Competitive Intelligence and the corporate jewels

David Mark
{"title":"Competitive Intelligence and the corporate jewels","authors":"David Mark","doi":"10.1002/(SICI)1520-6386(199723)8:3<62::AID-CIR13>3.0.CO;2-8","DOIUrl":null,"url":null,"abstract":"<p>The end of the Cold War shifted strategic and tactical foreign policy priorities from traditional superpower and client concerns to those reflecting national economic competitiveness, especially commercial and technology-related information. But while the threat of illegal industrial espionage has increased, so too has the new threat of legal—and systematic—competitive intelligence (CI) efforts by foreign and domestic competitors. Corporate efforts to protect proprietary information, the author argues, have tended to follow the classified-protection model developed to thwart clandestine or illegal intelligence operations, leaving firms unprepared to defend against an organized CI collection effort that analyzes information routinely gathered in the course of the target company's daily business activities. Companies must continue to use physical security against illegal threats while redirecting their thinking to CI protection strategies. It is important to realize that your company will and should lose information if it is effectively carrying out its business operations, and to shift from <i>risk avoidance</i> to <i>risk management</i>. The defensive key is to identify what is absolutely critical for the firm's survival or competitiveness—the “corporate jewels”—and then take action to limit their vulnerability to competitor CI collection. The military's five-step Operations Security (OPSEC) approach for assessing risk and establishing countermeasures can be adapted for competitive intelligence. Also, thinking about counterintelligence should move away from the government-clandestine model to an approach based on Counter-Competitor Intelligence (CCI)—seeking to learn during routine CI activities what intelligence activities competitors are directing at your company, and to analyze any damage. © 1997 John Wiley &amp; Sons, Inc.</p>","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 3","pages":"62-70"},"PeriodicalIF":0.0000,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199723)8:3<62::AID-CIR13>3.0.CO;2-8","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Competitive Intelligence Review","FirstCategoryId":"1085","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/%28SICI%291520-6386%28199723%298%3A3%3C62%3A%3AAID-CIR13%3E3.0.CO%3B2-8","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7

Abstract

The end of the Cold War shifted strategic and tactical foreign policy priorities from traditional superpower and client concerns to those reflecting national economic competitiveness, especially commercial and technology-related information. But while the threat of illegal industrial espionage has increased, so too has the new threat of legal—and systematic—competitive intelligence (CI) efforts by foreign and domestic competitors. Corporate efforts to protect proprietary information, the author argues, have tended to follow the classified-protection model developed to thwart clandestine or illegal intelligence operations, leaving firms unprepared to defend against an organized CI collection effort that analyzes information routinely gathered in the course of the target company's daily business activities. Companies must continue to use physical security against illegal threats while redirecting their thinking to CI protection strategies. It is important to realize that your company will and should lose information if it is effectively carrying out its business operations, and to shift from risk avoidance to risk management. The defensive key is to identify what is absolutely critical for the firm's survival or competitiveness—the “corporate jewels”—and then take action to limit their vulnerability to competitor CI collection. The military's five-step Operations Security (OPSEC) approach for assessing risk and establishing countermeasures can be adapted for competitive intelligence. Also, thinking about counterintelligence should move away from the government-clandestine model to an approach based on Counter-Competitor Intelligence (CCI)—seeking to learn during routine CI activities what intelligence activities competitors are directing at your company, and to analyze any damage. © 1997 John Wiley & Sons, Inc.

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
竞争情报与企业珠宝
冷战结束后,战略和战术外交政策的重点从传统的超级大国和客户关注转向反映国家经济竞争力的问题,特别是商业和技术相关信息。但是,尽管非法工业间谍活动的威胁有所增加,但国内外竞争对手在合法和系统的竞争情报方面的新威胁也在增加。作者认为,公司保护专有信息的努力往往遵循为挫败秘密或非法情报行动而开发的机密保护模式,使公司没有准备好抵御有组织的CI收集工作,该工作分析目标公司日常商业活动中经常收集的信息。公司必须继续使用物理安全来应对非法威胁,同时将思维转向CI保护策略。重要的是要认识到,如果你的公司有效地开展业务运营,它将而且应该丢失信息,并从风险规避转向风险管理。防御的关键是确定对公司的生存或竞争力至关重要的东西——“企业珠宝”——然后采取行动限制其对竞争对手CI收集的脆弱性。军方评估风险和制定对策的五步行动安全(OPSEC)方法可以适用于竞争情报。此外,反间谍的思考应该从政府的秘密模式转向基于反竞争对手情报(CCI)的方法——在日常的CI活动中了解竞争对手针对你公司的情报活动,并分析任何损害。©1997 John Wiley&;股份有限公司。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
PERANCANGAN SISTEM INFORMASI E-OFFICE BERBASIS WEB DENGAN MENGGUNAKAN METODE RAD PENERAPAN APLIKASI PELAYANAN PUBLIK PADA PENDAFTARAN NPWP SECARA E-REGISTRATION SISTEM PAYLATER DALAM E-COMMERCE: PENGARUHNYA TERHADAP PERILAKU IMPULSE BUYING INTEGRAGSI TECHNOLOGY ACCEPTANCE MODEL DAN UNIFIED THEORY OF ACCEPTANCE AND USE OF TECHNOLOGY 2 UNTUK MENGUKUR MINAT PENGGUNA APLIKASI POSPAY DI BANDA ACEH ANALISIS PENGENDALIAN PERSEDIAAN BAHAN BAKU JERAMI UNTUK PRODUKSI JAMUR CHAMPIGNON DENGAN MENGGUNAKAN METODE ECONOMIC ORDER QUANTITY (EOQ)
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1