𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Competitive Intelligence and the corporate jewels

✍ Scribed by David Mark


Publisher
John Wiley and Sons
Year
1997
Weight
100 KB
Volume
8
Category
Article
ISSN
1058-0247

No coin nor oath required. For personal study only.

✦ Synopsis


The JaMar Resource Group

American industry has faced an increased global intelligence threat since the disintegration of the Soviet Union and its Eastern European surrogates. This threat includes traditional espionage by foreign intelligence services, in-dustrial espionage perpetrated by foreign and domestic competitors, and a new threat stemming from the competitive intelligence (CI) operations of foreign and domestic competitors. All of these share a common focus

EXECUTIVE SUMMARY

The end of the Cold War shifted strategic and tactical foreign policy priorities from traditional superpower and client concerns to those reflecting national economic competitiveness, especially commercial and technology-related information. But while the threat of illegal industrial espionage has increased, so too has the new threat of legal-and systematiccompetitive intelligence (CI) efforts by foreign and domestic competitors. Corporate efforts to protect proprietary information, the author argues, have tended to follow the classifiedprotection model developed to thwart clandestine or illegal intelligence operations, leaving firms unprepared to defend against an organized CI collection effort that analyzes information routinely gathered in the course of the target company's daily business activities. Companies must continue to use physical security against illegal threats while redirecting their thinking to CI protection strategies. It is important to realize that your company will and should lose information if it is effectively carrying out its business operations, and to shift from risk avoidance to risk management. The defensive key is to identify what is absolutely critical for the firm's survival or competitiveness-the "corporate jewels"-and then take action to limit their vulnerability to competitor CI collection. The military's five-step Operations Security (OPSEC) approach for assessing risk and establishing countermeasures can be adapted for competitive intelligence. Also, thinking about counterintelligence should move away from the governmentclandestine model to an approach based on Counter-Competitor Intelligence (CCI)-seeking to learn during routine CI activities what intelligence activities competitors are directing at your company, and to analyze any damage.


πŸ“œ SIMILAR VOLUMES


Challenges for strategic competitive int
✍ Edwin RΓΌhli; Sybille Sachs πŸ“‚ Article πŸ“… 1997 πŸ› John Wiley and Sons βš– 155 KB πŸ‘ 2 views

The aim of this article is to focus on diversification as a fundamental problem of strategic management in the light of today's economic reality. While discussing the question of diversification, we also address the problem of downsizing from past overdiversification. From both topics, we derive som

Shaping a corporate competitive intellig
✍ Lynn Behnke; Paul Slayton πŸ“‚ Article πŸ“… 1998 πŸ› John Wiley and Sons βš– 157 KB

Losing more than $14 billion during the period 1991-93, combined with the arrival of new CEO Louis V. Gerstner, Jr., changed the way IBM thought about customers and competition. As IBM began to reshape itself in the 1990s, its traditional emphasis on customer satisfaction broadened to include a rene

Corporate configurations and Competitive
✍ Alf H. Walle πŸ“‚ Article πŸ“… 1999 πŸ› John Wiley and Sons βš– 117 KB

During World War II, noted social scientists entered government service and worked with members of the intelligence community to provide predictions regarding how both friend and foe would likely respond to the pressures of the conflict. Although much excellent work was performed, after the war thes