{"title":"Identifying your right-type personnel","authors":"Neil J. Simon","doi":"10.1002/(SICI)1520-6386(199723)8:3<79::AID-CIR15>3.0.CO;2-T","DOIUrl":"https://doi.org/10.1002/(SICI)1520-6386(199723)8:3<79::AID-CIR15>3.0.CO;2-T","url":null,"abstract":"","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 3","pages":"79-80"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199723)8:3<79::AID-CIR15>3.0.CO;2-T","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71976506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Principles for modern CI professionals, from an ancient source","authors":"Mark R. McNeilly","doi":"10.1002/(SICI)1520-6386(199723)8:3<89::AID-CIR19>3.0.CO;2-E","DOIUrl":"https://doi.org/10.1002/(SICI)1520-6386(199723)8:3<89::AID-CIR19>3.0.CO;2-E","url":null,"abstract":"","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 3","pages":"89-91"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199723)8:3<89::AID-CIR19>3.0.CO;2-E","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71970595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Customer life stage as a competitive threat","authors":"Deborah C. Sawyer","doi":"10.1002/(SICI)1520-6386(199723)8:3<87::AID-CIR18>3.0.CO;2-J","DOIUrl":"https://doi.org/10.1002/(SICI)1520-6386(199723)8:3<87::AID-CIR18>3.0.CO;2-J","url":null,"abstract":"","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 3","pages":"87-88"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199723)8:3<87::AID-CIR18>3.0.CO;2-J","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71970596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Symposium the economic Espionage Act of 1996: An expert roundtable","authors":"Stephen Miller","doi":"10.1002/(SICI)1520-6386(199723)8:3<32::AID-CIR9>3.0.CO;2-1","DOIUrl":"https://doi.org/10.1002/(SICI)1520-6386(199723)8:3<32::AID-CIR9>3.0.CO;2-1","url":null,"abstract":"<p>The language of the Economic Espionage Act of 1996 (EEA) is often broad, with many “gray areas” left unresolved. Below, we have excerpted remarks from panel discussions featuring attorneys who specialize in trade secrets law, including those involved in drafting and enforcing the legislation. The discussion took place last February as part of the SCIP symposium on the ramifications of the EEA, held at Georgetown University in Washington, D.C. These off-the-cuff discussion remarks are intended for informational purposes only and are not intended to convey legal advice on specific matters.</p>","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 3","pages":"32-36"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199723)8:3<32::AID-CIR9>3.0.CO;2-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71976504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Confidentiality, CI, and the IBM patent server","authors":"Michael A. Sandman","doi":"10.1002/(SICI)1520-6386(199724)8:4<85::AID-CIR15>3.0.CO;2-O","DOIUrl":"https://doi.org/10.1002/(SICI)1520-6386(199724)8:4<85::AID-CIR15>3.0.CO;2-O","url":null,"abstract":"","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 4","pages":"85-86"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199724)8:4<85::AID-CIR15>3.0.CO;2-O","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71947006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CI is not an island","authors":"Neil J. Simon","doi":"10.1002/(SICI)1520-6386(199724)8:4<80::AID-CIR13>3.0.CO;2-Z","DOIUrl":"https://doi.org/10.1002/(SICI)1520-6386(199724)8:4<80::AID-CIR13>3.0.CO;2-Z","url":null,"abstract":"","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 4","pages":"80-82"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199724)8:4<80::AID-CIR13>3.0.CO;2-Z","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71947007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using open sources for Competitive Intelligence: Myths and realities","authors":"Melissa Peery Call","doi":"10.1002/(SICI)1520-6386(199723)8:3<81::AID-CIR16>3.0.CO;2-V","DOIUrl":"https://doi.org/10.1002/(SICI)1520-6386(199723)8:3<81::AID-CIR16>3.0.CO;2-V","url":null,"abstract":"","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 3","pages":"81-84"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199723)8:3<81::AID-CIR16>3.0.CO;2-V","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71976505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}