Information Age trends have caused the competitive intelligence (CI) industry to flourish while c... more Information Age trends have caused the competitive intelligence (CI) industry to flourish while changing the way CI is conducted. Universities educating CI analysts are interested in knowing what knowledge and skills are necessary for future practitioners. In 2022, Harvard Business Review addressed this topic’s relevancy, noting increases in CI departments and growing demand for analysts to sift through unconfirmed information. This study addresses the question of what skill sets are needed for future CI analysts and how do instructors prepare them for an evolving and dynamic future in CI? Over 130 CI practitioners were surveyed about recommended skills and curriculum for the next generation. Results confirmed CI’s technology evolution (e.g., faster turnarounds, greater client expectations). While tech-savvy skills are essential, soft skills consistently ranked as top requirements. Findings are applicable to other disciplines that analyze data for business strategy.
Both food and the rituals and practices associated with its preparation, presentation, and consum... more Both food and the rituals and practices associated with its preparation, presentation, and consumption have consistently played a core role in developing, defining, and sustaining cultural identity. Not only are certain cooking styles and individual dishes emblematic of particular cultures, but the history, traditions, and rituals associated with the preparation, presentation, and consumption of those distinctive dishes serve to instill in members what it means to be part of a certain cultural group. Culture consists of both explicit and tacit forms of knowledge, and the successful transfer of both types of knowledge is critical for the sustainment of a culture from one generation to the next. Through the sharing of distinctive, food-related experiences, older members of a culture transfer some defining characteristics of that culture with younger members, who internalize those experiences and expand their own tacit knowledge of what it means to be a member of that culture. The SECI model, originally developed by Nonaka and Takeuchi (1995) to examine how knowledge is shared and created within corporations, is used here to illuminate how four different types of knowledge transfer have been employed by three distinct cultures to define and sustain their respective cultures through food and food-related rituals.
This reflective paper provides fresh accounts of the four co-authors’ personal experiences with r... more This reflective paper provides fresh accounts of the four co-authors’ personal experiences with respect to successfully completing the Doctor of Science in Information Systems and Communications program at Robert Morris University. This paper also presents a Yin & Yang Research Model that integrates the ancient Chinese concept of Yin and Yang and the modern Western concept of the Data-Information-Knowledge-Wisdom hierarchy. This model reflects the complementary nature of qualitative and quantitative research methodologies. The unusually high graduation rate of this program over two decades, coupled with the subsequent, successful career trajectories of over 200 graduates, attest to the effective balance of humanity and technology that characterizes this program. The mix of doctoral courses offered within this program, coupled with the technical expertise and philosophical and research orientations of the associated faculty members, is fully consistent with this Yin and Yang concept ...
Recognizing the need to acquire, process, analyze, store, share, and protect information used to ... more Recognizing the need to acquire, process, analyze, store, share, and protect information used to support decision-making and awareness of the business environment, Information Age companies may consider investing in business intelligence, competitive intelligence, and knowledge management. However, inadequate understanding of the capabilities and limitations of these distinct disciplines can lead to unrealistic expectations; consequently, many such investments yield disappointing results. This paper provides background information, and identifies key variables that corporate leadership should take into account when contemplating an investment in one or more of these disciplines.
The Industrial Internet of Things, or IIoT, introduces Internet-enabled devices into industrial p... more The Industrial Internet of Things, or IIoT, introduces Internet-enabled devices into industrial process systems operating in the energy, transportation, healthcare, utilities, cities, agriculture, and other critical infrastructure sectors, establishing linkages between previously-air gapped information technology (IT) and operational technology (OT) networks. While the introduction of these Internet-enabled devices creates new efficiencies, improves performance, increases productivity, and increases profitability, it also introduces new security challenges and risks. IIoT is a system of systems; the architecture of a single IIoT system consists of different layers, with each layer performing a distinct function, having unique operational characteristics, and relying upon different devices and communication protocols than other layers of the system. Because of the unique characteristics of these various layers and functions, the vulnerabilities and threats associated with them also d...
International Journal of Management, Knowledge and Learning, 2019
Decision Support Systems have significance, as today firms turn to big data, machine learning, an... more Decision Support Systems have significance, as today firms turn to big data, machine learning, and artificial intelligence to guide strategy development and improve organizational performance. However, technology is not enough; human intelligence is necessary. This paper introduces Artificial Intelligence to the Emotional Intelligence Model, which blends technology and humanity to support strategic decision-making. Such a model builds on the DataInformation-Knowledge-Wisdom hierarchy and knowledge management to integrate five types of intelligence. The consumer electronics retail giant Best Buy is used as a case to illustrate the relevance of the model. The presented framework provides a powerful, mental model to support organizational strategists and business executives.
The Industrial Internet of Things, or IIoT, introduces Internet-enabled devices into industrial p... more The Industrial Internet of Things, or IIoT, introduces Internet-enabled devices into industrial process systems operating in the energy, transportation, healthcare, utilities, cities, agriculture, and other critical infrastructure sectors, establishing linkages between previously-air gapped information technology (IT) and operational technology (OT) networks. While the introduction of these Internet-enabled devices creates new efficiencies, improves performance, increases productivity, and increases profitability, it also introduces new security challenges and risks. IIoT is a system of systems; the architecture of a single IIoT system consists of different layers, with each layer performing a distinct function, having unique operational characteristics, and relying upon different devices and communication protocols than other layers of the system. Because of the unique characteristics of these various layers and functions, the vulnerabilities and threats associated with them also d...
International Journal of Management, Knowledge, and Learning, 2018
Recognizing the need to acquire, process, analyze, store, share, and protect information used to ... more Recognizing the need to acquire, process, analyze, store, share, and protect information used to support decision-making and awareness of the business environment, Information Age companies may consider investing in business intelligence, competitive intelligence, and knowledge management. However, inadequate understanding of the capabilities and limitations of these distinct disciplines can lead to unrealistic expectations; consequently, many such investments yield disappointing results. This paper provides background information, and identifies key variables that corporate leadership should take into account when contemplating an investment in one or more of these disciplines.
International Journal of Management, Knowledge, and Learning, 2019
Decision Support Systems have significance, as today firms turn to big data, machine learning, an... more Decision Support Systems have significance, as today firms turn to big data, machine learning, and artificial intelligence to guide strategy development and improve organizational performance. However, technology is not enough; human intelligence is necessary. This paper introduces Artificial Intelligence to the Emotional Intelligence Model, which blends technology and humanity to support strategic decision-making. Such a model builds on the Data-Information-Knowledge-Wisdom hierarchy and knowledge management to integrate five types of intelligence. The consumer electronics retail giant Best Buy is used as a case to illustrate the relevance of the model. The presented framework provides a powerful, mental model to support organizational strategists and business executives.
This reflective paper provides fresh accounts of the four co-authors' personal experiences with r... more This reflective paper provides fresh accounts of the four co-authors' personal experiences with respect to successfully completing the Doctor of Science in Information Systems and Communications program at Robert Morris University. This paper also presents a Yin & Yang Research Model that integrates the ancient Chinese concept of Yin and Yang and the modern Western concept of the Data-Information-Knowledge-Wisdom hierarchy. This model reflects the complementary nature of qualitative and quantitative research methodologies. The unusually high graduation rate of this program over two decades, coupled with the subsequent, successful career trajectories of over 200 graduates, attest to the effective balance of humanity and technology that characterizes this program. The mix of doctoral courses offered within this program, coupled with the technical expertise and philosophical and research orientations of the associated faculty members, is fully consistent with this Yin and Yang concept of balance and harmony. The program was able to accommodate and individually benefit the four authors, each of whom came from a different national cultural heritage and birth country, had a different professional and technical background, and employed a different research methodology from the other three in their doctoral dissertation. This paper also illustrates the benefits of a cohort-based, resident, executive format doctoral program that emphasizes support and collaboration, knowledge sharing and co-creation. While four recent graduates represent an admittedly small and biased sample of the program's 200+ graduates, the authors nevertheless believe their reflections, considered within the framework of the Yin & Yang Research Model, provide valuable insights useful for comprehending some of the reasons for the program's consistently high graduation rate. Such insights may be useful to other institutions seeking to establish a new, similar program, or to improve an existing one. In addition, this paper provides practical and theoretical perspectives to help prospective students considering the pursuit of a terminal degree, in the process of program selection, or already on their selected path of higher learning.
International Journal of Value Chain Management, 2019
Competitive intelligence consultancies are a subset of the management consulting industry, and al... more Competitive intelligence consultancies are a subset of the management consulting industry, and along with business intelligence and knowledge management, competitive intelligence represents one leg of the commercial intelligence triad. Business intelligence and knowledge management benefit considerably from big data and artificial intelligence. As big data, big data analytics, and artificial intelligence continue to significantly transform countless industries, some have asserted that these technologies will disrupt the management consulting world and could even render the role of the human analyst obsolete. This article examines the future of competitive intelligence in an AI-enabled world and identifies trends and proposed changes that will enable competitive intelligence to remain both relevant and valued for decades to come.
The Industrial Internet of Things, or IIoT, introduces Internet-enabled devices into industrial p... more The Industrial Internet of Things, or IIoT, introduces Internet-enabled devices into industrial process systems operating in the energy, transportation, healthcare, utilities, cities, agriculture, and other critical infrastructure sectors, establishing linkages between previously-air gapped information technology (IT) and operational technology (OT) networks. While the introduction of these Internet-enabled devices creates new efficiencies, improves performance, increases productivity, and increases profitability, it also introduces new security challenges and risks. IIoT is a system of systems; the architecture of a single IIoT system consists of different layers, with each layer performing a distinct function, having unique operational characteristics, and relying upon different devices and communication protocols than other layers of the system. Because of the unique characteristics of these various layers and functions, the vulnerabilities and threats associated with them also differ. Many internal stakeholders are involved in the conceptualization, planning and implementation of an organization's adoption of IIoT; while some may be experienced and knowledgeable technologists, others are not. Regardless of one's technical knowledge, recognition of the potentially-catastrophic consequences of successful exploitation of those vulnerabilities necessitate at least some familiarity with security vulnerabilities and threats associated with the various IIoT layers and subsystems. The purpose of this article is to identify for IIoT stakeholders some of the vulnerabilities and threats associated with various layers and functions of an IIoT architecture and illuminate the need for a comprehensive, systematic, and layer-appropriate approach to IIoT security.
Both food and the rituals and practices associated with its preparation, presentation, and consum... more Both food and the rituals and practices associated with its preparation, presentation, and consumption have consistently played a core role in developing, defining, and sustaining cultural identity. Not only are certain cooking styles and individual dishes emblematic of particular cultures, but the history, traditions, and rituals associated with the preparation, presentation, and consumption of those distinctive dishes serve to instill in members what it means to be part of a certain cultural group. Culture consists of both explicit and tacit forms of knowledge, and the successful transfer of both types of knowledge is critical for the sustainment of a culture from one generation to the next. Through the sharing of distinctive, food-related experiences, older members of a culture transfer some defining characteristics of that culture with younger members, who internalize those experiences and expand their own tacit knowledge of what it means to be a member of that culture. The SECI model, originally developed by Nonaka and Takeuchi (1995) to examine how knowledge is shared and created within corporations, is used here to illuminate how four different types of knowledge transfer have been employed by three distinct cultures to define and sustain their respective cultures through food and food-related rituals.
Information Age trends have caused the competitive intelligence (CI) industry to flourish while c... more Information Age trends have caused the competitive intelligence (CI) industry to flourish while changing the way CI is conducted. Universities educating CI analysts are interested in knowing what knowledge and skills are necessary for future practitioners. In 2022, Harvard Business Review addressed this topic’s relevancy, noting increases in CI departments and growing demand for analysts to sift through unconfirmed information. This study addresses the question of what skill sets are needed for future CI analysts and how do instructors prepare them for an evolving and dynamic future in CI? Over 130 CI practitioners were surveyed about recommended skills and curriculum for the next generation. Results confirmed CI’s technology evolution (e.g., faster turnarounds, greater client expectations). While tech-savvy skills are essential, soft skills consistently ranked as top requirements. Findings are applicable to other disciplines that analyze data for business strategy.
Both food and the rituals and practices associated with its preparation, presentation, and consum... more Both food and the rituals and practices associated with its preparation, presentation, and consumption have consistently played a core role in developing, defining, and sustaining cultural identity. Not only are certain cooking styles and individual dishes emblematic of particular cultures, but the history, traditions, and rituals associated with the preparation, presentation, and consumption of those distinctive dishes serve to instill in members what it means to be part of a certain cultural group. Culture consists of both explicit and tacit forms of knowledge, and the successful transfer of both types of knowledge is critical for the sustainment of a culture from one generation to the next. Through the sharing of distinctive, food-related experiences, older members of a culture transfer some defining characteristics of that culture with younger members, who internalize those experiences and expand their own tacit knowledge of what it means to be a member of that culture. The SECI model, originally developed by Nonaka and Takeuchi (1995) to examine how knowledge is shared and created within corporations, is used here to illuminate how four different types of knowledge transfer have been employed by three distinct cultures to define and sustain their respective cultures through food and food-related rituals.
This reflective paper provides fresh accounts of the four co-authors’ personal experiences with r... more This reflective paper provides fresh accounts of the four co-authors’ personal experiences with respect to successfully completing the Doctor of Science in Information Systems and Communications program at Robert Morris University. This paper also presents a Yin & Yang Research Model that integrates the ancient Chinese concept of Yin and Yang and the modern Western concept of the Data-Information-Knowledge-Wisdom hierarchy. This model reflects the complementary nature of qualitative and quantitative research methodologies. The unusually high graduation rate of this program over two decades, coupled with the subsequent, successful career trajectories of over 200 graduates, attest to the effective balance of humanity and technology that characterizes this program. The mix of doctoral courses offered within this program, coupled with the technical expertise and philosophical and research orientations of the associated faculty members, is fully consistent with this Yin and Yang concept ...
Recognizing the need to acquire, process, analyze, store, share, and protect information used to ... more Recognizing the need to acquire, process, analyze, store, share, and protect information used to support decision-making and awareness of the business environment, Information Age companies may consider investing in business intelligence, competitive intelligence, and knowledge management. However, inadequate understanding of the capabilities and limitations of these distinct disciplines can lead to unrealistic expectations; consequently, many such investments yield disappointing results. This paper provides background information, and identifies key variables that corporate leadership should take into account when contemplating an investment in one or more of these disciplines.
The Industrial Internet of Things, or IIoT, introduces Internet-enabled devices into industrial p... more The Industrial Internet of Things, or IIoT, introduces Internet-enabled devices into industrial process systems operating in the energy, transportation, healthcare, utilities, cities, agriculture, and other critical infrastructure sectors, establishing linkages between previously-air gapped information technology (IT) and operational technology (OT) networks. While the introduction of these Internet-enabled devices creates new efficiencies, improves performance, increases productivity, and increases profitability, it also introduces new security challenges and risks. IIoT is a system of systems; the architecture of a single IIoT system consists of different layers, with each layer performing a distinct function, having unique operational characteristics, and relying upon different devices and communication protocols than other layers of the system. Because of the unique characteristics of these various layers and functions, the vulnerabilities and threats associated with them also d...
International Journal of Management, Knowledge and Learning, 2019
Decision Support Systems have significance, as today firms turn to big data, machine learning, an... more Decision Support Systems have significance, as today firms turn to big data, machine learning, and artificial intelligence to guide strategy development and improve organizational performance. However, technology is not enough; human intelligence is necessary. This paper introduces Artificial Intelligence to the Emotional Intelligence Model, which blends technology and humanity to support strategic decision-making. Such a model builds on the DataInformation-Knowledge-Wisdom hierarchy and knowledge management to integrate five types of intelligence. The consumer electronics retail giant Best Buy is used as a case to illustrate the relevance of the model. The presented framework provides a powerful, mental model to support organizational strategists and business executives.
The Industrial Internet of Things, or IIoT, introduces Internet-enabled devices into industrial p... more The Industrial Internet of Things, or IIoT, introduces Internet-enabled devices into industrial process systems operating in the energy, transportation, healthcare, utilities, cities, agriculture, and other critical infrastructure sectors, establishing linkages between previously-air gapped information technology (IT) and operational technology (OT) networks. While the introduction of these Internet-enabled devices creates new efficiencies, improves performance, increases productivity, and increases profitability, it also introduces new security challenges and risks. IIoT is a system of systems; the architecture of a single IIoT system consists of different layers, with each layer performing a distinct function, having unique operational characteristics, and relying upon different devices and communication protocols than other layers of the system. Because of the unique characteristics of these various layers and functions, the vulnerabilities and threats associated with them also d...
International Journal of Management, Knowledge, and Learning, 2018
Recognizing the need to acquire, process, analyze, store, share, and protect information used to ... more Recognizing the need to acquire, process, analyze, store, share, and protect information used to support decision-making and awareness of the business environment, Information Age companies may consider investing in business intelligence, competitive intelligence, and knowledge management. However, inadequate understanding of the capabilities and limitations of these distinct disciplines can lead to unrealistic expectations; consequently, many such investments yield disappointing results. This paper provides background information, and identifies key variables that corporate leadership should take into account when contemplating an investment in one or more of these disciplines.
International Journal of Management, Knowledge, and Learning, 2019
Decision Support Systems have significance, as today firms turn to big data, machine learning, an... more Decision Support Systems have significance, as today firms turn to big data, machine learning, and artificial intelligence to guide strategy development and improve organizational performance. However, technology is not enough; human intelligence is necessary. This paper introduces Artificial Intelligence to the Emotional Intelligence Model, which blends technology and humanity to support strategic decision-making. Such a model builds on the Data-Information-Knowledge-Wisdom hierarchy and knowledge management to integrate five types of intelligence. The consumer electronics retail giant Best Buy is used as a case to illustrate the relevance of the model. The presented framework provides a powerful, mental model to support organizational strategists and business executives.
This reflective paper provides fresh accounts of the four co-authors' personal experiences with r... more This reflective paper provides fresh accounts of the four co-authors' personal experiences with respect to successfully completing the Doctor of Science in Information Systems and Communications program at Robert Morris University. This paper also presents a Yin & Yang Research Model that integrates the ancient Chinese concept of Yin and Yang and the modern Western concept of the Data-Information-Knowledge-Wisdom hierarchy. This model reflects the complementary nature of qualitative and quantitative research methodologies. The unusually high graduation rate of this program over two decades, coupled with the subsequent, successful career trajectories of over 200 graduates, attest to the effective balance of humanity and technology that characterizes this program. The mix of doctoral courses offered within this program, coupled with the technical expertise and philosophical and research orientations of the associated faculty members, is fully consistent with this Yin and Yang concept of balance and harmony. The program was able to accommodate and individually benefit the four authors, each of whom came from a different national cultural heritage and birth country, had a different professional and technical background, and employed a different research methodology from the other three in their doctoral dissertation. This paper also illustrates the benefits of a cohort-based, resident, executive format doctoral program that emphasizes support and collaboration, knowledge sharing and co-creation. While four recent graduates represent an admittedly small and biased sample of the program's 200+ graduates, the authors nevertheless believe their reflections, considered within the framework of the Yin & Yang Research Model, provide valuable insights useful for comprehending some of the reasons for the program's consistently high graduation rate. Such insights may be useful to other institutions seeking to establish a new, similar program, or to improve an existing one. In addition, this paper provides practical and theoretical perspectives to help prospective students considering the pursuit of a terminal degree, in the process of program selection, or already on their selected path of higher learning.
International Journal of Value Chain Management, 2019
Competitive intelligence consultancies are a subset of the management consulting industry, and al... more Competitive intelligence consultancies are a subset of the management consulting industry, and along with business intelligence and knowledge management, competitive intelligence represents one leg of the commercial intelligence triad. Business intelligence and knowledge management benefit considerably from big data and artificial intelligence. As big data, big data analytics, and artificial intelligence continue to significantly transform countless industries, some have asserted that these technologies will disrupt the management consulting world and could even render the role of the human analyst obsolete. This article examines the future of competitive intelligence in an AI-enabled world and identifies trends and proposed changes that will enable competitive intelligence to remain both relevant and valued for decades to come.
The Industrial Internet of Things, or IIoT, introduces Internet-enabled devices into industrial p... more The Industrial Internet of Things, or IIoT, introduces Internet-enabled devices into industrial process systems operating in the energy, transportation, healthcare, utilities, cities, agriculture, and other critical infrastructure sectors, establishing linkages between previously-air gapped information technology (IT) and operational technology (OT) networks. While the introduction of these Internet-enabled devices creates new efficiencies, improves performance, increases productivity, and increases profitability, it also introduces new security challenges and risks. IIoT is a system of systems; the architecture of a single IIoT system consists of different layers, with each layer performing a distinct function, having unique operational characteristics, and relying upon different devices and communication protocols than other layers of the system. Because of the unique characteristics of these various layers and functions, the vulnerabilities and threats associated with them also differ. Many internal stakeholders are involved in the conceptualization, planning and implementation of an organization's adoption of IIoT; while some may be experienced and knowledgeable technologists, others are not. Regardless of one's technical knowledge, recognition of the potentially-catastrophic consequences of successful exploitation of those vulnerabilities necessitate at least some familiarity with security vulnerabilities and threats associated with the various IIoT layers and subsystems. The purpose of this article is to identify for IIoT stakeholders some of the vulnerabilities and threats associated with various layers and functions of an IIoT architecture and illuminate the need for a comprehensive, systematic, and layer-appropriate approach to IIoT security.
Both food and the rituals and practices associated with its preparation, presentation, and consum... more Both food and the rituals and practices associated with its preparation, presentation, and consumption have consistently played a core role in developing, defining, and sustaining cultural identity. Not only are certain cooking styles and individual dishes emblematic of particular cultures, but the history, traditions, and rituals associated with the preparation, presentation, and consumption of those distinctive dishes serve to instill in members what it means to be part of a certain cultural group. Culture consists of both explicit and tacit forms of knowledge, and the successful transfer of both types of knowledge is critical for the sustainment of a culture from one generation to the next. Through the sharing of distinctive, food-related experiences, older members of a culture transfer some defining characteristics of that culture with younger members, who internalize those experiences and expand their own tacit knowledge of what it means to be a member of that culture. The SECI model, originally developed by Nonaka and Takeuchi (1995) to examine how knowledge is shared and created within corporations, is used here to illuminate how four different types of knowledge transfer have been employed by three distinct cultures to define and sustain their respective cultures through food and food-related rituals.
Uploads
Papers by Fred Hoffman