Millennium Intelligence: Understanding and Conducting Competitive Intelligence in the Digital Age / Edition 1

Millennium Intelligence: Understanding and Conducting Competitive Intelligence in the Digital Age / Edition 1

by Jerry P. Miller
     
 


Competitive intelligence doesn’t just mean a trip to the local store to see the competition’s finished products—it means gathering business information to gain an advantage in a legal and ethical manner. This book teaches what competitive intelligence is, what a company needs to have a successful intelligence program, where to place an… See more details below

Overview


Competitive intelligence doesn’t just mean a trip to the local store to see the competition’s finished products—it means gathering business information to gain an advantage in a legal and ethical manner. This book teaches what competitive intelligence is, what a company needs to have a successful intelligence program, where to place an intelligence program, and what sources to use and not use for intelligence. Technology, analysis, and security issues of intelligence are also identified and explored.

Product Details

ISBN-13:
9780910965286
Publisher:
Information Today, Inc.
Publication date:
02/01/2000
Edition description:
New Edition
Pages:
276
Product dimensions:
7.00(w) x 9.50(h) x 0.65(d)

Table of Contents

Foreword1
Introduction: Competitive Intelligence--No Witchcraft Here, Just Business Savvy3
Chapter 1The Intelligence Process--What It Is, Its Benefits, and Current Status9
Why Conduct Intelligence?9
The Intelligence Process Defined12
The Four-Phased Intelligence Cycle14
The Various Roles Involved in Conducting Intelligence16
The Benefits of the Intelligence Process18
The Current Status of the Intelligence Profession22
Chapter 2The Birth and Growth of Your Intelligence Process--Behavioral, Cultural, and Structural Factors31
How the Intelligence Process Typically Emerges Within a Firm31
Behavioral, Cultural, and Structural Issues Critical to Intelligence32
The Company that Couldn't Communicate33
The Brain Dead Corporation34
The Pat Answer Man35
Information35
Integration36
Access37
Decision-Making Styles38
How to Change Behaviors and Corporate Cultures38
Cultural Values to Pursue40
Chapter 3Deciding Where to Locate the Intelligence Unit43
Determining Factors44
Best Practices46
Organizational Options47
Lines of Reporting: Pros and Cons50
The Ultimate Deciding Factor: Where Is Intelligence Necessary for Decision Support?53
Chapter 4Skills and Training for Intelligence55
Necessary Professional Competencies55
Evolution of the Profession56
Skills and Sources58
Inherent Personal Traits60
Training/Education60
Experience60
Mentors60
Different Paths into Intelligence61
Curricular Modules for Intelligence Programs62
Why Academics Should Teach Intelligence65
Training Programs for Intelligence Practitioners66
Chapter 5Analytical Models and Techniques69
Finding the Focus for Intelligence70
Analyzing Your Industry71
The "Five Forces" Model71
Growth-Share Matrix74
Critical Success Factors76
Analyzing Your Company78
Analyzing Your Competitors79
Competitor Profiling79
Benchmarking and Gap Analysis80
Core Competencies83
Patent Citation Analysis86
Swot Analysis90
Value Chain Analysis92
Intelligence and Bean Counting: Analysis and Accounting Models93
Activity-Based Costing93
Economic Value Management94
Summary95
Chapter 6Information Resources for Intelligence97
General Business Resources98
Print: The Traditional Resource98
Commercial Online Services: The First Wave of Electronic Resources99
The Internet: A Maturing Technology100
CD-ROMs: A Price to Be Paid102
Company-Specific Resources103
Jobs Posting: Window on a Corporate Soul108
Industry-Specific Resources109
News Resources113
International Resources114
Government Resources117
Patent Resources119
Intelligence-Specific Resources120
Books About Business and Competitor Intelligence121
Strategy-Focused Books122
The Road Ahead: A Resource-Rich Future122
Primary Research124
Interviewing People: Some Basic Rules124
The Power of Interviews126
People Outside Your Company127
Unpublished Documents128
Observing Competitors129
Chapter 7The Information Technology Marketplace133
Key Information System Activities134
Outside Printed Information135
Internally Available Information137
Intelligence Products137
Collection and Analysis Activities138
Feedback and Archives138
Creating and Maintaining Information Balance139
Organizational Impact141
System Development Guidelines141
Technology Options142
E-mail143
Text143
Profiling/Push Technology145
Filtering/Agent Technology146
Groupware147
Document Management147
Imaging Software148
Analysis and Structure148
Portals149
Recent Trends Impacting Information Systems149
Knowledge Management149
Business Intelligence and Document Mining150
Internets, Intranets, and Extranets151
Summing Up152
Additional Resources152
Consultants in the Knowledge Management Technology Area152
Corporate Knowledge Information Systems Reported in the Press153
Software Companies and their Web Sites153
Chapter 8Knowledge Management and Intelligence Functions--A Symbiotic Relationship155
A Look at Knowledge Management157
Core Knowledge Management Processes: Finding Synergies with Intelligence Functions158
Identifying Subject Matter Experts158
Identifying Sources of Intellectual Capital158
Balancing a Need for New Processes with Respect for Organizational Culture158
Applying Technology to Support the Process158
The Difference Between Knowledge Management and Intelligence160
Implementing Intelligence Functions as an Element of Knowledge Management162
Developments in Knowledge Management and Intelligence Tools164
Basic Functionalities of Knowledge Management Tools164
Intelligence Applications Enter the Mainstream165
An Inevitable Convergence166
Additional Resources168
Chapter 9Intelligence and the Law171
Part IThe Legal Aspects of Intelligence171
Civil Liability for Trade Secret Misappropriation and Related Claims172
Background: The Law of Trade Secrets172
What Are Trade Secrets?172
How Are Trade Secrets Different from Patent and Copyright?173
The Basic Rule of Trade Secret Law173
What Cannot Be Claimed as a Trade Secret?174
Elements of a Trade Secret175
Secrecy175
Value175
Reasonable Efforts by the Owner175
Misappropriation176
Breach of Confidence176
Improper Means (Intelligence vs. Espionage)176
Damage Awards and Other Consequences of Litigation177
Other Laws That May Apply178
Inducement178
Fraud178
Invasion of Privacy178
Unfair Competition179
Copyright Infringement179
Avoiding Lawsuits: A Checklist for Fair Conduct180
Keep Your Ethical Compass180
Be Smart Before Sneaky180
Keep Thorough Records180
If You Stumble on Someone Else's Property, Get Help180
Raise Your Standards in High-Risk Situations180
Part IICriminal Liability for Trade Secret Misappropriation181
An Overview of the Economic Espionage Act (EEA)181
Implications of the EEA for Intelligence Professionals185
Chapter 10Conducting Intelligence Ethically189
Distinctions Between Ethical and Legal Behavior in Intelligence189
Guidelines for Business Conduct190
Guidelines for the Ethical Collection and Dissemination of Intelligence191
Information Gathering Outside the U.S.192
Public Information192
Information Gathering Methods192
Reverse Engineering192
Right to Protect Proprietary Information192
Responsibility for Agents' Actions193
Disclosure and Use by the Firm193
Bribery193
Trespass193
Misrepresentation193
Photographs193
Questionable Information193
Guidelines for the Protection of Trade Secrets and Other Intellectual Property194
Intelligence Ethics: Case Histories and Commentary196
Case #1The Vendor196
Case #2Eavesdropping197
Case #3The New Hire198
Case #4The Candidate199
SCIP Code of Ethics200
Summary/Recommendations200
Chapter 11Intelligence and Security203
Part IIntelligence and Security in Business204
The Foundation of Counterintelligence and Security204
The Proper Location of the Protection Function206
The Protection Process206
The Counterintelligence Approach208
The Component Parts of the Protection Process210
Requirements Definition210
Assessing the Competition210
Vulnerability Assessment210
Countermeasures Development211
Analysis212
Dissemination212
Integration of the Protection Process into the Business Model213
The Tools Used in the Protection Process216
Part IIOperations Security and Competitive Intelligence Countermeasures219
Why Industrial Espionage Is on the Rise219
Elements of the Operations Security Process221
Identification of Critical Information222
Threat Analysis222
Vulnerabilities Analysis222
Risk Assessment223
Applications of Appropriate Countermeasures223
Chapter 12Small Business Intelligence--People Make It Happen225
How Successful Small Firms Practice Intelligence225
Short Case Studies228
Northern Light Technology LLC228
Ferranti-Dege, Inc.229
Circle Z Ranch230
Red Storm Entertainment, Inc.231
Forrester Research232
Infonautics232
Emma's Pizza233
Texas Nameplate Company, Inc.233
Specialty Cheese Company234
What You Can Learn from These Small Firms235
Chapter 13Millennium Intelligence--The Future239
Part IWhere Is the Society of Competitive Intelligence Professionals Going?239
Part IIWhere Is the Intelligence Profession Going?243
Biographies: The Business Intelligence Braintrust247
Bibliography257
Index265

Read More

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >