Competitive Intelligence Review最新文献

筛选
英文 中文
PENENTUAN JALUR DISTRIBUSI DENGAN METODE SAVING MATRIKS 通过保存矩阵方法确定分配路径
Competitive Intelligence Review Pub Date : 2018-12-27 DOI: 10.36618/competitive.v13i1.346
Fandi Ahmad, Hafidz Fadel Muharram
{"title":"PENENTUAN JALUR DISTRIBUSI DENGAN METODE SAVING MATRIKS","authors":"Fandi Ahmad, Hafidz Fadel Muharram","doi":"10.36618/competitive.v13i1.346","DOIUrl":"https://doi.org/10.36618/competitive.v13i1.346","url":null,"abstract":"Dalam persaingan bisnis yang makin ketat dibutuhkan strategi dalam menetukan optimalisasi dan efesiensi, mengefektifkan jalur distribusi barang akan berakibat pada profit yang diperoleh perusahaan dan harga barang yang makin kompetitif, kesalahan penentuan jalur distribusi ke customer akan mengakibatkan jalur pengiriman yang ditempuh terlalu panjang dan rumit sehingga mengakibatkan biaya transportasi yang mahal. Dengan adanya permasalahan tersebut, maka perlu dilakukan penentuan rute yang akan dilalui sehingga dapat meminimalkan biaya transportasi pada Metode Saving Matrix dipilih dalam penelitian ini untuk menentukan rute distribusi produk t agar diperoleh rute dan memperoleh biaya transportasi yang optimal. \u0000Dari hasil penelitian rute pada penelitian ini diketahui berjumlah 18 rute dari sebelumnya berjumlah 25 rute, sehingga diperoleh pernghematan 7 rute, total jarak melalui metode perhitungan saving matrix, nearest insert dan nearest neighbour adalah sebesar 1700,69 km. Sedangkan total jarak pengiriman rute aktual pada perusahaan adalah sebesar 2046,97 km. Penghematan antara rute penelitian  ini dengan rute aktual perusahaan adalah sebesar 346,28 km.sedangkan daris sisi total biaya pengiriman/transportasi yang dihasilkan melalui metode perhitungan saving matrix, nearest insert dan nearest neighbour adalah sebesar Rp. 483.927.812. Dari sisi biaya pengiriman/transportasi rute aktual pada perusahaan adalah sebesar Rp. 629.281.041. Penghematan dengan metode penelitian saving matrix adalah sebesar Rp. 145.353.229 atau 23,09 % \u0000  \u0000In the increasingly fierce business competition strategies are needed to determine optimization and efficiency, streamlining the distribution channels of goods will result in profits obtained by the company and increasingly competitive goods prices, errors in determining the distribution path to the customer will lead to too long and complicated shipping lines resulting expensive transportation costs. With these problems, it is necessary to determine the route to be passed so as to minimize transportation costs in the Saving Matrix Method selected in this study to determine the product distribution route to obtain the route and obtain optimal transportation costs. \u0000From the results of the route research in this study it is known that there are 18 routes from the previous number of 25 routes, so obtained savings of 7 routes, the total distance through the calculation method of saving matrix, nearest insert and nearest neighbor is equal to 1700.69 km. While the total distance of shipping the actual route to the company is 2046.97 km. Savings between the route of this research with the actual route of the company is 346.28 km. While from the total side of the shipping / transportation costs generated through the calculation method of saving matrix, nearest insert and nearest neighbor is Rp. 483,927,812. In terms of shipping / transportation costs the actual route of the company is Rp. 629,281,041. Savings with the saving matr","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86072007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Small but powerful: Six steps for conducting competitive intelligence successfully at a medium-sized firm 小而有力:在中型公司成功开展竞争情报的六个步骤
Competitive Intelligence Review Pub Date : 2007-03-22 DOI: 10.1002/(SICI)1520-6386(199724)8:4<75::AID-CIR11>3.0.CO;2-2
Amy Berger
{"title":"Small but powerful: Six steps for conducting competitive intelligence successfully at a medium-sized firm","authors":"Amy Berger","doi":"10.1002/(SICI)1520-6386(199724)8:4<75::AID-CIR11>3.0.CO;2-2","DOIUrl":"https://doi.org/10.1002/(SICI)1520-6386(199724)8:4<75::AID-CIR11>3.0.CO;2-2","url":null,"abstract":"","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 4","pages":"75-77"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199724)8:4<75::AID-CIR11>3.0.CO;2-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71974287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The theft of trade secrets is now a federal crime 盗窃商业秘密现在已成为联邦犯罪
Competitive Intelligence Review Pub Date : 2007-03-22 DOI: 10.1002/(SICI)1520-6386(199723)8:3<7::AID-CIR4>3.0.CO;2-M
R. Mark Halligan
{"title":"The theft of trade secrets is now a federal crime","authors":"R. Mark Halligan","doi":"10.1002/(SICI)1520-6386(199723)8:3<7::AID-CIR4>3.0.CO;2-M","DOIUrl":"https://doi.org/10.1002/(SICI)1520-6386(199723)8:3<7::AID-CIR4>3.0.CO;2-M","url":null,"abstract":"<p>The Economic Espionage Act of 1996 (the EEA) for the first time makes trade secret theft a federal crime, subject to penalties including fines, forfeiture, and imprisonment, and greatly expands the federal government's power to investigate economic espionage cases. Trade secret theft is broadly defined to cover all acts of trade secret appropriation without authorization. The EEA was intended to fill gaps in the federal law and to create a national scheme to protect U.S. proprietary business information. © 1997 John Wiley &amp; Sons, Inc.</p>","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 3","pages":"7-12"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199723)8:3<7::AID-CIR4>3.0.CO;2-M","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71975394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The Economic Espionage Act of 1996 1996年《经济间谍法》
Competitive Intelligence Review Pub Date : 2007-03-22 DOI: 10.1002/(SICI)1520-6386(199723)8:3<4::AID-CIR3>3.0.CO;2-Y
Stephen Miller
{"title":"The Economic Espionage Act of 1996","authors":"Stephen Miller","doi":"10.1002/(SICI)1520-6386(199723)8:3<4::AID-CIR3>3.0.CO;2-Y","DOIUrl":"https://doi.org/10.1002/(SICI)1520-6386(199723)8:3<4::AID-CIR3>3.0.CO;2-Y","url":null,"abstract":"","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 3","pages":"4-6"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199723)8:3<4::AID-CIR3>3.0.CO;2-Y","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71975395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Today's insights, tomorrow's opportunities: Understanding emerging markets in Europe 今天的见解,明天的机遇:了解欧洲新兴市场
Competitive Intelligence Review Pub Date : 2007-03-22 DOI: 10.1002/(SICI)1520-6386(199724)8:4<3::AID-CIR3>3.0.CO;2-V
Aycan Coyle-Hickey
{"title":"Today's insights, tomorrow's opportunities: Understanding emerging markets in Europe","authors":"Aycan Coyle-Hickey","doi":"10.1002/(SICI)1520-6386(199724)8:4<3::AID-CIR3>3.0.CO;2-V","DOIUrl":"https://doi.org/10.1002/(SICI)1520-6386(199724)8:4<3::AID-CIR3>3.0.CO;2-V","url":null,"abstract":"<p>With the opening of formerly communist economies, combined with maturing markets in developed countries, global companies are increasingly targeting emerging markets. In central, eastern Europe and beyond, markets are emerging in a region with a total population of over 400 million. But despite an educated and low-cost labor force, investors often confront heavy government bureaucracy, corruption, and raw material shortages. The limited importance placed on competitive intelligence by local businesses is also a key problem. Although the need for accurate and timely information is growing, a lack of awareness of the unknown remains a major handicap for many local business managers. Global companies with an established need for competitive intelligence often face a difficult task in gaining reliable data for decision making. Compared to competitive intelligence in developed markets, emerging markets require research briefs and methodologies with a wider scope to achieve similar objectives, with relatively larger investments in time and resources. International agencies, banks, and accounting firms can help. Moreover, local authorities, trade chambers, and other local sources can provide useful inputs and insights on their sectors. © 1997 John Wiley &amp; Sons, Inc.</p>","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 4","pages":"3-11"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199724)8:4<3::AID-CIR3>3.0.CO;2-V","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71975405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Criminal consequences of trade secret theft: The EEA and compliance plans 商业秘密盗窃的刑事后果:欧洲经济区和合规计划
Competitive Intelligence Review Pub Date : 2007-03-22 DOI: 10.1002/(SICI)1520-6386(199723)8:3<13::AID-CIR5>3.0.CO;2-C
James Pooley
{"title":"Criminal consequences of trade secret theft: The EEA and compliance plans","authors":"James Pooley","doi":"10.1002/(SICI)1520-6386(199723)8:3<13::AID-CIR5>3.0.CO;2-C","DOIUrl":"https://doi.org/10.1002/(SICI)1520-6386(199723)8:3<13::AID-CIR5>3.0.CO;2-C","url":null,"abstract":"<p>For trade secret owners, the Economic Espionage Act of 1996 (the EEA) provides the prospect of greatly improved protection of property rights. For company employees, the EEA means more attention to defending proprietary information. For competitive intelligence gatherers—including outside consulting firms—the EEA brings new legal restrictions backed up by criminal penalties. Under the government's Federal Sentencing Guidelines, prosecutions for trade secret theft are less likely to be brought if the victim company can show it took steps to prevent and detect criminal conduct. Businesses should therefore adopt and implement compliance plans to protect their proprietary trade secrets. These plans should be designed to take account of the specific risks a company faces. Records should be maintained to demonstrate that the company took all reasonable steps to observe activity that might indicate a misappropriation of trade secrets. Ultimate responsibility for defining and enforcing compliance plans should lie with high-level personnel with authority to influence compliance in a meaningful way. © 1997 John Wiley &amp; Sons, Inc.</p>","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 3","pages":"13-19"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199723)8:3<13::AID-CIR5>3.0.CO;2-C","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71976483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Challenges for strategic competitive intelligence at the corporate level 企业层面战略竞争情报面临的挑战
Competitive Intelligence Review Pub Date : 2007-03-22 DOI: 10.1002/(SICI)1520-6386(199724)8:4<54::AID-CIR9>3.0.CO;2-S
Edwin Rühli, Sybille Sachs
{"title":"Challenges for strategic competitive intelligence at the corporate level","authors":"Edwin Rühli,&nbsp;Sybille Sachs","doi":"10.1002/(SICI)1520-6386(199724)8:4<54::AID-CIR9>3.0.CO;2-S","DOIUrl":"https://doi.org/10.1002/(SICI)1520-6386(199724)8:4<54::AID-CIR9>3.0.CO;2-S","url":null,"abstract":"<p>Strategic competitive intelligence is a necessity for corporate decision making in today's highly complex, “hypercompetitive” global markets, where current and potential rivals are encountered on multiple levels of competition. Key strategic decisions regarding diversification, downsizing from past diversification, and strategic alliances must be based on sound assessments of the competitive environment. Strategic CI, for example, can provide a basis for assessing the opportunities, necessities, and risks of present or future alliances, for making decisions regarding appropriate forms and intensities of present or future cooperative arrangements, and to choose among stable or variable forms of cooperation. Similarly, strategic CI can provide relevant knowledge concerning a firm's strategy-related, structure-related, and culture-related challenges with respect to diversification. D'Avini's framework of four cooperative arenas highlights why, with respect to the new competitive realities, corporate-level strategy requires dynamic, multi-level, and multi-arena competitive intelligence to identify and analyze probable threats and opportunities on all levels, and in all arenas, of competition. © 1997 John Wiley &amp; Sons, Inc.</p>","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 4","pages":"54-64"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199724)8:4<54::AID-CIR9>3.0.CO;2-S","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71976487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Keeping company secrets secret 保守公司秘密
Competitive Intelligence Review Pub Date : 2007-03-22 DOI: 10.1002/(SICI)1520-6386(199723)8:3<71::AID-CIR14>3.0.CO;2-3
Arion N. Pattakos CPP, OCP
{"title":"Keeping company secrets secret","authors":"Arion N. Pattakos CPP, OCP","doi":"10.1002/(SICI)1520-6386(199723)8:3<71::AID-CIR14>3.0.CO;2-3","DOIUrl":"https://doi.org/10.1002/(SICI)1520-6386(199723)8:3<71::AID-CIR14>3.0.CO;2-3","url":null,"abstract":"<p>Information security professionals and those they support must understand the threat to company secrets posed by foreign intelligence services, and foreign and domestic competitors, who may use legal or illegal means to acquire those secrets. Implementing protection policies and control measures to prevent the exploitation of corporate secrets requires support from senior management. An eight-step counter-competitor intelligence model is proposed for determining what information requires protection; analyzing, assessing and ranking risks; developing security controls; and conducting an effectiveness review. Once this analysis is completed, an information protection program can be developed or revised, and communicated throughout the corporation. © 1997 John Wiley &amp; Sons, Inc.</p>","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 3","pages":"71-78"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199723)8:3<71::AID-CIR14>3.0.CO;2-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71976507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Espionage turns economic: Litigation as counter-espionage in the post-Soviet era 间谍活动转向经济:后苏联时代的反间谍诉讼
Competitive Intelligence Review Pub Date : 2007-03-22 DOI: 10.1002/(SICI)1520-6386(199723)8:3<38::AID-CIR11>3.0.CO;2-H
Craig P. Ehrlich
{"title":"Espionage turns economic: Litigation as counter-espionage in the post-Soviet era","authors":"Craig P. Ehrlich","doi":"10.1002/(SICI)1520-6386(199723)8:3<38::AID-CIR11>3.0.CO;2-H","DOIUrl":"https://doi.org/10.1002/(SICI)1520-6386(199723)8:3<38::AID-CIR11>3.0.CO;2-H","url":null,"abstract":"<p>In the post-Cold War era, foreign economic espionage is a looming threat. The author examines in detail the litigation options for American corporations that fall victim to trade secret theft by a foreign government or agent. These options include a request that criminal prosecution be brought by the U.S. Justice Department under the recently enacted Economic Espionage Act of 1996. The corporation itself may file a civil suit for compensation based on the common laws of trade secrets or the Uniform Trade Secrets Act, as well as the federal Racketeer Influenced and Corrupt Organizations Act. Among the types of defendants who might be prosecuted or sued are foreign governments that steal or receive trade secrets, private individuals or companies that help a foreign government commit misappropriation, and private entities that knowingly receive the stolen information. Common “litigation shields” used by foreign governments include claims of sovereign immunity, act of state, and diplomatic immunity. Each of these doctrines is examined, and case precedents where they were upheld or found inapplicable are cited. Analyzing these precedents, the author concludes that economic espionage by foreign government agents for delivery to a commercial enterprise should not be held subject to immunity. © 1997 John Wiley &amp; Sons, Inc.</p>","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 3","pages":"38-52"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199723)8:3<38::AID-CIR11>3.0.CO;2-H","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71975406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Corporate espionage: What it is, why it's happening in your company, what you must do about it 企业间谍:它是什么,为什么会发生在你的公司,你必须对此做些什么
Competitive Intelligence Review Pub Date : 2007-03-22 DOI: 10.1002/(SICI)1520-6386(199724)8:4<87::AID-CIR16>3.0.CO;2-J
John McGonagle
{"title":"Corporate espionage: What it is, why it's happening in your company, what you must do about it","authors":"John McGonagle","doi":"10.1002/(SICI)1520-6386(199724)8:4<87::AID-CIR16>3.0.CO;2-J","DOIUrl":"https://doi.org/10.1002/(SICI)1520-6386(199724)8:4<87::AID-CIR16>3.0.CO;2-J","url":null,"abstract":"","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 4","pages":"87-88"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199724)8:4<87::AID-CIR16>3.0.CO;2-J","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71975412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信