system and uncover defenseless assets. By utilizing a Fuzzy Logic-Risk Analysis (FLRA) model, the Qassim et al. (2014) expected to lessen occasions of bogus positives. By ascertaining the noteworthiness and seriousness of each presumed assault, the framework builds up whether an action can be delegated endeavored assault or ordinary conduct miss decided by the discovery framework. The model contains four layers: coordinated interface, information chief, autonomic administrator, and asset director. The highest layer speaks to the mix purpose of the framework chairman and the interruption identification framework. At this level, methodologie s and strategies are characterized and actualized. The segment liable for bogus positive decrease is the Intrusion Detection Manager. This subsequent layer alluded as the Fuzzy Logic-Risk Analysis Intrusion Detection Manager is capable involves four modules: screen module, analyzer, organizer module and control module. All the modules demonstration deliberately to recognize any endeavors of interruption, wipe out bogus positives and perform vital changes to the ensured component. Fluffy Logic-Risk Analysis model works in two components: recognizing the hazard and surveying the hazard. When the hazard has been recognized it is evaluated utilizing weighted midpoints and therefore sorted. Dangers are sorted dependent on their capacity to make hurt resource components. When the hazard has been recognized, remaining and uncovered dangers are broke down utilizing Fuzzy rationale from which various countermeasures are applied to relieve it. FLRA model works by taking the

Thursday, June 11, 2020

Cyber Bullying Which Controversial Issue In Our Society Today - 2750 Words

Society Today: Arguing Against Cyber Bullying (Term Paper Sample) Content: Jimmy B. GrissomProf. Diane S. HunterEnglish 102December 9th, 2017.Arguing Against Cyber BullyingIntroductionCyber bullying is the process of using information and communication technologies to facilitate a hostile, deliberate and repeated behavior intended to cause harm to other people (Belsey, P.218). The process of cyberbullying can either be carried out by one person or a group. Several scholars and organizations have carried the controversies associated with cyberbullying. For instance, there was a collaborative study on the issue in 2006 by the NCPC (National Crime Prevention Council) and Harris Interactive Inc. The survey established out of 824 students from high schools and middle schools studied, 43% of them had been cyberbullied for the last one year. The cyberbullying crime has become a menace to most students and children being more vulnerable victims. The paper argues against cyberbullying crime which is increasingly growing at a high rate in our societie s today.A study conducted by the Pew Internet and American Project specifically on the cyberbullying issue established that three teenagers have encountered online harassment (Lenhart, p.135). According to research conducted by Pew, the most common form of cyberbullying is the process of publicizing of information which includes e-mails, pictures and text messages (Lenhart, p.136). Furthermore, Pew also found out that boys are lesser victims of cyberbullying than girls. Middle-aged girls of between 15-17 years of age have a higher probability of experiencing cyberbullying with research showing that 41% of the ladies in this age group have been involved in the cyberbullying vice (Lenhart, p.136).One of the harmful effects of the cyberbullying is that people can assault each other through the different online channels. For this reason, the whole world has been against this controversial issue. Several laws have been enacted in various countries which makes cyberbullying a criminal off ense. With recent advancements in technology, bullying has been on the rise. Online forums have proved to be the primary breeding grounds for exchanging insults for youth and other people (Subrahmanyam and Greenfield, p.119).The recent technological advancements have led to the emergence of different apps such as WhatsApp, Facebook and AOL Instant Messenger (AIM) which gives the opportunity to youths to share gossips. For an instant, the AIM offers a chance to children to spend most of their free times talking to one another. The chatting may take place privately or publicly in the various chat rooms. The AIM program gives opportunities to youths to form specific chat rooms. Cyberbullying arises when the kids decide to get together and start spreading gossips, lies, assaults or harassments against their counterparts (Hinduja et al., p.142).Cyberbullying is unwelcomed because it has adverse effects on the victims. A 13-year old girl by the name Megan Meier from Missouri was bullied t o the extent that she decided to commit suicide by hanging herself in her closet. The astonishing act took place in October 2006 (Pokin, p.394). Megan began conversations with Josh, a 16-year-old boy on Myspace. The chat continued for the next six weeks, and Megans mum always kept peeping on the discussion. Josh sent a particular message to Megan which led to her death. In his text, Josh had informed that he doesnt want the friendship anymore because Megan is not a lovely girl. Besides, Josh told her that she is hated by her friends and thus the world would be a better place if Megan did not exist. It did not take long for Megans find to discover that she had hung herself in her closet and rushed the child to the hospital where she died. Therefore, cyberbullying has various negative impacts on the victims such as causing of deaths among other things. The research points some of these issues and gives multiple arguments against the cyberbullying.ObjectivesTo give arguments against cy ber bullying which has increased due to increase in technology.Statement of the ProblemCyberbullying has some negative impacts on the victims. Some of these include assaults, mental depression, spreading of gossips and sometimes death. With the growth in technology, the effects of cyberbullying cannot be ignored. The desire to offer solutions to some of the challenges associated with cyberbullying forced me to conduct the research.Literature ReviewCyberbullying refers to the process of utilizing information and communication technology to effect harmful practices on the other people (Besley, p.218). According to the survey conducted by the NCPC (National Crime Prevention Council) and Harris Interactive Inc. in 2006, the students who had received cyberbullying that year corresponded to 43%. A study conducted by the Pew Internet and American Life Project established that a third of the teenage population had encountered online harassment at least once in their lifetime (Lenhart, p.15 0).Approximately 13 million of the kids in the United States of America in the age group of between 6 to 7 years have been victims of cyberbullying. The data about the 13 million figure is extracted from NASP Communique article in research carried out by a group called the Fight Crime Invest in Kids.Nine types of cyberbullying exist. These are denigration, flaming, trickery, harassment, outing, cyberstalking, cyber threats and exclusion. Flaming is an act of engaging in online wars by use of electronic messages which display are written in the vulgar language to show anger. Harassment is the process of sending offensive messages through the internet. Denigration is throwing a dis to a person who is online and consists of spreading gossips and rumors about a person. Denigration damages a persons reputations and destroys friendships. Impersonation is the pretense of being another person and taking the position of that individual to put him or her in serious trouble and damage his repu tation and friendship. An outing is a process of sharing someones personal information, disgusting info or posting photos online without permission from the owner. In trickery, the cyberbully tricks the victim into sharing intimate secrets and data after which the bully will share the information online to embarrass the person. Exclusion is a behavior of omitting someone from an online group. Cyberstalking is where the bully repeatedly harasses a person. Denigration is where the cyberbully continuously threatens a person with the intention of creating fear in that particular individual to heed to his or her desires. Finally, cyber threats are the process of intimidating another human being with the intention of upsetting that specific individual where the person is forced to consider harming himself, another person or commit suicide (Willard, p.54).There are three additional concerns related to the nine forms of cyberbullying according to Willard. They include disclosure of large am ounts of personal information by the students through the internet. Students also become addicted to the internet to the extent of spending all their free time browsing and posting photos on the internet. Finally, a suicidal and self-harming community prevails in which the kids in some instances access information to try to gain info related to suicide and mechanisms of self-harm (Willard, p.56).There are other additional concerns associated with cyberbullying according to Shariff. Some of these include anonymity, an audience which is infinite, prevailing erotic and homophobic harassment, and permanence expression. Anonymity is the cyberspace nature in which human beings have the capability of hiding behind the screen names that offer protection to their identity. The online audience is infinite because a large number of people can the information is written by the bully and the onlookers have a tendency of supporting the perpetrators rather than the victim. Besides, there is the em ergence of sexual and homophobic harassment on the web which is associated with the mechanisms in which ladies and gentlemen utilize the internet. The internet somewhere displays a permanent perspective because once something is written and posted online, it becomes difficult to erase because many people download and save it and can also end up sharing with others (Willard, p.57).Cyberbullying has negative impacts on the teens. Some of the results of cyberbullying include low self-esteem and loneliness among others. The most troubled teens are those who fall in the age group of 13-17 years. Such teenagers are frequent users of the internet, mobile phones, Facebook, Twitter, Instagram, palm chats and other channels of communication. The learners have the capability of accessing the electronic tools of communication in different places such as homes, institutions, towns, Wi-Fi sites, and public libraries. Research shows that 78% of the teens have been using internet for chatting, brow sing and posting photos online using the various communication channels. The study also shows that 80% of the youths report that they used web yesterday, and 27% utilized the internet for several hours yesterday, not one or two hours but many hours. In the process of conversing with their friends, the youth meets cyberbullies who assault and embarrass them making them become sad, angry, depressed and feel helpless (Hinduja et al., p.145). The cyberbullying vice calls for the government and members of the public to devise the best possible ways of handling the controversial issue because it is turning to be a menace to the society. Some of the adverse effects arising from cyberbullying have been discussed below.Negative Impacts of CyberbullyingPsychological DisturbancesThere are some negative impacts associated with cyberbullying. For instance, cyberbullying causes mental disturbances ...

Sunday, May 17, 2020

Accelerative Integrated Method (AIM) for Teaching

The foreign language teaching methodology known as Accelerative Integrated Method (AIM) uses gestures, music, dance, and theater to help students learn a foreign language. The method is most frequently used with children and has been met with a lot of success.The basic premise of AIM is that students learn and remember better when they do something that goes along with the words they are saying. For example, when the students say regard (in French meaning to look), they hold their hands in front of their eyes in the shape of binoculars. This gesture approach includes defined gestures for hundreds of essential French words, known as pared down language. The gestures are then combined with theater, storytelling, dance, and music to help students remember and use the language.Teachers have found great success with this integrative approach to language learning; in fact, some students achieve results comparable to those programs that use full immersion teaching methods, even when the AIM -educated students only study the language for a few hours a week. Many classrooms have found that children often feel comfortable expressing themselves in the new language from the first lesson. By participating in many different kinds of activities in the target language, students learn to think and write creatively. Students are also encouraged and given the opportunity to practice oral communication in the language theyre learning.   AIM is particularly well-suited for children, but it could be adapted for older students.Accelerative Integrated Method was developed by French teacher Wendy Maxwell. In 1999, she won the Canadian Prime Ministers Award for Teaching Excellence and, in 2004, won The H.H. Stern award from the Canadian Association of Second Language Teachers. Both of these prestigious awards are given to educators who show great innovation in the classroom.

Wednesday, May 6, 2020

William Kamkwamba The Boy Who Harnessed the Hearts of the...

In 2009 one young man changed the lives of thousands by telling his story of hardship, survival and innovation to the world. The book, The Boy Who Harnessed The Wind by William Kamkwamba reveals in great detail the complete blindness that our western society possesses regarding the truth of life on the continent of Africa. As citizens of the western world we have a tendency to see only the statistics and politics of the wars, famines and disasters that occur in developing countries while failing to even consider the human beings struck down by them. In this detachment we pass judgement upon the entire nation as a whole, forgetting the millions who do more in a single day with what little they have than we do with our abundance in a†¦show more content†¦Using only the diagrams from his most cherished book, â€Å"Using Energy†, William built his own windmill from junk yard scraps and eventually supplied his entire family with electricity and water. Inspired by the desp air of his countries situation, William heroically brought hope and opportunity to the entire nation. The struggles of William and his people touched me deeply and moved me to wonder if anything had been done to help the Malawians in their time of need. Were such a catastrophe to occur in the United States the outcry of the public would only be outdone by the victims of the problem themselves. Yet in Malawi what few questions were put to their tyrannical government were crushed with an iron fist and there was nothing more to be said. Thus it was from the hands of foreign powers that some small relief came. Michael Wines of The New York Times reported that the United States in association with the World Food Program stepped in almost immediately to assist with the food shortage (Wines). But some did not consider this assistance the wisest course of action. In light of the fraudulent Malawian governments penchant for conveniently misplacing funds it was said that they should be left to their own devices. Fred Smith, Jr, President of Competitive Enterprise Institute claimed as much , saying, â€Å"One of the

Growth and Value of Business Intelligence-myassignmenthelp.com

Question: Describe the Growth of Business Intelligence over the years. Answer: Introduction Recently, there has been a big buzz by companies on big data and analytics. In this report, I discuss business intelligence tools and how they can be used to solve big data challenges. I also discuss the growth of BI over the past decade and some of its common features used for decision making. Gone are the days of big data challenges. With advancements in technology, companies can now transform their data into useful information using Business Intelligence tools and applications. Business Intelligence (BI) tools, also referred to as Decision Support Systems, are defined as a set of systems, software, applications and tools used to analyze data with an aim to produce useful information that will assist decision makers to work more efficiently and productively (Castellanos, Dayal, Simitsis, Wilkinson, 2009). Business Intelligence tools first came into the limelight in 1865. However, it is not until the late 1990s, that the word became a popular phrase in the business world. The initial Business Intelligence tools were considered an extra investment for companies to gain a competitive advantage, therefore not many businesses had discovered its benefits. They were designed with an aim to produce and organize data into reports. However, time and complexity held back the development of these tools. For example, this generation of tools could only be used and accessed by IT staff or experts knowledgeable in the programming field (Boateng, 2016). In the early 2000s, there was a shift in technology to address the issues above of complexity and time. The newer generation of Business Intelligence tools went through improvements in the following areas including self-service applications, automated reports, visualization and real time data processing. Furthermore, the visualization function evolved to include the needs of end users with little to no training making it simpler and more convenient to everyone. At this point, business intelligence tools were no longer a competitive edge but a necessity for most businesses to run profitably. Another shift in Business Intelligence technology has been the introduction of cloud computing services to provide storage solutions and server infrastructure. Cloud computing has allowed companies to efficiently reuse their companys IT resources while having immediate access to real time data processing. Though still in its infant stages, we expect cloud computing uptake to increase in the next years to come (Accenture, 2010). The use of Business Intelligence tools has become a common feature in industries that rely on data analytics such as healthcare, insurance, finance, law and even SMEs like restaurants. These tools have been designed to meet the specific needs of these industries. For example, within the insurance industry, a business intelligence tool based on historical data may be used to detect and prevent fraud thereby reducing insurance costs. In the future, we expect a further enhancement in the current Business Intelligence tools into simpler tools designed that features in all business process while meeting the needs of its end users. The Common Features of Business Intelligence Tools that support Decision making. Business Intelligence tools have evolved over the last decade from basic collection and organization of data to providing services such as cloud computing, reporting, and visualization. Some typical features of Business Intelligence applications and software include a data warehouse, data discovery tools such as data mining tools, OLAP techniques, cloud computing and reporting tools which are discussed briefly below. Data Warehouse A data warehouse is the core of a Business Intelligence tool. Data warehouses are used for storage and organization of historical data. Some data warehouses also include data management tools that ensure only quality and reliable data is stored and organized. Data warehouses are critical for industries that do a lot of data analytics such as insurance companies. ETL and OLAP Tools ETL tools extract, transform and restructure data into a useful form. Furthermore, data discovery applications like data mining can be used on the data to create custom reports such that a company can use this information to make decisions. The process involves discovering patterns relationships and patterns in the data. This additional feature of Business Intelligence tools make ETL tools more expensive and should be used in conjunction with a data warehouse for optimum results. OLAP tools on other hand provide multi-dimensional analysis of data (Olszak Ziemba , 2006). Reporting and Visualization When it comes to advancements in Business Intelligence, the focus has been on user experience. Reporting tools provide users with simple easy to read reports and visualizations of data. Some examples include quick dashboards, score cards, and report writers. These additional tools help decision makers and end users to generate reports immediately while focusing on key metrics via the use of scorecards. Cloud Computing Services With the introduction of the internet, there was no need for companies to invest in expensive data warehouses and servers. Cloud computing services have allowed companies to efficiently reuse their IT resources while having quick access to real time data (Accenture, 2010). Cloud computing was initially developed for storage solutions and servers infrastructure. However, with time, their functions have expanded to include businesses support functions such as office and email, customer service, web conferencing facilities, enterprise applications, project planning and other functions (Edara Kandagatla, 2012). Conclusion We are now at a point where data has become a critical component of a companys decision making process. Consequently, business intelligence tools are now a common feature in many businesses due to their capabilities to analyze data into useful information. Business Intelligence tools have evolved from the complex tools that most people knew them as in the 90s, to simpler user friendly tools. As technology continues to advance, we expect Business Intelligence tools to become simpler and more collaborative in the process. Furthermore, we expect the take up of Business Intelligence tools to increase in the coming years with most companies implementing these applications in the next few years. References Accenture. (2010). How Cloud Computing will Transform Insurance. Retrieved from Accenture: https://insuranceblog.accenture.com/wp-content/uploads/2013/07/Cloud_for_Insurance_POV_Final.pdf Boateng, C. (2016, September 6). Informative Stats: The Growth and Value of Business Intelligence. Retrieved from Christian Seven: https://go.christiansteven.com/informative-stats-the-growth-and-value-of-business-intelligence Castellanos, M., Dayal, U., Simitsis, A., Wilkinson, K. (2009). Proceedings of the 12th International Conference on Extending Database Technology: Advaces in Database Technology. Retrieved from https://icdt.tu-dortmund.de/proceedings/edbticdt2009proc/edbt/papers/p0001-Dayal.pdf Edara, S., Kandagatla, R. (2012). Cloud Computing in the Property . Retrieved from Capgemini: https://www.cn.capgemini.com/resource-file-access/resource/pdf/Cloud_Computing_in_the_Property___Casualty_Insurance_Industry.pdf Olszak, C. M., Ziemba , E. (2006). Business intelligence systems in the holistic infrastructure development supporting decision-making in organizations. nterdisciplinary Journal of Information, Knowledge and Management, 47-58.