A New Archetype for Competitive Intelligence

By John J. McGonagle Jr.; Carolyn M. Vella | Go to book overview

Select Bibliography

ON INTELLIGENCE AND INFORMATION SECURITY

Allen Beth. "Information as an Economic Commodity." American Economic Review 80 ( May 1990): 272 et seq.

Alster Norm. "The Valley of the Spies." Forbes, 26 October 1992, 200, 201, 204.

Berman Saul J. "U.S. Memories: The Secrets of Successful Competitive Analysis." Planning Review 19 ( November/December 1991): 28-35.

Bernhardt Douglas. Perfectly Legal Competitor Intelligence. London: Pitman, 1993.

Cochian Henry T. "Strategic Business Intelligence." Competitive Intelligence Review 2 (Spring 1991).

Conference Board, Inc. Competitive Intelligence. Research Report No. 913, 1988.

Coupe Stuart. "Case of the Hidden Watchers." Good Weekend -- The Sydney Morning Herald Magazine [ Australia], 5 September 1992, 27-28, 30, 32, 37.

Eels Richard, and Peter Nehemkis. Corporate Intelligence and Espionage. New York: Macmillan, 1984.

Fuld Leonard M. Competitor Intelligence. New York: John Wiley & Sons, 1985.

Gavin Andrew, and Hubert Bermont. How To Win with Information or Lose Without It. Washington, D.C.: Bermont Books, 1980.

Gelinne Michael S. "Benchmarking Information Sources." Competitive Intelligence Review 3 (Summer 1992): 41-43.

Hauxwell Gerald. "Role of the Engineer and Scientist in Competitor Assessment/Analysis." The Competitive Intelligencer 3 ( May 1989): 12-13.

Jaworski Bernard, and Liang Chee Wee. Competitive Intelligence: Creating Value for the Organization -- Final Report on SCIP Sponsored Research. Vienna, Va.: Society of Competitive Intelligence Professionals, 1993.

Klavens Richard. "Technology Strategy and Competitive Intelligence." Competitive Intelligence Review 5 (Spring 1994).

Lesser Harry, Ann Lederer, and Charles Steinberg. "Increasing Pressures for Confidentiality Agreements that Work." Mergers & Acquisitions 26 ( March/ April 1992): 23-27.

-209-

Notes for this page

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
One moment ...
Default project is now your active project.
Project items
Notes
Cite this page

Cited page

Style
Citations are available only to our active members.
Buy instant access to cite pages or passages in MLA 8, MLA 7, APA and Chicago citation styles.

(Einhorn, 1992, p. 25)

(Einhorn 25)

(Einhorn 25)

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Note: primary sources have slightly different requirements for citation. Please see these guidelines for more information.

Cited page

Bookmark this page
A New Archetype for Competitive Intelligence
Table of contents

Table of contents

  • Title Page iii
  • Contents v
  • Figures and Tables vii
  • Acknowledgments ix
  • I - Introduction 1
  • 1 - About This Book 3
  • Note 4
  • 2 - Why Is Intelligence Important Today -- and More Important Tomorrow? 5
  • Appendix: National Interests in Intelligence 10
  • Notes 11
  • 3 - The Building Blocks of Cyber-IntelligenceTM 13
  • Appendix: Reengineering and Downsizing 19
  • Notes 20
  • 4 - Cyber-IntelligenceTM in the Modern Corporation 23
  • Appendix: Case Study -- How Pervasive is Cyber-Intelligence in Modern Businesses? 34
  • Notes 36
  • II - The Building Blocks of Cyber-intelligenceTM 37
  • 5 - Competitive Intelligence 39
  • How Does CI Relate to the Other Building Blocks of Cyber-IntelligenceTM? 44
  • Notes 49
  • 6 - Strategic Intelligence 51
  • Notes 54
  • 7 - Market Intelligence 57
  • Notes 60
  • 8 - Crisis Management 63
  • Notes 66
  • 9 - Benchmarking 69
  • Notes 82
  • 10 Reverse Engineering 85
  • Notes 90
  • 11 - Defensive (Counter) Intelligence 91
  • Notes 96
  • 12 - The Building Blocks of Cyber-IntelligenceTM: Charting the Relationships 97
  • III - Using Cyber-IntelligenceTM 99
  • Notes 105
  • 13 - Data Gathering: An Overview of Sources 107
  • Notes 117
  • 14 - Data Gathering: An Overview of Techniques 119
  • Appendix: Case Study 129
  • Notes 132
  • 15 - Data Analyses 133
  • Appendix A: Comparative Target Profile Summary 146
  • Appendix B: Strategic Analysis Report Form 147
  • Appendix C: Communicating Conclusions 150
  • APPENDIX B: STRATEGIC ANALYSIS REPORT FORM 151
  • 16 - Using Cyber-IntelligenceTM Intelligently 153
  • Appendix A: Using Cyber-Intelligence in Strategic Planning 174
  • Appendix B: Case Study -- CI Supporting Other Intelligence Functions 178
  • APPENDIX B: CASE STUDY -- CI SUPPORTING OTHER INTELLIGENCE FUNCTIONS 179
  • 17 - Critical Management Issues 183
  • Notes 190
  • 18 - The Future of Cyber-IntelligenceTM 191
  • A - U.S.-Based Organizations Involved with Some Aspect of Cyber-IntelligenceTM 193
  • B - Selected Internet World Wide Web Sites 195
  • Glossary 201
  • Select Bibliography 209
  • Index to Forms and Checklists 217
  • Index to Case Studies 219
  • Index 221
  • About the Authors *
Settings

Settings

Typeface
Text size Smaller Larger Reset View mode
Search within

Search within this book

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

Help
Full screen
Items saved from this book
  • Bookmarks
  • Highlights & Notes
  • Citations
/ 225

matching results for page

    Questia reader help

    How to highlight and cite specific passages

    1. Click or tap the first word you want to select.
    2. Click or tap the last word you want to select, and you’ll see everything in between get selected.
    3. You’ll then get a menu of options like creating a highlight or a citation from that passage of text.

    OK, got it!

    Cited passage

    Style
    Citations are available only to our active members.
    Buy instant access to cite pages or passages in MLA 8, MLA 7, APA and Chicago citation styles.

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn, 1992, p. 25).

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn 25)

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn 25)

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences."1

    1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

    Cited passage

    Thanks for trying Questia!

    Please continue trying out our research tools, but please note, full functionality is available only to our active members.

    Your work will be lost once you leave this Web page.

    Buy instant access to save your work.

    Already a member? Log in now.

    Search by... Author
    Show... All Results Primary Sources Peer-reviewed

    Oops!

    An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.