Millennium Intelligence: Understanding and Conducting Competitive Intelligence in the Digital Age / Edition 1
by Jerry P. Miller
Competitive intelligence doesn’t just mean a trip to the local store to see the competition’s finished products—it means gathering business information to gain an advantage in a legal and ethical manner. This book teaches what competitive intelligence is, what a company needs to have a successful intelligence program, where to place an…
See more details below
Overview
Competitive intelligence doesn’t just mean a trip to the local store to see the competition’s finished products—it means gathering business information to gain an advantage in a legal and ethical manner. This book teaches what competitive intelligence is, what a company needs to have a successful intelligence program, where to place an intelligence program, and what sources to use and not use for intelligence. Technology, analysis, and security issues of intelligence are also identified and explored.
Product Details
- ISBN-13:
- 9780910965286
- Publisher:
- Information Today, Inc.
- Publication date:
- 02/01/2000
- Edition description:
- New Edition
- Pages:
- 276
- Product dimensions:
- 7.00(w) x 9.50(h) x 0.65(d)
Table of Contents
Foreword | 1 | |
Introduction: Competitive Intelligence--No Witchcraft Here, Just Business Savvy | 3 | |
Chapter 1 | The Intelligence Process--What It Is, Its Benefits, and Current Status | 9 |
Why Conduct Intelligence? | 9 | |
The Intelligence Process Defined | 12 | |
The Four-Phased Intelligence Cycle | 14 | |
The Various Roles Involved in Conducting Intelligence | 16 | |
The Benefits of the Intelligence Process | 18 | |
The Current Status of the Intelligence Profession | 22 | |
Chapter 2 | The Birth and Growth of Your Intelligence Process--Behavioral, Cultural, and Structural Factors | 31 |
How the Intelligence Process Typically Emerges Within a Firm | 31 | |
Behavioral, Cultural, and Structural Issues Critical to Intelligence | 32 | |
The Company that Couldn't Communicate | 33 | |
The Brain Dead Corporation | 34 | |
The Pat Answer Man | 35 | |
Information | 35 | |
Integration | 36 | |
Access | 37 | |
Decision-Making Styles | 38 | |
How to Change Behaviors and Corporate Cultures | 38 | |
Cultural Values to Pursue | 40 | |
Chapter 3 | Deciding Where to Locate the Intelligence Unit | 43 |
Determining Factors | 44 | |
Best Practices | 46 | |
Organizational Options | 47 | |
Lines of Reporting: Pros and Cons | 50 | |
The Ultimate Deciding Factor: Where Is Intelligence Necessary for Decision Support? | 53 | |
Chapter 4 | Skills and Training for Intelligence | 55 |
Necessary Professional Competencies | 55 | |
Evolution of the Profession | 56 | |
Skills and Sources | 58 | |
Inherent Personal Traits | 60 | |
Training/Education | 60 | |
Experience | 60 | |
Mentors | 60 | |
Different Paths into Intelligence | 61 | |
Curricular Modules for Intelligence Programs | 62 | |
Why Academics Should Teach Intelligence | 65 | |
Training Programs for Intelligence Practitioners | 66 | |
Chapter 5 | Analytical Models and Techniques | 69 |
Finding the Focus for Intelligence | 70 | |
Analyzing Your Industry | 71 | |
The "Five Forces" Model | 71 | |
Growth-Share Matrix | 74 | |
Critical Success Factors | 76 | |
Analyzing Your Company | 78 | |
Analyzing Your Competitors | 79 | |
Competitor Profiling | 79 | |
Benchmarking and Gap Analysis | 80 | |
Core Competencies | 83 | |
Patent Citation Analysis | 86 | |
Swot Analysis | 90 | |
Value Chain Analysis | 92 | |
Intelligence and Bean Counting: Analysis and Accounting Models | 93 | |
Activity-Based Costing | 93 | |
Economic Value Management | 94 | |
Summary | 95 | |
Chapter 6 | Information Resources for Intelligence | 97 |
General Business Resources | 98 | |
Print: The Traditional Resource | 98 | |
Commercial Online Services: The First Wave of Electronic Resources | 99 | |
The Internet: A Maturing Technology | 100 | |
CD-ROMs: A Price to Be Paid | 102 | |
Company-Specific Resources | 103 | |
Jobs Posting: Window on a Corporate Soul | 108 | |
Industry-Specific Resources | 109 | |
News Resources | 113 | |
International Resources | 114 | |
Government Resources | 117 | |
Patent Resources | 119 | |
Intelligence-Specific Resources | 120 | |
Books About Business and Competitor Intelligence | 121 | |
Strategy-Focused Books | 122 | |
The Road Ahead: A Resource-Rich Future | 122 | |
Primary Research | 124 | |
Interviewing People: Some Basic Rules | 124 | |
The Power of Interviews | 126 | |
People Outside Your Company | 127 | |
Unpublished Documents | 128 | |
Observing Competitors | 129 | |
Chapter 7 | The Information Technology Marketplace | 133 |
Key Information System Activities | 134 | |
Outside Printed Information | 135 | |
Internally Available Information | 137 | |
Intelligence Products | 137 | |
Collection and Analysis Activities | 138 | |
Feedback and Archives | 138 | |
Creating and Maintaining Information Balance | 139 | |
Organizational Impact | 141 | |
System Development Guidelines | 141 | |
Technology Options | 142 | |
143 | ||
Text | 143 | |
Profiling/Push Technology | 145 | |
Filtering/Agent Technology | 146 | |
Groupware | 147 | |
Document Management | 147 | |
Imaging Software | 148 | |
Analysis and Structure | 148 | |
Portals | 149 | |
Recent Trends Impacting Information Systems | 149 | |
Knowledge Management | 149 | |
Business Intelligence and Document Mining | 150 | |
Internets, Intranets, and Extranets | 151 | |
Summing Up | 152 | |
Additional Resources | 152 | |
Consultants in the Knowledge Management Technology Area | 152 | |
Corporate Knowledge Information Systems Reported in the Press | 153 | |
Software Companies and their Web Sites | 153 | |
Chapter 8 | Knowledge Management and Intelligence Functions--A Symbiotic Relationship | 155 |
A Look at Knowledge Management | 157 | |
Core Knowledge Management Processes: Finding Synergies with Intelligence Functions | 158 | |
Identifying Subject Matter Experts | 158 | |
Identifying Sources of Intellectual Capital | 158 | |
Balancing a Need for New Processes with Respect for Organizational Culture | 158 | |
Applying Technology to Support the Process | 158 | |
The Difference Between Knowledge Management and Intelligence | 160 | |
Implementing Intelligence Functions as an Element of Knowledge Management | 162 | |
Developments in Knowledge Management and Intelligence Tools | 164 | |
Basic Functionalities of Knowledge Management Tools | 164 | |
Intelligence Applications Enter the Mainstream | 165 | |
An Inevitable Convergence | 166 | |
Additional Resources | 168 | |
Chapter 9 | Intelligence and the Law | 171 |
Part I | The Legal Aspects of Intelligence | 171 |
Civil Liability for Trade Secret Misappropriation and Related Claims | 172 | |
Background: The Law of Trade Secrets | 172 | |
What Are Trade Secrets? | 172 | |
How Are Trade Secrets Different from Patent and Copyright? | 173 | |
The Basic Rule of Trade Secret Law | 173 | |
What Cannot Be Claimed as a Trade Secret? | 174 | |
Elements of a Trade Secret | 175 | |
Secrecy | 175 | |
Value | 175 | |
Reasonable Efforts by the Owner | 175 | |
Misappropriation | 176 | |
Breach of Confidence | 176 | |
Improper Means (Intelligence vs. Espionage) | 176 | |
Damage Awards and Other Consequences of Litigation | 177 | |
Other Laws That May Apply | 178 | |
Inducement | 178 | |
Fraud | 178 | |
Invasion of Privacy | 178 | |
Unfair Competition | 179 | |
Copyright Infringement | 179 | |
Avoiding Lawsuits: A Checklist for Fair Conduct | 180 | |
Keep Your Ethical Compass | 180 | |
Be Smart Before Sneaky | 180 | |
Keep Thorough Records | 180 | |
If You Stumble on Someone Else's Property, Get Help | 180 | |
Raise Your Standards in High-Risk Situations | 180 | |
Part II | Criminal Liability for Trade Secret Misappropriation | 181 |
An Overview of the Economic Espionage Act (EEA) | 181 | |
Implications of the EEA for Intelligence Professionals | 185 | |
Chapter 10 | Conducting Intelligence Ethically | 189 |
Distinctions Between Ethical and Legal Behavior in Intelligence | 189 | |
Guidelines for Business Conduct | 190 | |
Guidelines for the Ethical Collection and Dissemination of Intelligence | 191 | |
Information Gathering Outside the U.S. | 192 | |
Public Information | 192 | |
Information Gathering Methods | 192 | |
Reverse Engineering | 192 | |
Right to Protect Proprietary Information | 192 | |
Responsibility for Agents' Actions | 193 | |
Disclosure and Use by the Firm | 193 | |
Bribery | 193 | |
Trespass | 193 | |
Misrepresentation | 193 | |
Photographs | 193 | |
Questionable Information | 193 | |
Guidelines for the Protection of Trade Secrets and Other Intellectual Property | 194 | |
Intelligence Ethics: Case Histories and Commentary | 196 | |
Case #1 | The Vendor | 196 |
Case #2 | Eavesdropping | 197 |
Case #3 | The New Hire | 198 |
Case #4 | The Candidate | 199 |
SCIP Code of Ethics | 200 | |
Summary/Recommendations | 200 | |
Chapter 11 | Intelligence and Security | 203 |
Part I | Intelligence and Security in Business | 204 |
The Foundation of Counterintelligence and Security | 204 | |
The Proper Location of the Protection Function | 206 | |
The Protection Process | 206 | |
The Counterintelligence Approach | 208 | |
The Component Parts of the Protection Process | 210 | |
Requirements Definition | 210 | |
Assessing the Competition | 210 | |
Vulnerability Assessment | 210 | |
Countermeasures Development | 211 | |
Analysis | 212 | |
Dissemination | 212 | |
Integration of the Protection Process into the Business Model | 213 | |
The Tools Used in the Protection Process | 216 | |
Part II | Operations Security and Competitive Intelligence Countermeasures | 219 |
Why Industrial Espionage Is on the Rise | 219 | |
Elements of the Operations Security Process | 221 | |
Identification of Critical Information | 222 | |
Threat Analysis | 222 | |
Vulnerabilities Analysis | 222 | |
Risk Assessment | 223 | |
Applications of Appropriate Countermeasures | 223 | |
Chapter 12 | Small Business Intelligence--People Make It Happen | 225 |
How Successful Small Firms Practice Intelligence | 225 | |
Short Case Studies | 228 | |
Northern Light Technology LLC | 228 | |
Ferranti-Dege, Inc. | 229 | |
Circle Z Ranch | 230 | |
Red Storm Entertainment, Inc. | 231 | |
Forrester Research | 232 | |
Infonautics | 232 | |
Emma's Pizza | 233 | |
Texas Nameplate Company, Inc. | 233 | |
Specialty Cheese Company | 234 | |
What You Can Learn from These Small Firms | 235 | |
Chapter 13 | Millennium Intelligence--The Future | 239 |
Part I | Where Is the Society of Competitive Intelligence Professionals Going? | 239 |
Part II | Where Is the Intelligence Profession Going? | 243 |
Biographies: The Business Intelligence Braintrust | 247 | |
Bibliography | 257 | |
Index | 265 |
Customer Reviews
Average Review: