Competitive Intelligence Review最新文献

筛选
英文 中文
Data smog 数据烟雾
Competitive Intelligence Review Pub Date : 2007-03-22 DOI: 10.1002/(SICI)1520-6386(199724)8:4<89::AID-CIR19>3.0.CO;2-8
John McGonagle
{"title":"Data smog","authors":"John McGonagle","doi":"10.1002/(SICI)1520-6386(199724)8:4<89::AID-CIR19>3.0.CO;2-8","DOIUrl":"https://doi.org/10.1002/(SICI)1520-6386(199724)8:4<89::AID-CIR19>3.0.CO;2-8","url":null,"abstract":"","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 4","pages":"89"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199724)8:4<89::AID-CIR19>3.0.CO;2-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71947005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The art and science of business intelligence analysis 商业智能分析的艺术与科学
Competitive Intelligence Review Pub Date : 2007-03-22 DOI: 10.1002/(SICI)1520-6386(199723)8:3<99A::AID-CIR25>3.0.CO;2-V
John McGonagle
{"title":"The art and science of business intelligence analysis","authors":"John McGonagle","doi":"10.1002/(SICI)1520-6386(199723)8:3<99A::AID-CIR25>3.0.CO;2-V","DOIUrl":"https://doi.org/10.1002/(SICI)1520-6386(199723)8:3<99A::AID-CIR25>3.0.CO;2-V","url":null,"abstract":"","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 3","pages":"99a-100"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199723)8:3<99A::AID-CIR25>3.0.CO;2-V","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71975398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Emerging trends in information brokering 信息中介的新趋势
Competitive Intelligence Review Pub Date : 2007-03-22 DOI: 10.1002/(SICI)1520-6386(199724)8:4<48::AID-CIR8>3.0.CO;2-K
Mary Ellen Bates
{"title":"Emerging trends in information brokering","authors":"Mary Ellen Bates","doi":"10.1002/(SICI)1520-6386(199724)8:4<48::AID-CIR8>3.0.CO;2-K","DOIUrl":"https://doi.org/10.1002/(SICI)1520-6386(199724)8:4<48::AID-CIR8>3.0.CO;2-K","url":null,"abstract":"<p>Online research via the Internet has revolutionized the role of independent information brokers, who provide fee-based services ranging from online database searching and public records' research, to digital library development. While information brokering once focused on “rip and ship”—running a search, printing out the results, and shipping it out to the client—information brokers today are expected to be true “intelligent agents,” evaluating sources, detecting and alerting clients to discrepancies in the data, summarizing the results and making recommendations based on the information gathered. Moreover, clients now expect information in hours instead of days. And the global economy has increased the need to collect information from international sources. The mushrooming number of online “boutique services” are providing more, and better, information on specialized niches—but these accounts can be costly, and they require staying on top of system features and quirks (including unique search software) and pricing options. The author concludes that the proliferation of information online will translate into greater appreciation for the information broker's skills in finding useful information efficiently, evaluating alternative sources, and selecting the ones most appropriate for the client's project, while providing a buffer of confidentiality when inquiries need to be made without involving the client's name. © 1997 John Wiley &amp; Sons, Inc.</p>","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 4","pages":"48-53"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199724)8:4<48::AID-CIR8>3.0.CO;2-K","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71975404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The economic espionage act: Turning fear into compliance 经济间谍法:将恐惧转化为顺从
Competitive Intelligence Review Pub Date : 2007-03-22 DOI: 10.1002/(SICI)1520-6386(199723)8:3<20::AID-CIR6>3.0.CO;2-H
Naomi R. Fine
{"title":"The economic espionage act: Turning fear into compliance","authors":"Naomi R. Fine","doi":"10.1002/(SICI)1520-6386(199723)8:3<20::AID-CIR6>3.0.CO;2-H","DOIUrl":"https://doi.org/10.1002/(SICI)1520-6386(199723)8:3<20::AID-CIR6>3.0.CO;2-H","url":null,"abstract":"<p>Businesses must show that they have taken reasonable measures to protect their proprietary trade secrets in order to invoke the protection of the Economic Espionage Act of 1996. The Federal Sentencing Guidelines can be a roadmap for meeting this requirement, since they provide instructions on how to design, implement, and enforce an effective program to prevent and detect violations of the law. By complying with the seven steps outlined in the Guidelines, businesses can show that they have exercised due diligence in seeking to prevent and detect criminal conduct by employees and other agents. The author discusses each of these requirements as applied to the EEA. © 1997 John Wiley &amp; Sons, Inc.</p>","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 3","pages":"20-24"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199723)8:3<20::AID-CIR6>3.0.CO;2-H","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71976484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Can American companies still practice safe searches? 美国公司还能实行安全搜查吗?
Competitive Intelligence Review Pub Date : 2007-03-22 DOI: 10.1002/(SICI)1520-6386(199723)8:3<29::AID-CIR8>3.0.CO;2-L
Leonard M. Fuld
{"title":"Can American companies still practice safe searches?","authors":"Leonard M. Fuld","doi":"10.1002/(SICI)1520-6386(199723)8:3<29::AID-CIR8>3.0.CO;2-L","DOIUrl":"https://doi.org/10.1002/(SICI)1520-6386(199723)8:3<29::AID-CIR8>3.0.CO;2-L","url":null,"abstract":"<p>Although the Economic Espionage Act of 1996 greatly broadened the definition of “trade secrets” whose misappropriation can trigger criminal penalties, businesses still must keep abreast of the capabilities, vulnerabilities, and intentions of their rivals if they are to remain competitive. Fortunately, the Act does not, in fact, hamstring aggressive intelligence gathering—as long as CI professionals recognize the legal boundaries and apply common sense when in the field. Smart analysis of available data, after all, remains fair game. To navigate gray areas, identify yourself when soliciting information. Be wary of specialized information from suppliers, joint-venture partners, new employees, or job candidates that may legally belong to a competitor. If you know the target company is treating information as confidential, don't ask for it. Observe basic safe-search limits, and you can remain an aggressive competitor. © 1997 John Wiley &amp; Sons, Inc.</p>","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 3","pages":"29-31"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199723)8:3<29::AID-CIR8>3.0.CO;2-L","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71976485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Counterintelligence and law enforcement: The Economic Espionage Act of 1996 versus Competitive Intelligence 反情报和执法:1996年《经济间谍法》与竞争情报
Competitive Intelligence Review Pub Date : 2007-03-22 DOI: 10.1002/(SICI)1520-6386(199723)8:3<25::AID-CIR7>3.0.CO;2-%23
Peter F. Kalitka
{"title":"Counterintelligence and law enforcement: The Economic Espionage Act of 1996 versus Competitive Intelligence","authors":"Peter F. Kalitka","doi":"10.1002/(SICI)1520-6386(199723)8:3<25::AID-CIR7>3.0.CO;2-%23","DOIUrl":"https://doi.org/10.1002/(SICI)1520-6386(199723)8:3<25::AID-CIR7>3.0.CO;2-%23","url":null,"abstract":"<p>Arguing that “business is a form of warfare,” the author contends that foreign and domestic economic espionage, trade secrets theft, and unethical competitive intelligence collection activities have been targeted at America's industrial base. Now, however, with the passage of the Economic Espionage Act of 1996 (the EEA), dubious competitive intelligence operations are no longer entitled to a “free ride.” The author believes that the current Code of Ethics of the Society of Competitive Intelligence Professionals is too broad and encourages a variety of interpretations, particularly when it comes to the practices of outside consulting firms that specialize in “hard-to-get” information. Given the penalties companies now face under the EEA, the author advises businesses hiring outside competitive intelligence or “research” consultants to specifically define in writing: (1) What is hard-to-get information?; (2) How do they obtain this information?; (3) Do they adhere to SCIP's Code of Ethics?; and (4) Do they have accounts with clients' competitors and have they collected against the client for these competitors? Moreover, businesses that either engage in CI activities or hire outside contractors to do so should commit their collection plan to paper, and have it reviewed and approved by legal counsel. © 1997 John Wiley &amp; Sons, Inc.</p>","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 3","pages":"25-28"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71976486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The PUR analysis of investor-owned electric and gas utilities, 1996 edition 投资者所有的电力和天然气公用事业的PUR分析,1996年版
Competitive Intelligence Review Pub Date : 2007-03-22 DOI: 10.1002/(SICI)1520-6386(199723)8:3<100::AID-CIR26>3.0.CO;2-%23
John McGonagle
{"title":"The PUR analysis of investor-owned electric and gas utilities, 1996 edition","authors":"John McGonagle","doi":"10.1002/(SICI)1520-6386(199723)8:3<100::AID-CIR26>3.0.CO;2-%23","DOIUrl":"https://doi.org/10.1002/(SICI)1520-6386(199723)8:3<100::AID-CIR26>3.0.CO;2-%23","url":null,"abstract":"","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 3","pages":"100-101"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71975399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
KnowledgeX: Finding hidden relationships for CI analysis KnowledgeX:查找CI分析的隐藏关系
Competitive Intelligence Review Pub Date : 2007-03-22 DOI: 10.1002/(SICI)1520-6386(199723)8:3<92::AID-CIR20>3.0.CO;2-7
Robert D. Aaron
{"title":"KnowledgeX: Finding hidden relationships for CI analysis","authors":"Robert D. Aaron","doi":"10.1002/(SICI)1520-6386(199723)8:3<92::AID-CIR20>3.0.CO;2-7","DOIUrl":"https://doi.org/10.1002/(SICI)1520-6386(199723)8:3<92::AID-CIR20>3.0.CO;2-7","url":null,"abstract":"","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 3","pages":"92-94"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199723)8:3<92::AID-CIR20>3.0.CO;2-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71981043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Education and CI: Are he pulling the toil homer than patting the head? 教育与CI:比起拍脑袋,他是在努力工作吗?
Competitive Intelligence Review Pub Date : 2006-10-16 DOI: 10.1002/cir.3880080217
Vernon Prior
{"title":"Education and CI: Are he pulling the toil homer than patting the head?","authors":"Vernon Prior","doi":"10.1002/cir.3880080217","DOIUrl":"https://doi.org/10.1002/cir.3880080217","url":null,"abstract":"","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 2","pages":"93-94"},"PeriodicalIF":0.0,"publicationDate":"2006-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/cir.3880080217","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71921081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Economic espionage: Now it's a federal case 经济间谍:现在是联邦案件
Competitive Intelligence Review Pub Date : 2006-10-16 DOI: 10.1002/cir.3880080117
Stephen H. Miller
{"title":"Economic espionage: Now it's a federal case","authors":"Stephen H. Miller","doi":"10.1002/cir.3880080117","DOIUrl":"https://doi.org/10.1002/cir.3880080117","url":null,"abstract":"","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 1","pages":"93-94"},"PeriodicalIF":0.0,"publicationDate":"2006-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/cir.3880080117","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71929866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信