Business Intelligence
By Alex Burns (
[email protected]). Australian Foresight Institute, March 2003
Abstract
Business Intelligence (BI) and Competitive Intelligence (CI) are two rarely
understood methods relevant to pragmatic Strategic Foresight™. BI was
methodologically influenced by the Central Intelligence Agency’s (CIA)
collections and analysis techniques, and ideologically shaped by the 1980s
specter of Japan, Inc. BI has evolved into a collection of sophisticated
techniques that merge insights from business strategy, risk analysis, cognitive
psychology, organizational behavior and political science. Jan Herring’s
model of the CIA’s intelligence cycle is outlined. The relationship of BI to
Michael Porter’s 5 Forces and Anticipatory Management are discussed. The
requirements of an intelligence analyst, common problems and the difficulties
in establishing a BI unit are explored. Finally, four key methods—Mergers &
Acquisitions, Environmental Scanning, ‘Shadow’ Marketing and Patent
Searches—are detailed with relevant case studies.
Author Biography
Alex Burns is the editor of the award-winning Disinformation® site, and an
Australian Foresight Institute graduate student. He is affiliated with the USbased Integral Institute, the National Values Center and the International
Paleopsychology Project. His research interests include global media vectors,
counterterrorism and risk societies.
Alex Burns (
[email protected])
Page 1
Copyright © 2003 Alex Burns. For individual private educational & non-commercial use only.
All other rights reserved.
Defining Business Intelligence
This essay examines the evolution of Business Intelligence and its links with Strategic
Foresight and Futures Studies techniques in pragmatic applications.
Scholars distinguish between four key intelligence categories.
• Competitor Intelligence focuses on inter-firm rivalries and battles for brand and
strategic positioning.
• Competitive Intelligence (CI) is defined by Ian Gordon as a method ‘to develop
strategies to transfer market share profitably.’1 John McGonagle Jr. and Carolyn Vella
believe that CI orientates managers to ‘fine tuning your business planning process.’2
Leonard Fuld defines CI as ‘highly specific and timely information about a
corporation.’3
• Business Intelligence (BI) uses information systems and transaction databases to
provide decision-making support and transform data into intelligence within a rational
management framework.4 Herbert Mayer, vice chairman of the Central Intelligence
Agency’s National Intelligence Council, defines BI as the ‘radar for business.’5
• Social Intelligence (SI), spearheaded by University of Lund professor Stevan
Dedijer, tracks the diffusion of these capabilities into broader social contexts and
across longer timeframes.
BI and CI writings dominate popular writings on business management. Companies
use these techniques as a form of market intelligence that ‘focuses on monitoring
trends in the market to identify future problems and opportunities, and provides a
company with the information necessary to maneuver in advance of the change in the
market.’6 Defensive intelligence targets blind-spots by ‘analyzing your own business’s
activities as your competitors and others see them.’7 Convergent technologies
including e-mail, pagers and cell phones have been used by one-to-one marketers as
proactive intelligence. 8 Company executives also have growing awareness of the
need for counterintelligence against competitors and industrial espionage.9 Global
companies use risk analysis to assess the ‘general background that a company needs
to know to operate securely in an unfamiliar environment.’10
McGonagle Jr. and Vella link CI to parallel business processes including strategic
intelligence (STEEP factors and trends), crisis management, competitive
benchmarking and reverse engineering.11 Companies now merge BI into interdepartmental synergies and cross-functional roles. The knowledge management
company Lexis Nexis, for example, integrates BI metrics, CI analysis, market
research, benchmarking and strategy into its research cycle.12 This integration
suggests that BI will cross-bond with related frameworks and tools over the next
decade.
Alex Burns (
[email protected])
Page 2
Copyright © 2003 Alex Burns. For individual private educational & non-commercial use only.
All other rights reserved.
History
Many analysts trace BI’s development to writings on military strategy by Sun Tzu,13
Miyamoto Musashi,14 Niccolo Machiavelli15 and Karl von Clausewitz.16 However this
emphasis predated the 1980s fascination with Oriental exemplars. Gordon notes that
during World War II both Allied and Axis strategists ‘monitored the enemy and
tracked the history of the battles fought by key commanders’. The intelligence gained
from this leadership profiling was then used ‘to determine the likely outcome of
various moves’17 (notably during the D-Day landings and the Manhattan Project).
Forecasting underpinned North America’s economic growth throughout the 1950s and
1960s as strategists focused on new markets and portfolio management. However this
‘economic miracle’ was shattered by the OPEC oil crisis in 1973, soaring energy
prices, and stagflation. By the early 1980s North America’s competitive advantage
was being challenged by trade liberalization, globalization, and technological
change.18 This perceived threat provided the stimulus for exemplars and gurus to
popularize business management theories. However its dark undercurrent was an
integration propaganda19 that fed on resurgent nationalism and xenophobic fears of
geo-economic domination by foreign nations.
This integration propaganda was explicit in the United States’ response to ‘Japan Inc’.
In 1986 Japan became ‘the world’s leading creditor nation’ whilst ‘the United States
became a debtor nation.’20 Two geo-economic debates concerned the declining
market share of Detroit’s Big Three car manufacturers and the commercialization of
artificial intelligence technologies. Japan’s trading companies (sogo shosha) viewed
‘intelligence as organized information’ and focused on prices, competitors and
political developments.21
Japan’s most famous CI organization during this period was the Ministry of
International Trade and Industry that ‘tracks the international marketplace and acts as
an information provider.’22 US analysts claimed that MITI spearheaded industrial
espionage operations and had ‘negative attitudes toward free trade and capital
liberalization.’23 United States analysts also became concerned about patent filings,
plant tours and trade shows.24 Antitrust laws prevented competitors from exchanging
information that would create price-fixing or oligopolies.25 For Japan these tactics
were natural because America was their ‘biggest market and chief manufacturing
competitor.’26
Chun Wei Choo notes that this response to Japan ‘focused on the alleged superiority
of their social intelligence skills’ and that the companies targeted included
‘Mitsubishi, the Mitsui Knowledge Industry Corporation and Nichimen
Corporation.’27 ‘The Mitsubishi intelligence staff in New York,’ Meyer reveals, ‘takes
up two entire floors of a Manhattan skyscraper.’28
This economic warfare became global in the early 1990s as the nation-state morphed
into the network society.29 The ‘internationalization of capital’, the reunification of
Germany and the creation of the European Union refocused analysts on geo-economic
imperatives.30 In this climate American companies shifted their focus outwards and
interest in CI grew and its techniques were adopted by investment banks, law and
Alex Burns (
[email protected])
Page 3
Copyright © 2003 Alex Burns. For individual private educational & non-commercial use only.
All other rights reserved.
medical firms, and in the pharmaceutical industry.31 The American engagement with
Japan Inc, ironically, also fueled the managerial interest in Knowledge Management
(KM),32 which eclipsed CI in the late 1990s.
Exemplars
The exemplars of early corporate BI had close links with the intelligence community.
Jan Herring, the founder of the Motorola Business Intelligence unit, was an ex-Central
Intelligence Agency analyst.33 Herring worked closely with Robert Galvin,
Motorola’s ex-CEO, who was inspired to found the unit after serving on the
Presidential Foreign Intelligence Advisory Board.34 The Motorola unit’s human
resources structure mirrored the collections and analysis branches of Western
intelligence agencies.35 Meyer states that the unit had half a dozen staff track geoeconomic areas and conduct staff debriefings after overseas trips.36 These connections
led credence to the critics’ mistaken belief that BI practitioners regularly engaged in
acts of spying and industrial espionage.37
However, the Society of Intelligence Professionals refuted this position. Unlike the
major Futures Studies organizations SCIP has been relatively successful in
implementing ethics guidelines. A major reason for this success was that BI had to
contend with the U.S. Economic Espionage Act (1996), which ‘was passed to protect
U.S. companies from efforts by foreign governments or companies to steal U.S.
technology and proprietary information.’38
BI practitioners contend that 90 percent of their raw information can be found in the
public domain. In a variant on shadow networks, Faye Brill, CI chief of Ryder
Systems, Inc., ‘believes that 80% of what you need to know about your competitors is
right inside your company.’39 Intelligence analysts define public as ‘all information
you can legally and ethically identify, locate, and then access.’40 Leonard Fuld advises
BI practitioners to study business decisions to grasp data and ‘locate the intelligence
source.’41 They need to define in advance what they are looking for, set limits on
answers, and ‘remain loose and open to all possible sources.’42 F.W. Rustman Jr.
describes effective analysis as ‘more a process of synthesizing and putting together all
of the existing information that has been obtained on a particular topic and then
examining it to try and make sense out of it.’43
Galvin also counter-argued that the Motorola unit was an ethical team of intelligence
analysts ‘who link together with internal experts largely for specific projects directed
by top management.’44 His description reveals a conceptual continuity with the Delphi
technique and think tanks. Herring’s subsequent clients included Merck and
NutraSweet45 and he quickly gained stature as the field’s modern founder.
The Intelligence Cycle
Herring’s most important contribution was his summary of the intelligence cycle
which divided the BI process into five stages.46 The BI practitioner conducts a needs
assessment that establishes the business and market context. Herring used the term
Key Intelligence Topics47 (other writers have used the term Critical Intelligence
Needs instead if KIT). Some companies use a Likert scale to rank their KITs.48 Kirk
Alex Burns (
[email protected])
Page 4
Copyright © 2003 Alex Burns. For individual private educational & non-commercial use only.
All other rights reserved.
Tyson prefers a ‘reliability index’ that distinguishes between rumor, confirmed rumor,
fact and hard fact.49 Brett Breeding sorts information according to its attributes
(shallowness, credibility, timeliness and focus) and whom to send the resulting
intelligence to.50
This scope enables the practitioner to plan the research tools and diagnostic
scorecards, and to identify ‘data requirements and sources.’51 F.W. Rustman Jr.
contends that ‘Evaluating the sources of information is one of the most important
tasks of the analyst.’52 The practitioner then collects the data from published and nonpublished sources. The data is evaluated for sufficiency, ‘chunked’ into ‘information
building blocks’ and categorized.53 The crucial ability at this point is ‘to recognize
what factors will influence the specific subject or issue.’54 Then the data is analyzed
to create ‘timely, accurate, and reliable’ information.55 Business Objects founder
Bernard Liautaud distinguishes here that ‘data is raw and unadorned’ whilst
‘information is data endowed with some degree of business context and meaning.’56
Analysts must also ‘never be afraid to include dissenting judgments along with their
own.’57
Finally this information is presented to decision-makers and strategists to produce
actionable intelligence. Information transforms into intelligence when it meets ‘one
consumer’s unique needs.’58 Here the analyst may use Neuro-Linguistic Programming
and other techniques to present the material since policymakers absorb information
through different sensory modalities.59 Liautaud emphasizes that ‘intelligence elevates
information to a higher level within an organization’, that it is ‘organic’ and that ‘it
contributes to an organizational state that may be characterized as collective
intelligence.’60 This definition hints at how the study of emergence and ‘swarm
intelligence’ may transform BI in the near future.61
Meyer sums up the intelligence cycle used by government security agencies and
subsequently adopted by first generation CI units. Companies:
1.
2.
3.
4.
5.
6.
7.
8.
‘study raw material’
‘argue and debate what it means’
‘check and recheck facts’
‘resolve the inevitable inconsistencies in data’
‘question original assumptions’
‘interview experts’
‘develop theses’
‘test and retest’.62
Other practitioners have amended this generic process with insights from operations
research and the scientific method. Ben Gilad’s criterion for data evaluation considers
its relevance, truth-value, understandability, sufficiency, significance and timeliness.63
Chun Wei Choo divides the process into collection, evaluation/filtering, storage,
analysis and dissemination phases.64 Michael O’Guin and Timothy Ogilvie’s process
involves forming hypotheses, looking for signals and sources, and then using data
collection to hunt for confirming evidence.65 Adrian Slywotzky perceives BI-oriented
strategy as a form of pattern recognition, which uses ‘a different lens through which
to see a complex reality’, and enables the analyst to ‘understand more of the picture,
Alex Burns (
[email protected])
Page 5
Copyright © 2003 Alex Burns. For individual private educational & non-commercial use only.
All other rights reserved.
more of what’s going on.’ 66
Intelligence analysis is firmly rooted in epistemological and ontological concerns; a
viewpoint frequently obscured by business strategists.
BI and Business Strategy
David Hussey and Per Jenster note that BI practitioners in business circles have
embraced different strategic perspectives, from Michael Porter’s ‘positional view’ and
the ‘resource-based view’ popularized by Gary Hamel and C.K. Prahalad to
developments in ‘behavioral theory’, ‘public policy’ assessments and the cooperative
stance of ‘game theory’.67
Porter’s ‘Five Forces’ model remains the most influential paradigm ‘of the
relationship between the firm and its environment’68 for BI practitioners with an MBA
background. Drawing upon industrial economics Porter’s model integrates the
buyer/supplier web, potential entrants, new products, and inter-firm competition.69
This contribution ‘broadened thinking, both about the number of forces that should be
considered and the factors within each.’70 Its scope was crucial for subsequent
analysis as the model ‘provides the boundaries within which the inquiry takes
place.’71 Regrettably, analysts overlooked Porter’s contention that ‘the removal of
blind-spots is an important precursor to successfully negotiating potential competitive
reaction to the firm’s planned strategies within an industry analysis scenario.’72
However the model was limited because its ‘implicit assumption’ was that ‘monopoly
power maximizes firm . . . profitability.’73 Brand, company and product positioning
were not static: competitors could also be allies, customers and suppliers in different
strategic contexts.74 Porter’s seminal influence linked BI with the rise-and-fall of
strategic planning: BI only emerged as a field in its own right in the late-1980s.75
The subsequent evolution of BI echoes the shift in Futures Studies from forecasting to
scenarios to post-positivist theories of critical realism and social construction.
However this shift has also mirrored geo-economic and sociopolitical upheavals.
Throughout the 1980s the BI function was equated with military strategy and wargaming analysis.76 This line of development matured into sub-fields concerned with
pre-emptive threat analyses77 and wild cards.78 A second line used Myers-Briggs and
pop psychology versions of the Enneagram as tools for competitor profiling.79 A third
line integrated Management Information Systems, BI and market research into an
Executive Information System.80
A fourth line of development acknowledged the dangers of blind-spots, cognitive
biases and organizational groupthink.81 This school highlighted the innate capacity of
the human mind to organize data through imagination, pattern recognition, data
sufficiency testing and critiquing assumptions.82 Its main contribution was to
challenge organizational beliefs ‘through detailed analysis of data, as they can
sometimes be proven wrong.’83 However unlike post-positivist Futures Studies this
school looked to analytical psychology and empirical skepticism as models.
The emphasis on core competencies in the early 1990s redefined BI as a technique to
help the Strategic Business Unit ‘achieve its ultimate objectives of profitability,
Alex Burns (
[email protected])
Page 6
Copyright © 2003 Alex Burns. For individual private educational & non-commercial use only.
All other rights reserved.
competitiveness and independence.’84 BI practitioners surfed trends from outsourcing
to network structures.85 The shift from EIS to Enterprise Resource Planning systems
was perhaps the decade’s major trend; one that paralleled the emphasis on signals and
technological surveillance by the United States intelligence community. ERP seemed
perfect for flattened organizational structures despite the difficulties of ‘managing the
distributed data silos that emerged.’86 It spawned the resurgence of ‘artificial
intelligence technologies to conduct knowledge discovery’87 and a fascination with
neural networks.88
By the late 1990s the sub-field of Data Mining techniques included ‘chi-squared
automatic interaction detection, case-based reasoning, and genetic algorithms.’89 Its
counterpoint was, in many ways, the human intelligence emphasis on KM and
learning organizations: techniques that reminded analysts that their ‘own experience
acts as a screen on the data as well as an aid in analyzing that data.’90 BI’s pragmatic
use will be enhanced when these lines of development are recombined in an integral
and holistic framework. One indication of these possibilities is Baumard’s
‘development matrix of nations’ that examines BI capabilities in a cross-impact
matrix of biological and artificial interfaces with individual and governmental
dimensions.91 The future of BI may lie in this shift from artificial intelligence to
intelligence augmentation.92
Strategic Foresight and Anticipatory Management
The BI function in organizations is often found in market research and strategic
planning departments. BI techniques are also being combined with scenarios in a
counter-offensive role for risk management93 and to predict a competitor’s strategy.94
Therefore managers often confuse BI with outward-looking competitor analysis and
overlook its links with capacity-building and organizational learning. Leonard Fuld
notes that the intelligence audit, which he defines as ‘an inventory of your company’s
intelligence assets,’95 is one example of this cross-functional role. Managers’
confusion stem from the overlay of Porter’s positioning school and military strategy
with game theory and the resource-based view of core competences.
BI analysts in a cross-functional role must be aware of these different business
paradigms. Analysts monitor what issues are on the agenda, the data and how its
collection process works, and can align the strategy outputs with their decisionmakers’ mind-sets. The last skill, to ‘redefine the intelligence problem in the decisionmaker’s terms,’96 is crucial in opportunity analysis. One of the most difficult aspects
of this role, however, is the ability to anticipate ‘major future decisions.’97 The
Machiavellian analyst must combine a macro-view of the entire firm and a microview of its hierarchies and games. Herring contends that BI must be performed with
the ‘direct involvement of the management team.’98 This demands an understanding
of how Anticipatory Management and Strategic Foresight enhance the BI role.
These managerial frames and fields provide the organizational context and rational
management structure for BI analysts to operate within. Along with Stevan Dedijer’s
writings on SI they enable a broader conceptualization of possibilities and more
rigorous execution in daily operations of goals, tactics and strategies. Exemplars have
certainly appreciated this. For Herring anticipation is ‘the ability to assess a current
Alex Burns (
[email protected])
Page 7
Copyright © 2003 Alex Burns. For individual private educational & non-commercial use only.
All other rights reserved.
situation with an intelligent mind and be able to put that situation into a future
context’ and its application in companies ‘is a learned attribute.’99 Herring anchors
this framework in three functional categories that include Strategic Decisions and
Actions, Early-Warning Topics and Descriptions of the Key Players.100
Richard Slaughter defines Strategic Foresight as the ‘ability to create and maintain a
high-quality, coherent and functional forward view and to use the insights arising in
organisationally useful ways.’101 Several practitioners have recognised the role of
foresight. McGonagle Jr. and Vella suggest that CI ‘can identify near- and mid-term
technological trends impacting direct competitors’, that strategic intelligence ‘should
be providing significant data on futures trends impacting the company’ and that ‘longterm views’ reinforce effective crisis management programs.102 Strategic Foresight
also enables a BI unit to organically evolve from the ‘information-based, research
library function’ that defined many first generation corporate units ‘to a program that
is delivering forward-looking strategic analysis.’103
Many BI practitioners have encountered foresight and futures techniques in their
pragmatic form. Foresight during the public literature search allows the practitioner
‘to get non-published information straight from the source.’104 Initial hypotheses
during the BI cycle are frequently developed using STEEP (social, technological,
economic, environmental and political) factor analysis and forecasting techniques.105
Scenarios can be used so that ‘the intelligence jigsaw is completed several times’
from several different perspectives.106 The BI use of scenarios is closer to an
artificially constructed information filter or learning tool than as a planning method.
Craig Fleisher and Babette Bensoussan’s ‘FAROUT system’ is probably the most
overt attempt to fuse Strategic Foresight concepts with Business Intelligence. The first
of its six major elements is ‘Future Orientation’. The authors explain the system is
‘designed to assist analysts in discovering what analytical techniques are appropriate
for any situation.’ For Fleisher and Bensoussan, BI ‘must be prospective oriented,
looking both deeply and broadly at an indeterminate and uncertain future, and willing
to take risks by being both predictive and inventive.’ They concur that effective BI
‘will be future, as opposed to historically, oriented.’107
Combining the ‘FAROUT system’ with Slaugher’s depth and long-range views
promises to enhance BI applications and strategies. This is because a successful
Strategic Foresight intervention goes beyond analysis to ‘surface’ the underlying
conceptual framework. Foresight-enabled BI enables analysts and decision-makers to
‘direct their thinking into more future-oriented directions’108 But as F.W. Rustman Jr.
observes, effective intelligence analysts will always divide ‘facts, findings, forecasts
and fortune-telling.’ For the BI and Strategic Foresight practitioner alike, ‘once the
analyst moves from forecasting into fortune-telling, problems begin to arise.’109
Personal Qualities of Intelligence Analysts
Frank Watanabe, a member of the CIA’s Directorate of Intelligence observes that
effective analysis also demands certain personal qualities, project management skills
and understanding what intelligence decision-makers actually require.110 Fuld
contends that successful analysts merge creativity and problem-solving with strong
Alex Burns (
[email protected])
Page 8
Copyright © 2003 Alex Burns. For individual private educational & non-commercial use only.
All other rights reserved.
interviewing and writing skills.111 Practitioners often came from senior management
and had lengthy experience in their organization’s industry. BI staff at Merck, for
example, ‘had an average of 25 years of experience in the pharmaceutical industry.’112
BI practitioners with a military or intelligence background sometimes persuaded
‘more on guilt than intimidation.’113 Meyer suggests that intelligence personnel are
often in a natural conflict with policymakers and executive decision-makers, usually
because they have to deliver the bad news.114 ‘A good intelligence officer,’ Meyer
states, ‘is fundamentally an uncomfortable function . . . yet these are precisely the
qualities that make the intelligence officer so good at what it does . . . uncomfortable,
dissatisfied people who are the most receptive to new ideas and information.’115
Creating a BI Unit in Organizations
Prescott and Gibbons define the BI function in an organizational setting as ‘a
formalized, yet continuously evolving process by which a management team assesses
the evolution of its industry and capabilities and behavior of its current and potential
competitors to assist in maintaining or developing a competitive advantage.’116 Gilad
notes that ‘the development of a business intelligence function will be an evolutionary
process and the function may end up anywhere within the organization’117
Tyson found that the BI unit often begins as a ‘quiet, private network.’118 A project
convener establishes the organization’s collection channels including ‘an 800-number,
a CI e-mailbox, and systematic sales and marketing briefings.’119 Usually the
convener is driven by curiosity and ‘making inquiries on the borderline of his or her
official job description.’120 In their initial phase BI units are often clearinghouses for
ad hoc queries and cross-departmental requests. The new BI analyst usually tracks
demographics and socioeconomic indicators, investment analyst reports and publicentity filings and searches news and journal articles.121
Gordon suggests that the BI function may encompass objectives, beyond a narrowfocused CI emphasis, as the organization evolves: ‘such as identifying and analyzing
acquisition targets, retaining high market share levels, finding approaches to increase
overall industry profitability, gathering ‘nice-to-know’ information as a security
blanket or developing tactical competitor and customer information.’122 Liautaud
found a range of structures, from departmental and complex BI to a centralizeddecentralized spectrum and a ‘help desk’ support approach.123
The most effective BI units, Liautaud found, embodied the ‘information democracy’
ideal rather than the extremes of ‘information anarchy’ versus ‘information
dictatorship’.124 Herring demands that an effective unit meets four quantitative
criteria: time savings, cost savings, cost avoidance and revenue enhancement.125 This
is because the intelligence cycle can be a trade-off between efficiency and
effectiveness.126
Business Intelligence Failures
Perhaps reflecting on the rise-and-fall of strategic planning, writers on Business and
Competitive Intelligence have paid attention to how implementations can fail.
Alex Burns (
[email protected])
Page 9
Copyright © 2003 Alex Burns. For individual private educational & non-commercial use only.
All other rights reserved.
Meyer summarizes a range of BI failures that can occur between the analyst and the
executive decision-makers. Policymakers can interfere with the intelligence process
by ignoring the intelligence reports (passive) or not acting on the intelligence they
receive (active).127 Planned leaks or political implementation can skew the
interpretation of intelligence to normative ends.128 Intelligence analysts can sabotage
their own work by withholding ‘judgments and projections from their policymakers
because of their own distaste for what they know or believe these policymakers will
do.’129 They can become addicted to secrets or focus on secrets and miss relevant
information from public sources.130 Finally, policymakers very rarely share public
credit for intelligence breakthroughs.131 Instead they find that the secretiveness of
these operations means ‘intelligence outfits make excellent scapegoats.’132
For Pollard, most BI failures ‘have not been failures in collection but failures of
organization and evaluation, which is why epistemological concerns are so
important.’133 Epistemological concerns, the management’s ontology and blind-spots
also influence the design of a BI template. Pollard advises that a backcasting exercise
with considers the processes of information gathering, scope and weighting is
crucial.134 Tyson and Swanson also suggest ‘a mission statement be developed for the
intelligence process’ to ensure that the CI function remains aligned with ‘the business
objective.’135 Albrecht warns explicitly that market language may conceal ‘inhumane’
assumptions.136
Tyson and Swanson warn that senior management in a BI unit can become overfascinated with new technology. They witnessed some common errors in ERPoriented implementations: the system was ‘built for Data instead of Information’, the
staff had ‘unrealistic expectations’, there was ‘insufficient user buy-in’ and ‘no senior
management commitment.’137 Seeking patterns in industry dynamics and the
information technology that monitors them can be a dead end. Slywotzky reminds us
that BI maps ‘patterns of internal organizational behavior’ that ‘are rooted in human
nature . . .’138
BI and Foresight Applications I: Mergers & Acquisitions
BI and CI have been deployed by consultants during Mergers & Acquisitions (M&A)
bids. Karl Albrecht estimates that the worldwide M&A market in 1998 was estimated
at $US2.2 trillion dollars.139
A firm in a mature market may use BI ‘to diversify away from the existing market’ by
‘scanning the environment for profitable industries and acquisition candidates.’140
This scanning may be relatively unstructured if the BI practitioners are searching for
innovative companies or ‘acquisitions outside their traditional line of business.’141
Companies that enter into strategic alliances can also use BI as a form of information
control during the deal negotiations. They can minimize ‘negative bleed-through
(information about itself going across to its partner’ and maximize ‘positive bleedthrough (information about the partner being collected).’142
Practitioners use CI techniques to uncover ‘interlocking directorships and critical
relationships’ which may be deal-killers.143 Management and other stakeholders may
Alex Burns (
[email protected])
Page 10
Copyright © 2003 Alex Burns. For individual private educational & non-commercial use only.
All other rights reserved.
be analyzed to discover competitors and reveal possible complementors.144 M&A
support staff may also use computer simulations and scenarios.145
BI and Foresight Applications II: Environmental Scanning and the
Corporate Radar
BI practitioners have adapted insights from Environmental Scanning (ES) and
strategic intelligence/planning into the Corporate Radar (CR) tool.146 Albrecht defines
the CR as ‘the disciplined process of investigating, studying, analyzing, and thinking
about the various dimensions of your business environment’ and advises that it ‘must
be turned on and scanning full time.’147 For Choo the advantage of the CR is that
enables ‘information from various sources can be integrated into a coherent whole for
strategic planning.’148 Herring connects ES with the early warning systems and threat
assessment indicators used in the intelligence community. Analysts must
‘continuously search for indications that these threats might be developing. Then be
prepared to act on them at the earliest possible time.’149
CR-enabled ES enables practitioners to be ‘grounded in reality and may enable us to
see what our competitors may not see.’150 It scans for ‘previously obscure
competitors’ who ‘can emerge to fundamentally reshape an industry.’151 A ‘forwardlooking management team’ perceives the unperceivable through actively scanning the
environment for ‘a combination of conditions and triggers’ that ‘creates new
opportunities for creating value growth and capturing strategic control.’152 This
forward-looking capability links ES with Issues Analysis,153 since both techniques
‘can lead to the requirements of on-going monitoring and tracking of the competitive
environment.’154 Lexis Nexis uses CR-enabled ES in this manner to track brand
values, new technologies, new product development, relevant legislation, and
intelligence in different domains (customer, sales and marketing).155
Often there are no ‘correct’ or ‘right’ answers because situational contexts can
generate co-emergent patterns ‘depending on the other conditions or triggers with
which it combines.’156 Andy Grove, Intel’s former chief, warns of ‘strategic inflection
points’ that redefine industry trajectories and technology paths.157 Analysts must
‘consider not only what happened, but how fast it happened and to what degree.’158
However Proctor & Gamble executives offer one solution to looming ‘strategic
inflection points’: they use BI to boost ‘the quality of our options analysis.’159
ES is probably the most widely adopted Foresight tool in corporations yet it also
possesses significant dangers. CR-enabled ES must be done ‘on an ongoing basis to
achieve a sustainable advantage’160 but this constant stress may trigger analytic
overload for the team. The ES process can create ‘input, output and process
failures’161 that may threaten data reliability. ES analysts do not scan a benign
situation and must be on the outlook for active and passive disinformation.162
Finally, CR-enabled ES is only one component of successful execution. Slywotzky
contends that ES personnel in a commercial setting require ‘a thorough, strategic
understanding of your customers’ and ‘a rich vocabulary of Value Migration patterns
from other industries.’163 Motorola’s use of CR-enabled ES and Total Quality
Management is a pivotal example. Motorola studied the delivery systems of Domino’s
Alex Burns (
[email protected])
Page 11
Copyright © 2003 Alex Burns. For individual private educational & non-commercial use only.
All other rights reserved.
Pizza and Federal Express to improve the customer delivery and logistics
management of its cellular telephone division.164
BI and Foresight Applications III: Shadow Marketing
Intelligence and marketing functions are often closely linked together in BI literature.
Novice researchers may equate market research with CI.165 A benchmarking study
found the BI function in the marketing/marketing research (46%) or sales (14%)
departments.166 The two fields are quite different.
One specific fusion of BI and marketing techniques has been extensively written
about: the use of shadow marketing as a ‘reverse competitive intelligence
technique.’167 The technique has been traced to the role of the ‘shadow cabinet’ in the
United Kingdom’s Westminster system of governance.168
Gordon defines shadow marketing as a way ‘to monitor and analyze a key competitor,
prevent major unpleasant surprises, prepare its business plans, and recommend
changes in direction that capitalize upon that competitor’s weaknesses.’169 Authors
often use sports analogies because analysts monitoring their competition ‘must, in a
very real sense, become the competitor.’170
This observation hints at, but fails to explore, the conceptual links between shadow
marketing, role-playing simulations and action learning pedagogies. The closest that
many companies have come to action learning techniques is to establish a ‘demo
room’ to benchmark competitors’ products in an experiential setting.171 This
environment enables practitioners to present competitor profiles and executive
briefings to decision-makers under the guise of organizational learning.172 The 1980s
popularity of Japanese writings in strategic management literature also shifted the
focus from ‘top-down’ war-gaming to knowledge-oriented ‘bottom-up decision
making.’173 The link between BI, strategic intent, ‘explicit-implicit learning’ and
‘learning capabilities’ gained wider prominence in the late 1990s.174
BI and marketing are more likely to involve online databases175 or use ‘semantic
profiling’ to model how language patterns can reveal different market segments.176 BI
and Strategic Foresight also strengthens Customer Value Analysis, because ‘to
understand the value of the customer, you must look not only back in time, but also
forward in an attempt to predict his or her future potential.’177
One other fusion hints at how BI and marketing may co-evolve in the future. In the
early 1990s brand marketers began using anthropological techniques on a mass-scale
to track trends and monitor the diffusion of iconography from subcultures into the
early mainstream. BI has also used anthropological insights but for the purpose of
capturing, encoding and transmitting knowledge in diverse environments. Galvin
believes that anthropological knowledge will be crucial ‘as we expand our awareness
of this very complex, multi-faceted world.’178
Alex Burns (
[email protected])
Page 12
Copyright © 2003 Alex Burns. For individual private educational & non-commercial use only.
All other rights reserved.
BI and Foresight Applications IV: Patent Searches
However disaster can result if the marketing department becomes disengaged from
the rest of the organization. NutraSweet narrowly avoided this fate when it learned in
1991 that the U.S. Food & Drug Administration was considering the approval of
Johnson & Johnson’s rival product Sucralose. NutraSweet owned ‘two-thirds of the
then $1.5 billion market.’ The marketing department suggested a multi-million dollar
‘defensive marketing blitz.’ Instead NutraSweet’s BI staff did a patent search and
uncovered the reality that the FDA was unlikely to approve Sucralose.179
Pharmaceutical and high technology companies use patent searches to manage their
patent portfolios, engage in technology competition analysis and identify profitable
new ventures.180 This BI application links forward-looking innovation, fast cycle
times and the traditional futures domain of technological forecasting. However
methods have evolved. Companies now identify the ‘scientific domains that
competitors are pursuing’ by monitoring corporate announcements and user feedback
forums, and ‘listening to the silence.’181 Merck and SmithKline Beecham are two
companies that identify opportunity areas and track patents through an in-depth
literature review that creates a ‘high citation index.’182
However patent search strategies can now also involve counterintelligence and
disinformation gambits. Gordon notes that ‘companies in the pharmaceutical industry
are known to patent errors, perhaps in the hope of misinforming competitors or
refining the mistakes into workable products later on.’ Over a long period of time this
‘tit-for-tat’ strategy (popular in game theory circles) creates an industry environment
where ‘some companies are no longer patenting their innovations, preferring to
surprise the market and develop a strong positioning in the minds of customers before
competitors have had a chance to emulate them.’183
Combining patent searches with product deconstruction and marketing initiatives can
generate a broad and defensive strategy. Xerox discovered that Kodak copier sales
people were being trained to service its products. It analyzed the Kodak product
through reverse engineering, examined after-sales service, and then quickly
introduced a Total Satisfaction Guarantee Program that pre-empted Kodak’s similar
offering by several months. Kodak lost the element of surprise and its copier division
was later sold to Danka Business Systems PLC.184 Patent searches remain one of the
most oft-cited intelligence tools for anticipating surprise moves that alter industries.
Alex Burns (
[email protected])
Page 13
Copyright © 2003 Alex Burns. For individual private educational & non-commercial use only.
All other rights reserved.
Select Bibliography
Aiken, Milam (1999). ‘Competitive Intelligence through Neural Networks,’ in
Competitive Intelligence Review. vol. 10, no. 1, 49—53.
Albrecht, Karl (2000). Corporate Radar: Tracking the Forces That Are Shaping Your
Business. AMACOM, New York.
Baumard, Phillipe (1993). ‘National Intelligence Communities: Consolidation Vs.
Renewal?,’ in Prescott, John E. and Patrick T. Gibbons (ed.). Global Perspectives on
Competitive Intelligence. Society of Competitive Intelligence Professionals,
Alexandria, VA. 37-48.
Breeding, Brett (2001). ‘CI and KM Convergence: A Case Study at Shell Services
International,’ in Prescott, John E. and Stephen H. Miller (ed.). Proven Strategies in
Competitive Intelligence: Lessons From The Trenches. John Wiley & Sons, Inc., New
York: 45⎯68.
Brown, John Steely and Paul Duguid (2000). The Social Life of Information. Harvard
Business School Press, Boston MA. Viewed 26 February 2003,
http://www.slofi.com/.
Bruder, Jr., Kenneth J. and Robert M. Fifer (1993). ‘International Benchmarking,’ in
Prescott, John E. and Patrick T. Gibbons. Global Perspectives on Competitive
Intelligence. Society of Competitive Intelligence Professionals, Alexandria, VA. 159175.
Carlberg, Conrad (2002). Business Analysis With Microsoft Excel (2nd ed.). Que
Publishing, Indianapolis.
Choo, Chun Wei (1998). Information Management For The Intelligent Organization
(2nd ed.). Information Today, Inc., Medford, NJ.
Clausewitz, Karl von (1984). On War. Princeton University Press, Princeton, NJ.
Conway, Hugh (1990). ‘Analytical Framework for Corporate Intelligence,’ in Roukis,
George S., Hugh Conway and Bruce H. Charnov (ed.). Global Corporate
Intelligence: Opportunities, Technologies, And Threats In The 1990s. Quorum Books,
Westport, CN. 21—35.
D’Aveni, Richard and Robert Gunther (1994). Hypercompetition: Managing the
Dynamics of Strategic Maneuvering. The Free Press, New York
Davenport, Thomas (2001). The Attention Economy: Understanding the New
Currency of Business. Harvard Business School Press, Boston, MA.
DeWitt, Michelle (1997). Competitive Intelligence, Competitive Advantage. Grand
Rapids, MI, Abacus.
Alex Burns (
[email protected])
Page 14
Copyright © 2003 Alex Burns. For individual private educational & non-commercial use only.
All other rights reserved.
Ellul, Jacques (1973). Propaganda: The Formation of Men’s Attitudes. Vintage
Books, New York.
Fahey, Craig (1999). ‘Competitor Scenarios: Projecting a Rival’s Marketplace
Strategy,’ in Competitive Intelligence Review. vol. 10, no. 2. 65—85.
Fleisher, Craig S. and Babette E. Bensoussan (2003). Strategic and Competitive
Analysis: Methods and Techniques for Analyzing Business Competition. Prentice Hall,
Upper Saddle River, NJ.
Fleisher, Craig S. (2001) ‘An Introduction to the Management and Practice of
Competitive Intelligence (CI),’ in Fleisher, Craig S. and David L. Blenkhorn (ed.).
Managing Frontiers in Competitive Intelligence. Quorum Books., Westport, CN. 3—
18.
Fleisher, Craig S. and David L. Blenkhorn (ed.). (2001). Managing Frontiers in
Competitive Intelligence. Quorum Books, Westport, CN.
Fuld, Leonard M. (1985). Competitor Intelligence: How to Get It; How to Use It. John
Wiley & Sons, Inc., New York.
Fuld, Leonard M (1988). Monitoring The Competition: Find Out What’s Really Going
On Over There. John Wiley & Sons, Inc., New York.
Fuld, Leonard M. (1993). ‘Exporting Intelligence: The U.N. Question’ in Prescott,
John E. and Patrick T. Gibbons (1993b). Global Perspectives on Competitive
Intelligence. Society of Competitive Intelligence Professionals, Alexandria, VA. 6887.
Galvin, Robert W. (2001) ‘Competitive Intelligence at Motorola,’ in Prescott, John E.
and Stephen H. Miller. Proven Strategies in Competitive Intelligence: Lessons From
The Trenches. John Wiley & Sons, Inc., New York: 116⎯122.
Gieskes, Hans. (2001). ‘Competitive Intelligence at Lexis-Nexis,’ in Prescott, John E.
and Stephen H. Miller. Proven Strategies in Competitive Intelligence: Lessons From
The Trenches. John Wiley & Sons, Inc., New York: 69⎯82.
Gilad, Benjamin and Tamar Gilad (1988). The Business Intelligence System: A New
Tool for Competitive Advantage. AMACOM, New York.
Gilad, Benjamin (1993). ‘A Self Examining Test For The Corporate Intelligence
Professional: Where Are You On The Chart?,’ in Prescott, John E. and Patrick T.
Gibbons (ed). Global Perspectives on Competitive Intelligence. Society of
Competitive Intelligence Professionals, Alexandria, VA. 205—212.
Gordon, Ian. (1989). Beat the Competition! How to Use Competitive Intelligence to
Develop Winning Business Strategies. Basil Blackwell Inc., London.
Alex Burns (
[email protected])
Page 15
Copyright © 2003 Alex Burns. For individual private educational & non-commercial use only.
All other rights reserved.
Grove, Andrew (1999). Only The Paranoid Survive (rev. ed.). Currency, New York.
Herring, Jan P (2001). ‘Key Intelligence Topics: A Process to Identify and Define
Intelligence Needs,’ in Prescott, John E. and Stephen H. Miller. Proven Strategies in
Competitive Intelligence: Lessons From The Trenches. John Wiley & Sons, Inc., New
York. 240⎯256.
Heuer, Jr., Richard J. (1999). ‘Psychology of Intelligence Analysis.’ Center for the
Study of Intelligence, Central Intelligence Agency, Washington DC. Viewed 15
March 2003, http://www.odci.gov/csi/books/19104/index.html.
Hohhof, Bonnie (1998). ‘Finding the Wave: Shifts in the CI Model,’ in Competitive
Intelligence Review, vol. 9, no. 1. 60—62.
Hussey, David and Per Jenster (1999). Competitor Intelligence: Turning Analysis into
Success. John Wiley & Sons, Inc., New York.
Inayatullah, Sohail (2002). Questioning The Future: Futures Studies, Action Learning
and Organizational Transformation. Tamkang University, Taipei, Taiwan.
James, Barrie G. (1985). Business Warganes. Penguin Books, Harmondsworth,
Middlesex, England.
Johnson, Steven (2001). Emergence: The Connected Lives of Ants, Brains, Cities, And
Software. Scribner, New York.
Kahaner, Larry (1996). Competitive Intelligence: From Black Ops To Boardrooms:
How Businesses Gather, Analyze, and Use Information to Succeed in the
Marketplace. Simon & Schuster, New York.
Klavans, Richard (1990). ‘Technology Strategy And Competitive Intelligence,’ in
Prescott, John E. and Patrick T. Gibbons (ed.). Global Perspectives on Competitive
Intelligence. Society of Competitive Intelligence Professionals, Alexandria, VA. 129135.
Lackman, Conway L., Kenneth Saban and John M. Lanasa (2001). ‘Organizing the
Competitive Intelligence Function: A Benchmarking Study,’ in Prescott, John E. and
Stephen H. Miller (ed). Proven Strategies in Competitive Intelligence: Lessons From
The Trenches. John Wiley & Sons, Inc., New York. 195⎯215.
Liautaud, Bernard with Mark Hammond (2001). E-Business Intelligence: Turning
Information into Knowledge into Profit. McGraw-Hill, New York.
Linden, Eugene (1998). The Future in Plain Sight: Nine Clues to the Coming
Instability. Simon & Schuster, New York.
Machiavelli, Niccolo (1950). The Prince and The Discourses. Random House, New
York.
Alex Burns (
[email protected])
Page 16
Copyright © 2003 Alex Burns. For individual private educational & non-commercial use only.
All other rights reserved.
Madhavan, Ravindranath (1993). ‘Managing Bleedthrough: The Role Of The CI
Professional In Strategic Alliances,’ in Prescott, John E. and Patrick T. Gibbons (ed.).
Global Perspectives on Competitive Intelligence. Society of Competitive Intelligence
Professionals, Alexandria, VA. 243-259.
Maes, Pattie and John Brockman (2000). ‘Intelligence Augmentation: A Talk With
Pattie Maes.’ Edge: The Third Culture. Viewed 27 March 2003,
http://www.edge.org/3rd_culture/maes/index.html.
Marceau. Stephane and Kenneth Sawka (2001). ‘Developing a World-Class CI
Program in Telecoms,’ in Prescott, John E. and Stephen H. Miller (ed.). Proven
Strategies in Competitive Intelligence: Lessons From The Trenches. John Wiley &
Sons, Inc., New York. 148⎯167.
McGonagle, Jr., John and Carolyn M. Vella (1990). Outsmarting The Competition:
Practical Approaches To Finding and Using Competitive Information. Sourcebooks,
Inc., Napervile, IL.
McGonagle, Jr. and Carolyn M. Vella (1996). A New Archetype for Competitive
Intelligence. Quorum Books, Westport, CN.
Meyer, Herbert L. (1991). Real-World Intelligence. Storm King Press, Friday
Harbour, WA.
Miller, Kent D. and H. Gregory Waller (2003). ‘Scenarios, Real Options and
Integrated Risk Management.’ Long Range Planning, vol. 36. 93—107.
Mintzberg, Henry, Bruce Ahlstrand, and Joseph Lampel (1998). Strategy Safari: A
Guided Tour Through the Wilds of Strategic Management. The Free Press, New York.
Mitnick, Kevin D. and William L. Simon (2002). The Art of Deception: Controlling
the Human Element of Security. Wiley Publishing Inc., Indianapolis, IN.
Musashi, Miyamoto (1992). The Book of Five Rings. Bantam Books, New York.
Nakagawa, Juro (1993). ‘Strategic Information Systems In Japan,’ in Prescott, John E.
and Patrick T. Gibbons. Global Perspectives on Competitive Intelligence. Society of
Competitive Intelligence Professionals, Alexandria, VA. 59-65.
Nonaka, Ikujiro and Hiro Takeuchi (1995). The Knowledge-Creating Company: How
Japanese Companies Create the Dynamics of Innovation. Oxford University Press,
New York.
O’Guin, Michael C. and Timothy Ogilvie (2001). ‘The Science, Not Art, of Business
Intelligence,’ in Competitive Intelligence Review, vol. 12, no. 4. 15—24.
Pattakos, Arion N. (1998). ‘Threat Analysis: Defining the Adversary,’ in Competitive
Intelligence Review, vol. 9, no. 2. 53—62.
Alex Burns (
[email protected])
Page 17
Copyright © 2003 Alex Burns. For individual private educational & non-commercial use only.
All other rights reserved.
Pepper, John E. (2001). ‘Competitive Intelligence at Proctor & Gamble,’ in Prescott,
John E. and Stephen H. Miller (ed.). Proven Strategies in Competitive Intelligence:
Lessons From The Trenches. John Wiley & Sons, Inc., New York. 23⎯33.
Petersen, John L. (1999). Out of the Blue: How to Anticipate Big Future Surprises
(2nd ed.). Madison Books, Lanham, MD.
Pollard, Andrew (1999). Competitor Intelligence: Strategies, Tools and Techniques
for Competitive Advantage. Financial Times Professional Limited, London.
Porter, Michael (1985). Competitive Advantage: Creating and Sustaining Superior
Performance. The Free Press, New York.
Porter, Michael (1980). Competitive Strategy: Techniques for Analyzing Industries
and Competitors. The Free Press, New York.
Prescott, John E. and Stephen H. Miller (2001). Proven Strategies in Competitive
Intelligence: Lessons From The Trenches. John Wiley & Sons, Inc., New York.
Prescott, John E. and Patrick T. Gibbons (1993a). Global Perspectives on Competitive
Intelligence. Society of Competitive Intelligence Professionals, Alexandria, VA.
Prescott, John E. and Patrick T. Gibbons (1993b). ‘Global Competitive Intelligence:
An Overview,’ in Prescott, John E. and Patrick T. Gibbons. Global Perspectives on
Competitive Intelligence. Society of Competitive Intelligence Professionals,
Alexandria, VA. 1—27.
Prescott, John E., Jan P. Herring and Pegi Panfely (2001). ‘Leveraging Information
for Action: A Look into the Competitive and Business Intelligence Consortium
Benchmarking Study,’ in Prescott, John E. and Stephen H. Miller (ed.). Proven
Strategies in Competitive Intelligence: Lessons From The Trenches. John Wiley &
Sons, Inc., New York. 176⎯194.
Pring, David C (1993). ‘Competitive Intelligence and Market Research: Filling The
Gaps,’ in Prescott, John E. and Patrick T. Gibbons (ed.). Global Perspectives on
Competitive Intelligence. Society of Competitive Intelligence Professionals,
Alexandria, VA. 223—239.
Ries, Al and Jack Trout (1986). Marketing Warfare. McGraw-Hill, New York.
Rogers, Everett M. (1995). Diffusions of Innovation (4th ed.). The Free Press, New
York.
Rosenkrans, Jr. Wayne A. (2001). ‘Past, Present and Future Directions for Technical
Intelligence,’ in Prescott, John E. and Stephen H. Miller. Proven Strategies in
Competitive Intelligence: Lessons From The Trenches. John Wiley & Sons, Inc., New
York. 297⎯307.
Alex Burns (
[email protected])
Page 18
Copyright © 2003 Alex Burns. For individual private educational & non-commercial use only.
All other rights reserved.
Roukis, George S. (1990). ‘The Corporate Intelligence Process: Global Perspectives
and Approaches,’ in Roukis, George S., Hugh Conway and Bruce H. Charnov (ed.).
Global Corporate Intelligence: Opportunities, Technologies, And Threats In The
1990s. Quorum Books, Westport, CN. 4—20.
Roukis, George S., Hugh Conway and Bruce H. Charnov (1990). Global Corporate
Intelligence: Opportunities, Technologies, And Threats In The 1990s. Quorum Books,
Westport, CN.
Rustman, Jr. F.W. (2002). CIA, Inc.: Espionage And The Craft Of Business
Intelligence. Brassey’s Inc., Washington DC.
Sawka, Ken (1997). ‘Warning Analysis: A Risky Business,’ in Competitive
Intelligence Review. vol. 8, no. 4, Winter, 83—84.
Sawka, Ken (1998a). ‘Early Warning: The Decision-maker’s Perspective,’ in
Competitive Intelligence Review. vol. 9, no. 2, January—March. 63—65.
Sawka, Ken (1998b). ‘Developing the Warning Process,’ in Competitive Intelligence
Review. vol. 9, no. 3, April—June. 76—77.
Schwartz, Peter (2002). The Art of the Long View: Planning For The Future In An
Uncertain World. Richmond Ventures Ltd., North Sydney.
SCIP (2001a). ‘Understanding the Competition: The CEO’s Perspective,’ in. Prescott,
John E. and Stephen H. Miller (ed.). Proven Strategies in Competitive Intelligence:
Lessons From The Trenches. John Wiley & Sons, Inc., New York. 133⎯147.
SCIP (2001b). ‘Starting a Competitive Technical Intelligence Function: A Roundtable
Discussion,’ in Prescott, John E. and Stephen H. Miller (ed.). Proven Strategies in
Competitive Intelligence: Lessons From The Trenches. John Wiley & Sons, Inc., New
York. 308⎯317.
Slaughter, Richard A. (2002). ‘Developing and Applying Strategic Foresight.’
Foresight International. Viewed 27 March 2003,
http://www.foresightinternational.com.au/07resources/Dev&Apply_Strategic_Foresig
ht.pdf.
Slywotzky, Adrian (1996). Value Migration: How To Think Several Moves Ahead Of
The Competition. Harvard Business School Press, Boston MA.
Slywotzky, Adrian J. and David J. Morrison (1998). The Profit Zone: How Strategic
Business Design Will Lead You To Tomorrow’s Profits. Allen & Unwin, St. Leonards.
Slywotzky, Adrian J. and David J. Morrison with Ted Moser, Kevin A. Mundt and
James A. Quella (1999). Profit Patterns: 30 Ways To Anticipate And Profit From
Strategic Forces Reshaping Your Business. John Wiley & Sons, Ltd., New York.
Alex Burns (
[email protected])
Page 19
Copyright © 2003 Alex Burns. For individual private educational & non-commercial use only.
All other rights reserved.
Smith, Jr., Vincent M. and Francis Narin (1993). ‘Technology Indicators For
Assessing Global Coporate Performance,’ in Prescott, John E. and Patrick T. Gibbons
(ed). Global Perspectives on Competitive Intelligence. Society of Competitive
Intelligence Professionals, Alexandria, VA. 101-119.
Tomioka, Akira (1990). ‘Corporate Intelligence: The Key to the Strategic Success of
Japanese Organizations in International Environments,’ in Roukis, George S., Hugh
Conway and Bruce H. Charnov (ed). Global Corporate Intelligence: Opportunities,
Technologies, And Threats In The 1990s. Quorum Books, Westport CN. 211—226.
Treverton, Gregory F. (2001). ‘Intelligence and the Market State,’ in Studies In
Intelligence, no. 10, Winter—Spring. 69—76. Viewed 24 March 2003,
http://www.odci.gov/csi/studies/winter_spring01/article09.pdf.
Tyson, Kirk M. (1990). Competitor Intelligence Manual and Guide: Gathering,
Analyzing, and Using Business Intelligence. Prentice Hall, Englewood Cliffs, NJ.
Tyson, Kirk M., and Kathryn M. Swanson (1993). ‘Global Business Intelligence
Processes: Executive Information Systems Approaches For Simple Or Complex
Organizations,’ in Prescott, John E. and Patrick T. Gibbons (ed). Global Perspectives
on Competitive Intelligence. Society of Competitive Intelligence Professionals,
Alexandria, VA. 367—375.
Tzu, Sun (1988). The Art of War. Shambhala, Boston, MA.
Vitt, Elizabeth, Michael Luckevic and Stacia Misner (2002). Business Intelligence:
Making Better Decisions Faster. Microsoft Press, Redmond, WA.
Watanabe, Frank (1997). ‘Fifteen Axioms for Intelligence Analysts.’ Studies In
Intelligence, Semiannual Edition, no. 1. Central Intelligence Agency, Washington
DC. Viewed 26 March 2003, http://www.odci.gov/csi/studies/97unclass/axioms.html.
West, Chris (2002). Competitive Intelligence. Palgrave, New York.
1
Gordon (1989), p. 9.
McGonagle Jr., and Vella (1990), p. 268.
3
Fuld (1985), p. 9.
4
Vitt, Luckevic and Misner (2002), p. 13.
5
Meyer (1991), p. x.
6
James (1985) p147.
7
McGonagle, Jr. and Vella (1990), p. 286.
8
Liautaud (2001), p. 106.
9
Mitnick and Simon (2002).
10
Rustman Jr. (2002), p. 6.
11
McGonagle Jr. and Vella (1996), pp. 16—17.
12
Gieskes (2001), p. 81.
13
Tzu (1988).
14
Musashi (1992).
15
Machiavelli (1950).
16
von Clausewitz (1984).
17
Gordon (1989), p. 41.
18
Fleischer and Bensoussan (2003), p. 145.
2
Alex Burns (
[email protected])
Page 20
Copyright © 2003 Alex Burns. For individual private educational & non-commercial use only.
All other rights reserved.
19
Ellul (1973).
Roukis (1990), p. 5.
21
Meyer (1991), p. 55.
22
Fuld (1993). p. 68.
23
Tomioka (1990). p, 215.
24
Fuld (1988), p. 24.
25
McGonagle Jr. and Vella (1996), p. 39.
26
Meyer (1991), pp. 61—62.
27
Choo (1998), pp. 120, 122⎯123.
28
Meyer (1991), p. 58.
29
Treverton (2001).
30
Conway (1990), p. 25.
31
Albrecht (2000), p. 26.
32
Nonaka and Takeuchi (1995).
33
Galvin (2001), p. 118.
34
Gilad (1993), p. 207.
35
Rustman Jr. (2002), p. 18.
36
Meyer (1991), pp. 60—61.
37
Choo (1998), p. 137.
38
Rustman Jr. (2002), p. 109.
39
DeWitt (1997), p. 48.
40
McGonagle Jr. and Vella (1996), p. 40.
41
Fuld (1985), p. 14.
42
Fuld (1985), pp. 320, 321.
43
Rustman Jr. (2002), p. 98.
44
Gilad (1993), p. 207.
45
Herring (2001) p241.
46
Rosenkrans, Jr. (2001), pp. 298⎯299.
47
Herring (2001).
48
Gilad and Gilad (1988), p. 27.
49
Tyson (1993), p. 208.
50
Breeding (2001), p. 47.
51
Tyson (1990), p. 229.
52
Rustman Jr. (2002), p. 102.
53
Gilad and Gilad (1988), p. 23.
54
Meyer (1991), p. 34.
55
Prescott and Gibbons (1993), p. 3.
56
Liautaud and Hammond (2001), p. 5.
57
Meyer (1991), p. 43.
58
Meyer (1991), p. 22.
59
Meyer (1991), p. 45.
60
Liautaud and Hammond (ibid), pp. 5—6.
61
Johnson (2001).
62
Meyer (1991), pp. 41—42.
63
Gilad and Gilad (1988), pp. 103—104.
64
Choo (1998), p. 207.
65
O’Guin and Ogilvie (2001), p. 2.
66
Slyowtzky et. al. (1999), p. 51.
67
Hussey and Jenster (1999), pp. 18—19.
68
Choo (1998), p. 176.
69
Porter (1980); Mintzberg, Ahlstrand, and Lampel (1998), pp. 100—102.
70
Hussey and Jenster (1999), p. 42.
71
Hussey and Jenster (1999), p. 8.
72
Fleischer and Bensoussan (2003), p. 123.
73
Gordon (1989), p. 93.
74
Albrecht (2000), p. 94.
75
McGonagle Jr. and Vella (1996), p. 15.
76
James (1985); Ries and Trout (1986).
Alex Burns (
[email protected])
Page 21
Copyright © 2003 Alex Burns. For individual private educational & non-commercial use only.
All other rights reserved.
20
77
Pattakos (1998); Sawka (1997); Sawka (1998a); Sawka (1998b).
Slywotzky (1996), pp. 59—60; Petersen (1999).
79
Fleischer and Bensoussan (2003), pp. 150⎯158.
80
Tyson and Swanson 1993, p. 367.
81
Heuer, Jr. (1999).
82
McGonagle Jr. and Vella (1990), p. 235.
83
Liautaud (2001), p. 112.
84
Pollard (1999), p. 6.
85
Hohhof (1998).
86
Liautaud (2001), p. 43.
87
Liautaud (200), p. 182.
88
Aiken (1999).
89
Liautaud (2001), p. 153.
90
McGonagle Jr. and Vella (1990), p. 249.
91
Baumard (1993), p. 43.
92
Maes and Brockman (2000).
93
Miller and Waller (2003).
94
Fahey (1999).
95
Fuld (1988), p. 64.
96
Marceau and Sawka (2001), p. 161.
97
Pollard (1999), p. 46.
98
SCIP (2001a), p. 145.
99
Herring (2001), p. 188.
100
Herring (2001), p. 244.
101
Slaughter (2002).
102
McGonagle Jr. and Vella (1996), p. 30.
103
Marceau and Sawka (2001), p. 166.
104
Tyson (1990), p. 154.
105
Tyson (1990), p. 162.
106
Tyson (1990), p. 193.
107
Fleisher and Bensoussan (2003), p. 23.
108
Gilad and Gilad (1988), p. 194.
109
Rustman Jr. (2002), p. 99.
110
Watanabe (1997).
111
Fuld (1988), p. 138.
112
Prestcott, Herring and Panfely (2001), p. 178.
113
Rustman Jr. (2002), p. 16.
114
Meyer (1991), p. 74.
115
Meyer (1991), pp. 85—87.
116
Prescott and Gibbons (1993), p. 2.
117
Gilad and Gilad (1988), p. 183.
118
Tyson (1990), p. 242.
119
Marceau and Sawka (2001), p. 153.
120
Liautaud, (2001), p. 128.
121
Breeding (2001), pp.51⎯52.
122
Gordon (1989), p. 26.
123
Gilad and Gilad (1988), pp. 159—160.
124
Liautaud (2001), p. 15-16.
125
SCIP (2001b), p. 315.
126
Pollard (1999), p. 35.
127
Meyer (1991), p. 80.
128
Meyer (1991), p. 81.
129
Meyer (1991), p. 82—83.
130
Meyer (1991), p. 40.
131
Meyer (1991), p. 83—85.
132
Meyer (1991), p. 70.
133
Pollard (1999), p. 127.
134
Pollard (1999), p. 175.
Alex Burns (
[email protected])
Page 22
Copyright © 2003 Alex Burns. For individual private educational & non-commercial use only.
All other rights reserved.
78
135
Tyson and Swanson (1999), p. 374.
Albrecht (2000), p. 70.
137
Tyson and Swanson (1993), pp. 373—375.
138
Slywotzky et al (1998), p. 341.
139
Albrecht (2000), p. 102.
140
Gilad and Gilad (1988), p. 7.
141
Gilad and Gilad (1988) p30.
142
Madhavan (1993), p. 249.
143
McGonagle Jr. and Vella (1990), p. 17.
144
Fleischer and Bensoussan (2003), p. 301.
145
Breeding (2001), p. 55.
146
Pollard (1999), p. 13; Slywotzky et al. (1999), pp. 319, 375.
147
Albrecht (2000), p. 7.
148
Choo (1998), p. 79.
149
SCIP (2001a), p. 145.
150
Albrecht (2000), p. 15.
151
Slywotzky (1996), p. 75.
152
Slywotzky et al. (1999), p. 315.
153
Fleischer and Bensoussan (2003), p. 254.
154
Pring (1993), p. 225.
155
Gieskes (2001), p. 73.
156
Slywotzky et al. (1999), p. 336.
157
Grove (1999).
158
Slywotzky (1996), p. 262.
159
Pepper (2001), p. 29.
160
Gordon (1989), p. 11.
161
Pollard (1999), pp. 49⎯50.
162
McGonagle Jr. and Vella (1990), p. 240.
163
Slywotzky (1996), p. 251.
164
Bruder, Jr. and Fifer (1993), p. 162.
165
Fleischer and Bensoussan (2003), p. 135.
166
Conway, Saban and Lanasa, (2001), p. 202.
167
Gilad and Gilad (1988), p. 203.
168
McGonagle, Jr. and Vella (1990), p. 282.
169
Gordon (1989), p. 18.
170
McGonagle, Jr. and Vella (1990), p. 48.
171
Fuld (1988), p. 113.
172
Choo (1998), p. 185.
173
Nakagawa (1993), p. 60.
174
Prescott and Gibbons (1993), p. 17.
175
Choo (1998), p. 186.
176
Albrecht (2000), p. 114.
177
Liautaud (2001), p. 136.
178
Galvin (2001), p. 121.
179
DeWitt (1997), p. 37.
180
Fleischer and Bensoussan (2003), pp. 350.
181
Klavans (1993), p. 134.
182
Smith Jr. and Narin (1993), p. 104.
183
Gordon (1989), p. 58.
184
DeWitt (1997), p. 38.
136
Alex Burns (
[email protected])
Page 23
Copyright © 2003 Alex Burns. For individual private educational & non-commercial use only.
All other rights reserved.