首页 > 最新文献

Competitive Intelligence Review最新文献

英文 中文
Raising the bar of professionalism 提高专业水平
Pub Date : 2007-03-22 DOI: 10.1002/(SICI)1520-6386(199723)8:3<37::AID-CIR10>3.0.CO;2-L
Larry L. Hamilton

Remarks concluding the Society of Competitive Intelligence Professionals' Symposium on the Economic Espionage Act of 1996: The Impact on Global Competitive Intelligence for Business. © 1997 John Wiley & Sons, Inc.

在竞争情报专业人员学会关于《1996年经济间谍法:对全球商业竞争情报的影响》的研讨会结束时发表的讲话。©1997 John Wiley&;股份有限公司。
{"title":"Raising the bar of professionalism","authors":"Larry L. Hamilton","doi":"10.1002/(SICI)1520-6386(199723)8:3<37::AID-CIR10>3.0.CO;2-L","DOIUrl":"https://doi.org/10.1002/(SICI)1520-6386(199723)8:3<37::AID-CIR10>3.0.CO;2-L","url":null,"abstract":"<p>Remarks concluding the Society of Competitive Intelligence Professionals' Symposium on the Economic Espionage Act of 1996: The Impact on Global Competitive Intelligence for Business. © 1997 John Wiley &amp; Sons, Inc.</p>","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 3","pages":"37"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199723)8:3<37::AID-CIR10>3.0.CO;2-L","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71975409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Competitive Intelligence and the corporate jewels 竞争情报与企业珠宝
Pub Date : 2007-03-22 DOI: 10.1002/(SICI)1520-6386(199723)8:3<62::AID-CIR13>3.0.CO;2-8
David Mark

The end of the Cold War shifted strategic and tactical foreign policy priorities from traditional superpower and client concerns to those reflecting national economic competitiveness, especially commercial and technology-related information. But while the threat of illegal industrial espionage has increased, so too has the new threat of legal—and systematic—competitive intelligence (CI) efforts by foreign and domestic competitors. Corporate efforts to protect proprietary information, the author argues, have tended to follow the classified-protection model developed to thwart clandestine or illegal intelligence operations, leaving firms unprepared to defend against an organized CI collection effort that analyzes information routinely gathered in the course of the target company's daily business activities. Companies must continue to use physical security against illegal threats while redirecting their thinking to CI protection strategies. It is important to realize that your company will and should lose information if it is effectively carrying out its business operations, and to shift from risk avoidance to risk management. The defensive key is to identify what is absolutely critical for the firm's survival or competitiveness—the “corporate jewels”—and then take action to limit their vulnerability to competitor CI collection. The military's five-step Operations Security (OPSEC) approach for assessing risk and establishing countermeasures can be adapted for competitive intelligence. Also, thinking about counterintelligence should move away from the government-clandestine model to an approach based on Counter-Competitor Intelligence (CCI)—seeking to learn during routine CI activities what intelligence activities competitors are directing at your company, and to analyze any damage. © 1997 John Wiley & Sons, Inc.

冷战结束后,战略和战术外交政策的重点从传统的超级大国和客户关注转向反映国家经济竞争力的问题,特别是商业和技术相关信息。但是,尽管非法工业间谍活动的威胁有所增加,但国内外竞争对手在合法和系统的竞争情报方面的新威胁也在增加。作者认为,公司保护专有信息的努力往往遵循为挫败秘密或非法情报行动而开发的机密保护模式,使公司没有准备好抵御有组织的CI收集工作,该工作分析目标公司日常商业活动中经常收集的信息。公司必须继续使用物理安全来应对非法威胁,同时将思维转向CI保护策略。重要的是要认识到,如果你的公司有效地开展业务运营,它将而且应该丢失信息,并从风险规避转向风险管理。防御的关键是确定对公司的生存或竞争力至关重要的东西——“企业珠宝”——然后采取行动限制其对竞争对手CI收集的脆弱性。军方评估风险和制定对策的五步行动安全(OPSEC)方法可以适用于竞争情报。此外,反间谍的思考应该从政府的秘密模式转向基于反竞争对手情报(CCI)的方法——在日常的CI活动中了解竞争对手针对你公司的情报活动,并分析任何损害。©1997 John Wiley&;股份有限公司。
{"title":"Competitive Intelligence and the corporate jewels","authors":"David Mark","doi":"10.1002/(SICI)1520-6386(199723)8:3<62::AID-CIR13>3.0.CO;2-8","DOIUrl":"https://doi.org/10.1002/(SICI)1520-6386(199723)8:3<62::AID-CIR13>3.0.CO;2-8","url":null,"abstract":"<p>The end of the Cold War shifted strategic and tactical foreign policy priorities from traditional superpower and client concerns to those reflecting national economic competitiveness, especially commercial and technology-related information. But while the threat of illegal industrial espionage has increased, so too has the new threat of legal—and systematic—competitive intelligence (CI) efforts by foreign and domestic competitors. Corporate efforts to protect proprietary information, the author argues, have tended to follow the classified-protection model developed to thwart clandestine or illegal intelligence operations, leaving firms unprepared to defend against an organized CI collection effort that analyzes information routinely gathered in the course of the target company's daily business activities. Companies must continue to use physical security against illegal threats while redirecting their thinking to CI protection strategies. It is important to realize that your company will and should lose information if it is effectively carrying out its business operations, and to shift from <i>risk avoidance</i> to <i>risk management</i>. The defensive key is to identify what is absolutely critical for the firm's survival or competitiveness—the “corporate jewels”—and then take action to limit their vulnerability to competitor CI collection. The military's five-step Operations Security (OPSEC) approach for assessing risk and establishing countermeasures can be adapted for competitive intelligence. Also, thinking about counterintelligence should move away from the government-clandestine model to an approach based on Counter-Competitor Intelligence (CCI)—seeking to learn during routine CI activities what intelligence activities competitors are directing at your company, and to analyze any damage. © 1997 John Wiley &amp; Sons, Inc.</p>","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 3","pages":"62-70"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199723)8:3<62::AID-CIR13>3.0.CO;2-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71976508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
How to find market research online 如何在线查找市场调查
Pub Date : 2007-03-22 DOI: 10.1002/(SICI)1520-6386(199723)8:3<99::AID-CIR24>3.0.CO;2-P
John McGonagle
{"title":"How to find market research online","authors":"John McGonagle","doi":"10.1002/(SICI)1520-6386(199723)8:3<99::AID-CIR24>3.0.CO;2-P","DOIUrl":"https://doi.org/10.1002/(SICI)1520-6386(199723)8:3<99::AID-CIR24>3.0.CO;2-P","url":null,"abstract":"","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 3","pages":"99"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199723)8:3<99::AID-CIR24>3.0.CO;2-P","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71923143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The prime directive 基本指令
Pub Date : 2007-03-22 DOI: 10.1002/(SICI)1520-6386(199723)8:3<1::AID-CIR1>3.0.CO;2-C
Wayne A. Rosenkrans Jr.
{"title":"The prime directive","authors":"Wayne A. Rosenkrans Jr.","doi":"10.1002/(SICI)1520-6386(199723)8:3<1::AID-CIR1>3.0.CO;2-C","DOIUrl":"https://doi.org/10.1002/(SICI)1520-6386(199723)8:3<1::AID-CIR1>3.0.CO;2-C","url":null,"abstract":"","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 3","pages":"1"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199723)8:3<1::AID-CIR1>3.0.CO;2-C","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71981046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
askSam: The swiss army knife of file management askSam:档案管理的瑞士军刀
Pub Date : 2007-03-22 DOI: 10.1002/(SICI)1520-6386(199723)8:3<95::AID-CIR21>3.0.CO;2-1
Tim Powell
{"title":"askSam: The swiss army knife of file management","authors":"Tim Powell","doi":"10.1002/(SICI)1520-6386(199723)8:3<95::AID-CIR21>3.0.CO;2-1","DOIUrl":"https://doi.org/10.1002/(SICI)1520-6386(199723)8:3<95::AID-CIR21>3.0.CO;2-1","url":null,"abstract":"","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 3","pages":"95-96"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199723)8:3<95::AID-CIR21>3.0.CO;2-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71943600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Competitive Intelligence library 竞争情报库
Pub Date : 2007-03-22 DOI: 10.1002/(SICI)1520-6386(199724)8:4<90::AID-CIR20>3.0.CO;2-3
Kathleen J. Johnson
{"title":"Competitive Intelligence library","authors":"Kathleen J. Johnson","doi":"10.1002/(SICI)1520-6386(199724)8:4<90::AID-CIR20>3.0.CO;2-3","DOIUrl":"https://doi.org/10.1002/(SICI)1520-6386(199724)8:4<90::AID-CIR20>3.0.CO;2-3","url":null,"abstract":"","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 4","pages":"90-93"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199724)8:4<90::AID-CIR20>3.0.CO;2-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71975413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
When customer's lack of knowledge is your biggest competitive threat 当客户缺乏知识是您最大的竞争威胁时
Pub Date : 2007-03-22 DOI: 10.1002/(SICI)1520-6386(199724)8:4<78::AID-CIR12>3.0.CO;2-X
Deborah C. Sawyer
{"title":"When customer's lack of knowledge is your biggest competitive threat","authors":"Deborah C. Sawyer","doi":"10.1002/(SICI)1520-6386(199724)8:4<78::AID-CIR12>3.0.CO;2-X","DOIUrl":"https://doi.org/10.1002/(SICI)1520-6386(199724)8:4<78::AID-CIR12>3.0.CO;2-X","url":null,"abstract":"","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 4","pages":"78-79"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199724)8:4<78::AID-CIR12>3.0.CO;2-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71974291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using the internet for competitive intelligence: A survey report 利用互联网获取竞争情报:一份调查报告
Pub Date : 2007-03-22 DOI: 10.1002/(SICI)1520-6386(199724)8:4<41::AID-CIR7>3.0.CO;2-7
Jean L. Graef

A survey of CI professionals reveals that the primary use of the Internet in competitive intelligence involves reducing costs and improving the quality of primary and secondary information. However, there is also significant interest among CI practitioners in using the Internet to collect information that will help generate additional revenues, including data related to the development of new products or services. A substantial number of respondents believe that such uses of the Internet can help the company to recognize the value of the CI function. Many CI professionals also are involved in helping create a strategic plan for the Internet and/or developing company or department Web sites. © 1997 John Wiley & Sons, Inc.

一项针对CI专业人员的调查显示,互联网在竞争情报中的主要用途包括降低成本和提高初级和次级信息的质量。然而,CI从业者也对利用互联网收集有助于产生额外收入的信息,包括与新产品或服务开发相关的数据非常感兴趣。相当多的受访者认为,互联网的这种使用可以帮助公司认识到CI功能的价值。许多CI专业人士还参与帮助制定互联网战略计划和/或开发公司或部门网站。©1997 John Wiley&;股份有限公司。
{"title":"Using the internet for competitive intelligence: A survey report","authors":"Jean L. Graef","doi":"10.1002/(SICI)1520-6386(199724)8:4<41::AID-CIR7>3.0.CO;2-7","DOIUrl":"https://doi.org/10.1002/(SICI)1520-6386(199724)8:4<41::AID-CIR7>3.0.CO;2-7","url":null,"abstract":"<p>A survey of CI professionals reveals that the primary use of the Internet in competitive intelligence involves reducing costs and improving the quality of primary and secondary information. However, there is also significant interest among CI practitioners in using the Internet to collect information that will help generate additional revenues, including data related to the development of new products or services. A substantial number of respondents believe that such uses of the Internet can help the company to recognize the value of the CI function. Many CI professionals also are involved in helping create a strategic plan for the Internet and/or developing company or department Web sites. © 1997 John Wiley &amp; Sons, Inc.</p>","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 4","pages":"41-47"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199724)8:4<41::AID-CIR7>3.0.CO;2-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71975403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Doing business in the new world disorder: Assessing, understanding, and effectively responding to the challenges of social and poliltical instability within emerging markets 在新的世界混乱中做生意:评估、理解并有效应对新兴市场社会和政治不稳定的挑战
Pub Date : 2007-03-22 DOI: 10.1002/(SICI)1520-6386(199724)8:4<12::AID-CIR4>3.0.CO;2-G
Guntram F. A. Werther

Failure to understand the social and political dynamics of countries and regions is one of the primary causes of business failures within overseas markets. In the past several years, it has cost companies billions of dollars in wasted time, effort, and investment. Succeeding within the “New World Disorder” requires that executives and managers bring new multi-disciplinary skills to their analyses of how societies react to foreign investment and change. Successfully developing areas share specific characteristics that most societies do not possess, and are unlikely to gain within any reasonable time period. In consequence, metropole development—rather than global, regional, or national development—is the rule. A key skill will lie in correctly predicting where growth is likely, and where it is not. Developing useful insights from appropriate analytical skills requires both comparative and case study competencies, a good sense of history, and a commitment to spending as much effort on mastering relevant social, political, and cultural knowledge as one spends on product development. Since the post-Cold War world is very different from the rest of the 20th century, failure to understand the nature and consequences of these differences will generate business failure well into the 21st century. Successful companies will be those that integrate traditional business skills with social science competencies to produce winning analyses of change. © 1997 John Wiley & Sons, Inc.

未能了解国家和地区的社会和政治动态是海外市场商业失败的主要原因之一。在过去的几年里,它浪费了公司数十亿美元的时间、精力和投资。在“新世界混乱”中取得成功需要高管和管理人员在分析社会对外国投资和变化的反应时引入新的多学科技能。成功发展的地区具有大多数社会所不具备的特定特征,在任何合理的时间内都不太可能获得。因此,大都市的发展——而不是全球、区域或国家的发展——才是规律。一项关键技能在于正确预测哪里可能增长,哪里不可能增长。从适当的分析技能中获得有用的见解需要具备比较能力和案例研究能力,具有良好的历史感,并致力于在掌握相关的社会、政治和文化知识方面投入与在产品开发上投入一样多的精力。由于冷战后的世界与20世纪其他地区大不相同,如果不了解这些差异的性质和后果,将导致21世纪的商业失败。成功的公司将是那些将传统商业技能与社会科学能力相结合,对变革进行成功分析的公司。©1997 John Wiley&;股份有限公司。
{"title":"Doing business in the new world disorder: Assessing, understanding, and effectively responding to the challenges of social and poliltical instability within emerging markets","authors":"Guntram F. A. Werther","doi":"10.1002/(SICI)1520-6386(199724)8:4<12::AID-CIR4>3.0.CO;2-G","DOIUrl":"https://doi.org/10.1002/(SICI)1520-6386(199724)8:4<12::AID-CIR4>3.0.CO;2-G","url":null,"abstract":"<p>Failure to understand the social and political dynamics of countries and regions is one of the primary causes of business failures within overseas markets. In the past several years, it has cost companies billions of dollars in wasted time, effort, and investment. Succeeding within the “New World Disorder” requires that executives and managers bring new multi-disciplinary skills to their analyses of how societies react to foreign investment and change. Successfully developing areas share specific characteristics that most societies do not possess, and are unlikely to gain within any reasonable time period. In consequence, metropole development—rather than global, regional, or national development—is the rule. A key skill will lie in correctly predicting where growth is likely, and where it is not. Developing useful insights from appropriate analytical skills requires both comparative and case study competencies, a good sense of history, and a commitment to spending as much effort on mastering relevant social, political, and cultural knowledge as one spends on product development. Since the post-Cold War world is very different from the rest of the 20th century, failure to understand the nature and consequences of these differences will generate business failure well into the 21st century. Successful companies will be those that integrate traditional business skills with social science competencies to produce winning analyses of change. © 1997 John Wiley &amp; Sons, Inc.</p>","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 4","pages":"12-18"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199724)8:4<12::AID-CIR4>3.0.CO;2-G","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71975407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Confusing counterintelligence with security can wreck your afternoon 将反间谍与安全混为一谈可能会破坏你的下午
Pub Date : 2007-03-22 DOI: 10.1002/(SICI)1520-6386(199723)8:3<53::AID-CIR12>3.0.CO;2-D
John A. Nolan III

Typically, there is little linkage between a firm's intelligence collection and security functions. Nevertheless, counterintelligence measures often are relegated to security personnel, if they're thought about at all. But while security seeks to protect a firm's assets by a combination of policies, procedures and practices, counterintelligence, properly understood, aims to engage and neutralize a competitor's collection efforts through a variety of imaginative, flexible, and active measures. An organized counterintelligence approach, such as the Business Intelligence Collection ModelSM described here, can help ensure CI/counterintelligence integration. This process involves defining what needs to be protected, for how long, and from whom; assessing the rival's CI collection capabilities; testing and managing your firm's vulnerability to the rival's collection methods; developing and implementing aggressive countermeasures (including disinformation); analyzing the results; and integrating this information with data from the CI side of the process, thereby providing management with a more complete intelligence picture of the marketplace (revealing what the competition is trying to collect, for instance, is often an early indicator of where they're headed as a company). A case study is provided. © 1997 John Wiley & Sons, Inc.

通常,公司的情报收集和安全职能之间几乎没有联系。尽管如此,反间谍措施往往被降级到安全人员,如果他们考虑的话。但是,尽管安全旨在通过政策、程序和实践的结合来保护公司的资产,但正确理解的反间谍旨在通过各种富有想象力、灵活和积极的措施来参与和压制竞争对手的收集工作。有组织的反间谍方法,如这里描述的商业情报收集模型SM,可以帮助确保CI/反间谍集成。这一过程包括确定需要保护的内容、保护时间和保护对象;评估竞争对手的CI收集能力;测试和管理您的公司对竞争对手收集方法的脆弱性;制定和实施积极的反措施(包括虚假信息);分析结果;并将这些信息与流程CI方面的数据集成,从而为管理层提供更完整的市场情报(例如,揭示竞争对手试图收集的信息往往是他们作为一家公司走向何方的早期指标)。提供了一个案例研究。©1997 John Wiley&;股份有限公司。
{"title":"Confusing counterintelligence with security can wreck your afternoon","authors":"John A. Nolan III","doi":"10.1002/(SICI)1520-6386(199723)8:3<53::AID-CIR12>3.0.CO;2-D","DOIUrl":"https://doi.org/10.1002/(SICI)1520-6386(199723)8:3<53::AID-CIR12>3.0.CO;2-D","url":null,"abstract":"<p>Typically, there is little linkage between a firm's intelligence collection and security functions. Nevertheless, counterintelligence measures often are relegated to security personnel, if they're thought about at all. But while security seeks to protect a firm's assets by a combination of policies, procedures and practices, counterintelligence, properly understood, aims to engage and neutralize a competitor's collection efforts through a variety of imaginative, flexible, and active measures. An organized counterintelligence approach, such as the Business Intelligence Collection Model<sup>SM</sup> described here, can help ensure CI/counterintelligence integration. This process involves defining what needs to be protected, for how long, and from whom; assessing the rival's CI collection capabilities; testing and managing your firm's vulnerability to the rival's collection methods; developing and implementing aggressive countermeasures (including disinformation); analyzing the results; and integrating this information with data from the CI side of the process, thereby providing management with a more complete intelligence picture of the marketplace (revealing what the competition is trying to collect, for instance, is often an early indicator of where they're headed as a company). A case study is provided. © 1997 John Wiley &amp; Sons, Inc.</p>","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 3","pages":"53-61"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199723)8:3<53::AID-CIR12>3.0.CO;2-D","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71975410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
Competitive Intelligence Review
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1