Competitive intelligence /

محفوظ في:
التفاصيل البيبلوغرافية
المؤلف الرئيسي: West, Christopher, 1940-
التنسيق: كتاب
اللغة:English
منشور في: Houndmills, Basingstoke, Hampshire ; New York : Palgrave, 2001.
الموضوعات:
الوصول للمادة أونلاين:Table of Contents only
Publisher description
Contributor biographical information
LEADER 05839cam a2200337 a 4500
001 c000293794
003 CARM
005 20090909104739.0
008 010427s2001 enka b 001 0 eng d
010 |a 2001032788 
019 1 |a 23133860  |z 22673660  |z 22746460  |z 60999552  |5 LACONCORD2021 
020 |a 0333786696 
035 |a (OCoLC)46882561  |5 LACONCORD2021 
040 |a DLC  |c DLC  |d DLC 
042 |a pcc 
050 0 0 |a HD38.7  |b .W46 2001 
100 1 |a West, Christopher,  |d 1940- 
245 1 0 |a Competitive intelligence /  |c Chris West. 
260 |a Houndmills, Basingstoke, Hampshire ;  |a New York :  |b Palgrave,  |c 2001. 
300 |a xv, 236 p. :  |b ill. ;  |c 25 cm. 
504 |a Includes bibliographical references (p. 229-230) and index. 
505 8 |a Machine generated contents note: 1 Competition -- Virtual Monopolies -- Definition of Competition -- Where Do Companies Compete? -- Marketing and Competitive Strategies -- The Competitive Environment -- Mechanisms By Which Companies Compete -- Scale -- 2 Intelligence -- The Applications for Intelligence -- Companies to Watch -- Narrowing the Field -- Alternative Applications for Intelligence-Gathering -- Techniques -- Alternative Routes to Intelligence -- 3 The Development of Competitive Intelligence -- The Development of Competitive Intelligence as a -- Formal Activity -- Factors Influencing the Growth of Competitive Intelligence -- Factors Inhibiting the Growth of Competitive -- Intelligence -- 4 Framework for Competitive Analysis -- Mapping the Competitive Landscape -- Drivers of Behaviour and Change -- Types of Intelligence -- Key Intelligence Topics -- Format for Collecting and Presenting Intelligence -- The Time Dimension -- 5 Overview of the Sources of Intelligence -- Primary and Secondary Sources -- Determinants of Methods Used -- 6 Secondary Sources of Intelligence -- Internal Intelligence Sources -- External Secondary Sources -- Locating External Secondary Intelligence -- 7 Intelligence on the Internet -- Search Engines and Web Crawlers -- Intelligence Content of the Web -- Short Cuts -- Discussion Forums -- Newsgroups (or Bulletin Boards) -- Monitoring the Internet -- 8 Primary Intelligence Collection Techniques -- Internal Primary Sources -- External Primary Intelligence -- Obtaining Intelligence Directly from Competitors -- The Demise of Primary Intelligence? -- 9 Market Research as a Source of Competitive -- Intelligence -- Market Research and Competitive Intelligence -- Customers as a Source of Intelligence -- Surveying Markets for Intelligence -- 10 Analysis - Filling the Gaps and Stretching the -- Data -- Filling the Gaps in an Incomplete Picture -- Extending the Level of Understanding -- Environmental Analysis -- 11 Verifying Intelligence -- Verification of Published Intelligence -- Verification of Primary Intelligence -- Sanity Checks -- 1:2 Competitive Intelligence Resources -- In-House Resources or External Agencies -- The Internal Competitive Intelligence Organisation -- Competitive Intelligence Staff -- Identifying Potential External Suppliers -- Assessing the Suitability of Competitive Intelligence -- Agencies -- Compiling a Shortlist -- Approved Research Contractors -- The Proposal -- Assessing Alternative Offers -- Presentation of Proposals -- Negotiations -- 13 The Intelligence Briefing -- The Briefing Document -- The Briefing Meeting -- 14 Controlling the Intelligence Collection -- Process -- Project Briefing or 'Kick Off Meeting -- Review of Discussion Guides -- Progress Reports -- Reviews of the Information Yield -- Final Review of Findings -- 15 Legal Factors and Ethical Guidelines -- Criminal Law -- Copyright Law -- Competition and Antitrust Legislation -- The Economic Espionage Act -- Data Protection Legislation -- Codes of Ethics -- Non-Disclosure -- Conflicts of Interest -- Market Research and Competitive Intelligence Ethics -- Deliverables -- Sanctions -- Regional Variations -- 16 Processing and Distributing Intelligence -- Written Reports -- Meetings and Other Forums -- E-mail -- Corporate Intranets -- Management Information Systems -- Knowledge Management Systems -- Tailored Competitive Intelligence Systems -- Access to Competitive Intelligence -- 17. Measuring the Effectiveness of Competitive -- Intelligence -- Quality of Intelligence Provided -- Use Being Made of Competitive Intelligence -- Development of an Intelligence Culture -- Event Analysis -- Market Share -- 18 Counter-intelligence -- The Structure of Counter-Intelligence Activity -- Assigning Responsibility for Counter-Intelligence -- Programmes -- Identifying the Potential Sources of Threat -- Identifying the Means By Which Intelligence is Being -- Sought -- Identifying and Assessing the Vulnerabilities -- Categorise Information -- Reducing the Chances of Intelligence Being Obtained -- Testing the System -- Monitoring the Threat -- Publicise Willingness to take Legal Action -- Implementation -- 19 Deception and Misinformation -- Intelligence Held on the Company -- Channels of Communication -- Internal Sources of Information -- Types of Deception -- Ethical Considerations -- Propaganda -- Appendix: The Competitive Intelligence Checklist -- Further Reading -- Index. 
650 0 |a Business intelligence. 
650 0 |a Strategic planning. 
650 0 |a Competition. 
856 4 1 |3 Table of Contents only  |u http://www.loc.gov/catdir/toc/fy02/2001032788.html 
856 4 2 |3 Publisher description  |u http://www.loc.gov/catdir/enhancements/fy0612/2001032788-d.html 
856 4 2 |3 Contributor biographical information  |u http://www.loc.gov/catdir/enhancements/fy0612/2001032788-b.html 
852 8 |b CARM  |h A3:AE30G0  |i C12286  |p 0533988  |f BK 
999 f f |i 386f695e-b687-5355-b548-07c5eecbab52  |s f42d1db7-3d58-57e8-a04f-27ebf4e13290 
952 f f |p Can circulate  |a CAVAL  |b CAVAL  |c CAVAL  |d CARM 1 Store  |e C12286  |f A3:AE30G0  |h Other scheme  |i book  |m 0533988