Professional Documents
Culture Documents
Using Open Source Data in Developing Competitive and Market Intelligence
Using Open Source Data in Developing Competitive and Market Intelligence
net/publication/273745484
CITATIONS READS
52 1,087
1 author:
Craig S. Fleisher
Tampere University
79 PUBLICATIONS 1,060 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Craig S. Fleisher on 16 November 2015.
EJM
42,7/8 Using open source data in
developing competitive and
marketing intelligence
852
Craig S. Fleisher
Odette School of Business, University of Windsor, Windsor, Canada
Received January 2007
Revised September 2007
Accepted December 2007
Abstract
Purpose – The paper seeks to show how the increasingly popular use of data and information
acquired from open sources (OS) impacts competitive and marketing intelligence (C/MI). It describes
the current state of the art in analysis efforts of open source intelligence (OSINT) in
business/commercial enterprises, examines the planning and execution challenges organizations are
experiencing associated with effectively using and fusing OSINT in C/MI decision-making processes,
and provides guidelines associated with the successful use of OSINT.
Design/methodology/approach – This is a descriptive, conceptual paper that utilizes and
develops arguments based on the search of three unclassified bodies of literature in competitive and
marketing intelligence, intelligence processing and marketing analysis.
Findings – Open sources are useful in marketing analyses because they can be easily accessible,
inexpensive, quickly accessed and voluminous in availability. There are several conceptual and
practical challenges the analyst faces in employing them. These can be addressed through awareness
of these issues as well as a willingness to invest resources into studying how to improve the data
gathering/analysis interface.
Practical implications – Marketing analysts increasingly rely on open sources of data in
developing plans, strategy and tactics. This article provides a description of the challenges they face in
utilizing this data, as well as provides a discussion of the effective practices that some organizations
have demonstrated in applying and fusing open sources in their C/MI analysis process.
Originality/value – There are very few papers published focusing on applying OSINT in
enterprises for competitive and marketing intelligence purposes. More uniquely, this paper is written
from the perspective of the marketing analyst and how they use open source data in the competitive
and marketing sense-making process and not the perspective of individuals specialized in gathering
these data.
Keywords Marketing intelligence, Competitive strategy, Information research, Data analysis,
Open systems
Paper type Conceptual paper
Introduction
The gathering of data and information from open sources (OS) has been an active focus
of both national and private-sector intelligence organizations for decades (Steele, 2002).
Business enterprises have long been reliant on open sources for intelligence purposes –
whether applied to marketing concerns, mergers and acquisitions, partnering due
diligence, or strategy development among other things; on the other hand, national
European Journal of Marketing intelligence organizations have recently been encouraged to make better use of open
Vol. 42 No. 7/8, 2008
pp. 852-866 sources in their array of intelligence gathering functions (Commission on the
q Emerald Group Publishing Limited
0309-0566
Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction,
DOI 10.1108/03090560810877196 2005). This paper highlights the experiences of businesses in incorporating and
utilizing OS for competitive and marketing analysis purposes. It focuses most Using open
specifically on the implications OS have for analysts and the analysis process within source data
business enterprises.
Open sources, analysis and its place within competitive and marketing
intelligence (C/MI)
Many definitions exist of competitive intelligence (Fleisher, 2003), a process commonly 853
found in marketing departments or units (Competitive Intelligence Foundation, 2006;
Wright et al., 2002). C/MI is defined for the purposes of this paper as a systematic,
targeted, timely and ethical effort to collect, synthesize, and analyze competition,
markets and the external environment in order to produce actionable insights for
decision-makers. The practical value-adding concept underlying C/MI suggests that
effective C/MI should underlie more effective decisions, leading to more insightful
market-based actions that should eventually result in enhanced economic/financial
performance (Fahey, 2007; Frates and Sharp, 2005). Within this intelligence process,
data collection is an essential element can comprise a significant part of the resources
allocated toward developing insights (Prescott and Fleisher, 1991).
Open source intelligence, more commonly known as OSINT, is an information
processing discipline. More specifically for the purposes of this paper, it is defined as
the scanning, finding, gathering, exploitation, validation, analysis, and sharing with
intelligence-seeking clients of publicly available print and digital/electronic data from
unclassified, non-secret, and “grey literature” sources. Grey literature is published
material that is not indexed and often lacks data about the publisher. It is frequently
used by academics or researchers to share their earliest ideas about concepts or
experiments they are working on, unpublished papers in conference proceedings, and
is often found on personal web sites, by commercial corporations in the form of “white
papers”, or even in web logs (i.e. blogs). OSINT is the most frequently used form of
C/MI intelligence gathering in business enterprises, desirable because it is easy,
inexpensive and produces abundant raw material for further processing (Vibert, 2003).
It is usually engaged as a next step in the project plan after the data collector has
scoured existing information bases, particularly among the organization’s own human
intelligence (HUMINT) sources, thereby exhausting the organization’s reservoir of
internal knowledge (Blanco et al., 2003).
OSINT was traditionally characterized by the searching of publicly available
published sources (Burwell, 2004). This included books, journals, magazines, pamphlets,
reports and the like, so much so that some people originally referred to OSINT as
literature intelligence or LITINT (Clark, 2004); nevertheless, the growth of digital media
and sources such as those proliferating over the worldwide web and public
communication airwaves has enlarged the scope of OS activity (Boncella, 2003). These
media and sources were usually identified and scoured first by corporate library and
information specialists. These special librarians are professionals with expertise in
quickly locating required information sources. The grid in Table I shows the broad range
of both internal and external channels utilized for open source intelligence purposes.
Special librarians have now greatly expanded the range of open sources examined
as well as the nature of querying utilized (Berkien, 2006; Carr, 2003). Contemporary
corporate information specialists apply a variety of methods for organizing open
sources including but not limited to web-link analysis (Reid, 2003), webometrics
EJM
Internal (channels and sources) External (channels and sources)
42,7/8
Human sources providing Boundary spanners (public affairs, Academics
data that can be archived in public relations) Competitors
various public media Customers Consultants/experts
Customer service data Customers
854 Employees Government officials
Managers Interest groups
Marketing researchers Media members
Networks (professional, social) Policy developers
Sales associates Suppliers
Documents and captured Building diagrams Advertisements
media Business plans Blogs/wikis
CRM databases/reports Broadcasts (TV, radio)
Databases Company home pages
Information resource library Government publications
Intranet (text, A&V) Images/maps (e.g. satellite)
Photographs Marketing communications
Policies Patents/legal filings
Product catalogs Product brochures/catalogs
Reports/statistics (market share, Reports
sales, trends) Statistics (e.g. demographics)
Table I. Mixed channels providing Observations Seminars
Sample open source data that can be archived in Meetings Site visits
information target grid various public media Site visits Trade events
(Bouthillier and Jin, 2005), scanning methods (Decker et al., 2005), source mapping
(Vriens and Achterbergh, 2003), text mining (Leong et al., 2004), ontology creation
(Golden, 2007), blog analysis (Pikas, 2005), scientometrics (Courtial et al., 1997), and a
blossoming variety of different patent analysis (Dou et al., 2005) and pattern
recognition methods (Rosenkrans, 2003).
OSINT is often the basis of information utilized in planning and targeting other
high-value collection activities (Steele, 2002). This is done, at least in part, because it is
so convenient to access open sources, as well as the availability of target-rich material
(Mah, 2005). In national intelligence, open source data provide a key supplement and
archival ability to other classified or custom-developed collection means, like those
performed within traditional corporate marketing research. By combining the data
gathered from multiple sources, marketing analysts can better understand the
diversity of viewpoints on important issues (Clark, 2004; Patzer, 1995).
Analysts regularly use open source data to help them generate insights (Vibert,
2004). Indeed, they are used to integrating open source data with other forms of
information, and particularly HUMINT (Clark, 2004; Le Meunier-FitzHugh and Piercy,
2006; Steele, 2002); nevertheless, there are some issues that analysts have encountered
that are somewhat unique to OSINT.
Analysts maintain an important role in the overall C/MI process and can be even
more prominent in a heavily OS-based environment. Steele (2002, p. 171) notes that
“analysis is the key enabling skill that is essential to the successful integration of
OSINT into an all-around intelligence capability”. Even though there is no universal Using open
job description for C/MI analysts, outcomes that analysts typically seek to achieve are: source data
.
predict future developments – analysts explain implications of developments,
both current and prospective, to decision makers (Fahey, 2007);
.
help decision- and policymakers to avoid surprises – analysts seek to provide
warnings of major developments, events, trends and assessments (Gilad, 2004);
855
.
make data more meaningful and sensible – analysts give guidance to decision
makers, as well as offering alternative means for attaining objectives (Fleisher
and Bensoussan, 2003, 2007); and
. keep decision makers informed – they offer pieces of current information on
specialized topics of concern to decision makers (Service, 2006).
Analysts employ part art, science and craft to their organizational tasks (Fleisher and
Bensoussan, 2007). The art facets often centre on the need for creativity, right-brain
utilization, and original thinking. This is one reason why there are no software
programs that an organization can just plug in that will routinely produce the kind of
C/MI analysis products that demanding intelligence clients seek (Bouthillier and
Shearer, 2003a). The science component is present in the accepted use of routinized
methods, established training programs, and continuing “R&D” conducted in/of
analysis (Clark, 2004; Fleisher and Bensoussan, 2007; Heuer, 1999). The tradecraft of
intelligence analysis has a rich tradition in national intelligence agencies across the
globe, but also has tradition with business and commercial enterprises (Sawka, 2005).
C/MI analysis has many of the hallmarks of the true professions and C/MI analysis
practitioners often conduct themselves in a highly professional manner (Fleisher and
Are, 2003).
Analysts and the implications of data gathered from open sources
Analysts in business enterprises have been seeking, processing and applying open
source data to their tasks for decades. Only in recent years, as the volume of digital
information has grown so rapidly, have problems surfaced associated with using the
mass of data (Vibert, 2003). Managers have been known to spend several hours a day
searching for information, later realizing that much of the information they acquired
has little relevance or value toward meeting their needs. Companies typically spend far
more resources, and particularly in the form of time, gathering information than they
do processing, analyzing and exploiting it. Studies in the C/MI field have shown that
practitioners would like to reverse this equation, and spend more time processing,
analyzing and exploiting data as opposed to just gathering it (Competitive Intelligence
Foundation, 2006).
In reality, there is much value-adding activity that an analyst can do to the collected
data going far beyond just forwarding gathered information (Marin and Poulter, 2004).
What does the analyst do with validated open source data? The analyst would perform
any sort of the following operations upon gathered data, including but not limited to:
conceptualize, confirm, describe, explain, extend, forecast, hypothesize, identify,
illustrate, model, predict, re-organize, research, re-task collection, synthesize, text,
and/or visualize (Johnston, 2005). Effective analysts know both the methods and the
appropriate sequences of technique applications that enable them to make better sense
of the raw information (Fleisher and Bensoussan, 2007). This is a result of their
EJM knowledge, skills, abilities and experiences (KSAEs) or competencies in doing C/MI
42,7/8 analysis (Moore et al., 2005).
C/MI analysts need to be able to employ a wide range of methods in order to first
task information specialists and second to make sense of the data once gathered.
Analytical methods must drive the open source collection plan/task; nevertheless,
many practitioners allow their analysis processes to be driven by the data they can
856 most easily access. Others do not go beyond employing a very limited range of tools
that they try to employ for purposes beyond those which the tools were designed
(Fleisher and Bensoussan, 2007). Finally, many practitioners lack proper training in
C/MI analysis processes and do not recognize the need to match methods, either
existing ones or uniquely conceptualized ones designed for the task, in order to best
address their clients’ critical intelligence needs.
There are a variety of issues appearing in the C/MI scholarship associated with
performing C/MI effectively. Some are unique to using open sources, and the ones
associated with the nature and structure of open sources and channels themselves are
elaborated in the section that follows.
Each of these items creates difficulties in the C/MI process. They have also limited the
effectiveness of C/MI functions within many companies and have been observed to
render more than a few enterprises without direction or a clear sense of strategy
(Sawka, 2007). Although technology and solutions are helping C/MI practitioners, there
are still many limitations that need to be addressed to improve the intelligence value
generated by open sources.
Conclusion
An enterprise’s competitive/market intelligence capability remains important in an
increasingly globalized, information-driven, knowledge-based global market place
(Herzog, 2007; Liebowitz, 2006). The development of C/MI will continue to require
analysts to smartly utilize all data and information sources that might help them piece
together intelligence that allows their organizations to achieve marketplace advantage
(Rajaniemi, 2007). Although traditional marketing research methods will remain an
important part of the C/MI arsenal, exploitation of open sources will likely gain in
prominence as more and more competitive, customer, supplier and market-related data
are networked and made available over the web and in other digital broadcasting
modes (Steele, 2002). Companies that can figure out how and where to effectively and
efficiently gather, organize, exploit and act upon C/MI stand to lessen their degree of
decision-making ambiguity and lower their knowledge risk relative to taking
important, market-defining actions (Golden, 2007).
C/MI analysts suffer their own share of challenges in fully employing open source
data for marketing analysis purposes. This paper has sought to examine those in
greater depth, as well as provide some insights in to how some organizations can
improve their practices of C/MI at the OSINT/analysis junction. Generating these
insights is not an easy task, for many of the same reasons that limit the use of open
source data in general. Although the literature has plentiful evidence about OSINT in a
generic sense, and in particular generalities about its use in national intelligence
organizations, there remains a dearth of information about specific business or
Using open
Concern Possible solutions
source data
Form Solutions that allow for conversion of different media formats into usable
forms (Gould, n.d.)
Willingness to enlarge range of analytical methods used to better account
for different formats (Fleisher and Bensoussan, 2007)
Improved document discovery (Golden, 2007) 861
Indexing Better C/MI data collection protocols (Breeding, 2003; Johnston, 2005)
Enhanced deep-diving skills (Golden, 2007)
Improve semantic web type capabilities (Steele, 2002)
Internet volatility Investing in human networks to supplement IT solutions (Marteniuk, 2003;
Shumadine, 2003)
IT applications that monitor and provide capture of changes in sources
(Vriens, 2003a, b)
Solutions with pre-established filters that separate critical from
non-essential changes (Bouthillier and Shearer, 2003a)
Languages Build in translation to solutions (Annett, 2005)
Use company’s own internal networks and multi-lingual personnel for
translation (Marteniuk, 2003)
Outsource translation skills (Steele, 2002)
Sources Enhanced knowledge management systems (Rothberg and Erickson, 2004)
Triangulation of untagged data with known information (Clark, 2004)
Willingness to invest in reputable information brokers and for-fee
commercial database vendors (Steele, 2002)
Volume Better specification of user/client needs (Sawka, 2007)
Drive data gathering tactics by up-front establishment of appropriate
analysis methods (Fleisher and Bensoussan, 2007)
Evaluate and control intelligence process (Blenkhorn and Fleisher, 2007)
Institutionalize key intelligence topic (KIT) driven C/MI tasking (Herring,
2006a, b)
Web 2.0 developments Establishing enterprise-wide Web 2.0 forums for acclimating and educating
and building competencies of employees (Du Toit and Muller, 2005;
Fleisher, 2004; Golden, 2007; Lapstra and Knip, 2005) Table II.
Investing in solutions and systems that account for Web 2.0 developments Possible solutions to
(Bouthillier and Shearer, 2003a) concerns that emanate
Using internal networks to interact in Web 2.0 forums (Shumadine, 2003) from open sources
References
Annett, T. (2005), “Process differences in performing global vs. domestic competitive intelligence
data collection”, in Blenkhorn, D.L. and Fleisher, C.S. (Eds), Competitive Intelligence and
Global Business, Praeger, Westport, CT, pp. 57-72.
Azvine, B., Cui, Z. and Nauck, D.D. (2005), “Towards real-time business intelligence”, BT
Technology Journal, Vol. 23 No. 3, pp. 214-25.
Bell, W. and Breeding, B. (2003), “The many deliverables of CI”, presentation made to the Annual
International Meeting of the Society of Competitive Intelligence Professionals, Anaheim,
CA.
Berkien, T. (2006), “Transforming information specialists into intelligence professionals”, Online,
Vol. 30 No. 5, pp. 27-31.
Blanco, S., Caron-Fasan, M.-L. and Lesca, H. (2003), “Developing capabilities to collect
competitive intelligence within organizations”, Journal of Competitive Intelligence and
Management, Vol. 1 No. 3, pp. 80-92.
Blenkhorn, D. and Fleisher, C.S. (2007), “Performance assessment in competitive intelligence: an
exploration, synthesis, and research agenda”, Journal of Competitive Intelligence and
Management, Vol. 4 No. 2, pp. 4-22.
Blenkhorn, D. and Fleisher, C.S. (2005), Competitive Intelligence and Global Business, Praeger,
Westport, CT.
Boncella, R.J. (2003), “Competitive intelligence and the web”, Communications of AIS, Vol. 2003
No. 12, pp. 327-40.
Bouthillier, F. and Shearer, K. (2003a), Assessing Competitive Intelligence Software: A Guide to
Evaluating CI Technology, Information Today, Medford, NJ.
Bouthillier, F. and Shearer, K. (2003b), “Assessing collaborative tools from an
information-processing perspective: identification of value-added processes”, Enabling
Technologies: Infrastructure for Collaborative Enterprises: Proceedings of the Twelfth
IEEE International Workshops, WET ICE 2003, Linz, 9-11 June, pp. 142-7.
Bouthillier, F. and Jin, T. (2005), “Competitive intelligence and webmetrics: an exploratory study
on the status of CI in five countries”, Journal of Competitive Intelligence and Management,
Vol. 3 No. 3, pp. 19-39.
Breeding, B. (2000), “CI and KM convergence: a case study at Shell Services International”,
Competitive Intelligence Review, Vol. 11 No. 4, pp. 12-24.
Breeding, B. (2003), “CI artist”, in Carr, M.M. (Ed.), Super Searchers on Competitive Intelligence:
The Online and Offline Secrets of Top CI Researchers, Information Today, Medford, NJ,
pp. 177-90.
Burwell, H.P. (2004), Online Competitive Intelligence: Increase Your Profits Using
Cyber-Intelligence, Facts on Demand Press, Tempe, AZ.
Carr, M.M. (2003), Super Searchers on Competitive Intelligence: The Online and Offline Secrets of Using open
Top CI Researchers, Information Today, Medford, NJ.
source data
Clark, R.M. (2004), Intelligence Analysis: A Target-centric Approach, CQ Press, Washington, DC.
Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass
Destruction (2005), Unclassified Version of the Report to the President of the United States,
Official US Government Edition, March, Government Printing Office, Washington, DC.
Competitive Intelligence Foundation (2006), State of the Art: Competitive Intelligence, 863
Competitive Intelligence Foundation, Alexandria, VA.
Courtial, J.P., Sigogneau, A. and Callon, M. (1997), “Indentifying strategic services and
technologies through scientometrics”, in Ashton, W.B. and Klavans, R.A. (Eds), Keeping
Abreast of Science and Technology: Technical Intelligence for Business, Battelle Press,
Columbus, OH, pp. 337-72.
Decker, R., Wagner, R. and Scholz, S.W. (2005), “An internet-based approach to environmental
scanning in marketing planning”, Marketing Intelligence & Planning, Vol. 23 No. 2,
pp. 189-99.
Dishman, P., Fleisher, C.S. and Knip, V. (2003), “Chronological and categorized bibliography of
key competitive intelligence scholarship: Part 1 (1997-present)”, Journal of Competitive
Intelligence and Management, Vol. 1 No. 1, pp. 13-79.
Dou, H., Leveillé, V., Manullang, S. and Dou, J.M. Jr (2005), “Patent analysis for competitive
technical intelligence and innovative thinking”, Data Science Journal, Vol. 4, pp. 209-36.
Du Toit, A. and Muller, M.L. (2005), “Training competitive intelligence analysts via the web: the
University of Johannesburg experience”, Journal of Education for Library and Information
Science, Vol. 46 No. 4, pp. 320-32.
Duncan, S. (2006), “Social networking systems as competitive intelligence tools”, Competitive
Intelligence Magazine, Vol. 9 No. 4, pp. 16-19.
Ehrlich, C.P. (2006), “Gathering data from the internet: privacy concerns”, Competitive
Intelligence Magazine, Vol. 9 No. 4, pp. 47-9.
Fahey, L. (2007), “Connecting strategy and competitive intelligence: refocusing intelligence to
produce critical strategy inputs”, Strategy & Leadership, Vol. 35 No. 1, pp. 4-12.
Fehringer, D. and Hohhof, B. (2006), Competitive Intelligence Ethics: Navigating the Gray Zone,
Competitive Intelligence Foundation, Alexandria, VA.
Fitzpatrick, W.M. and Burke, D.R. (2003), “Competitive intelligence, corporate security and the
virtual organization”, Advances in Competitiveness Research, Vol. 11 No. 1, pp. 20-45.
Fleisher, C.S. (2004), “Competitive intelligence education: competencies, sources, and trends”,
Information Management Journal, Vol. 38 No. 2, pp. 56-61.
Fleisher, C.S. (2003), “Should the field be called competitive intelligence or something else?”, in
Fleisher, C. and Blenkhorn, D. (Eds), Controversies in Competitive Intelligence, Praeger,
Westport, CT, pp. 56-69.
Fleisher, C.S. and Are, C.I. (2003), “Are CI practitioners professionals?”, in Fleisher, C. and
Blenkhorn, D. (Eds), Controversies in Competitive Intelligence, Praeger, Westport, CT,
pp. 29-44.
Fleisher, C.S. and Bensoussan, B. (2003), Strategic and Competitive Analysis: Methods and
Techniques for Analyzing Business Competition, Prentice-Hall, Upper Saddle River, NJ.
Fleisher, C.S. and Bensoussan, B. (2007), Business and Competitive Analysis: Effective Application
of New and Classic Methods, FT Press, Upper Saddle River, NJ.
EJM Fleisher, C.S., Knip, V. and Dishman, P. (2003), “A chronological and categorized bibliography of
key competitive intelligence scholarship: Part 2 (1990-1996)”, Journal of Competitive
42,7/8 Intelligence and Management, Vol. 1 No. 2, pp. 11-86.
Fleisher, C.S., Wright, S. and Tindale, R. (2007), “A chronological and categorized bibliography of
key competitive intelligence scholarship: Part 4 (2003-2006)”, Journal of Competitive
Intelligence and Management, Vol. 4 No. 1, pp. 34-107.
864 Flowers, B.S. (2003), “The art and strategy of scenario writing (at Shell)”, Strategy & Leadership,
Vol. 31 No. 2, pp. 29-33.
Frates, J. and Sharp, S. (2005), “Using business intelligence to discover new market
opportunities”, Journal of Competitive Intelligence and Management, Vol. 3 No. 2, pp. 16-28.
Gilad, B. (2004), Early Warning: Using Competitive Intelligence to Anticipate Market Shifts,
Control Risk, and Create Powerful Strategies, AMACOM, New York, NY.
Golden, J. (2007), “OSINT and the pharmaceutical enterprise”, Bio-IT World, available at: www.
bio-itworld.com/issues/2007/nov/insights-outlook-osint/ (accessed November 17, 2007).
Gould, W.S. (n.d.), Building a Comprehensive Open Source Intelligence Capability: Perspectives
from IBM Corporation, Center for the Business of Government, Washington, DC.
Herring, J.P. (2006a), “Identifying your company’s real intelligence needs”, Competitive
Intelligence Magazine, Vol. 9 No. 4, pp. 32-3.
Herring, J.P. (2006b), “KITS revisited: their use and problems”, Competitive Intelligence Magazine,
Vol. 9 No. 5, pp. 12-14.
Herzog, J.O. (2007), “Why is there an increasing global demand for business intelligence”, Journal
of Competitive Intelligence and Management, Vol. 4 No. 2, pp. 55-70.
Heuer, R.J. Jr (1999), Psychology of Intelligence Analysis, Center for the Study of Intelligence,
Washington, DC.
Johnston, R. (2005), Analytic Culture in the US Intelligence Community, Center for the Study of
Intelligence, Washington, DC.
Knip, V., Dishman, P. and Fleisher, C.S. (2003), “A chronological and categorized bibliography of
key competitive intelligence scholarship: Part 3 (the earliest writings-1989)”, Journal of
Competitive Intelligence and Management, Vol. 1 No. 3, pp. 10-79.
Kragten, U. (2007), “The business intelligence network of DSM – how to manage business
intelligence across borders”, paper presented at the 2007 Annual European Meeting of the
Society of Competitive Intelligence Professionals, Bad Nauheim.
Lapstra, S. and Knip, V. (2005), “Best applications of global competitive intelligence: macro-level
scanning and cultural analysis”, in Blenkhorn, D.L. and Fleisher, C.S. (Eds), Competitive
Intelligence and Global Business, Praeger, Westport, CT, pp. 173-86.
Le Meunier-FitzHugh, K. and Piercy, N. (2006), “Integrating marketing intelligence sources:
reconsidering the role of the salesforce”, International Journal of Marketing Research,
Vol. 48 No. 6, pp. 699-716.
Leong, E.K.F., Ewing, M.T. and Pitt, L.F. (2004), “Analyzing competitors’ online persuasive
themes with text mining”, Marketing Intelligence & Planning, Vol. 22 No. 2, pp. 187-200.
Liebowitz, J. (2006), Strategic Intelligence: Business Intelligence, Competitive Intelligence, and
Knowledge Management, Auerbach Publications, Boca Raton, FL.
Mah, K. (2005), “The internet will continue to revolutionized international competitive
intelligence practices”, in Blenkhorn, D.L. and Fleisher, C.S. (Eds), Competitive Intelligence
and Global Business, Praeger, Westport, CT, pp. 115-28.
Marin, J. and Poulter, A. (2004), “Dissemination of competitive intelligence”, Journal of Using open
Information Science, Vol. 30 No. 2, pp. 165-80.
Marteniuk, J. (2003), “How do companies find the best balance between the technical and the
source data
personal in effective competitive intelligence systems”, in Fleisher, C.S. and Blenkhorn,
D.L. (Eds), Controversies in Competitive Intelligence: The Enduring Issues, Praeger,
Westport, CT, pp. 176-89.
Moore, D.T., Krizan, L. and Moore, E.J. (2005), “Evaluating intelligence: a competency-based 865
model”, International Journal of Intelligence and Counter-intelligence, Vol. 18 No. 2,
pp. 204-20.
Murphy, C. (2005), Competitive Intelligence: Gathering, Analyzing and Putting It to Work, Gower,
Aldershot.
Murphy, C. (2006), “Competitive intelligence: what corporate documents can tell you”, Business
Information Review, Vol. 23 No. 1, pp. 35-42.
Nakra, P. (2003), “Info-terrorism in the age of the internet: challenges and initiatives”, Journal of
Competitive Intelligence and Management, Vol. 1 No. 2, pp. 1-12.
Parker, K.R. and Nitse, P.S. (2005), “Improving competitive intelligence for knowledge
management systems”, International Journal of Internet and Enterprise Management,
Vol. 3 No. 1, pp. 24-45.
Patzer, G.L. (1995), Using Secondary Data in Marketing Research: United States and Worldwide,
Quorum Books, Greenwich, CT.
Pikas, C. (2005), “Blog searching for competitive intelligence, brand image, and reputation
management”, Online, Vol. 29 No. 4, pp. 16-21.
Prescott, J. and Fleisher, C. (1991), “SCIP: who we are and what we do”, Competitive Intelligence
Review, Vol. 2 No. 1, pp. 22-6.
Proian, C. (2007), “Meeting the new challenges of information sharing: how a network of key
users can boost the value of competitive intelligence throughout the enterprise”, paper
presented at the 2007 Annual International Meeting of the Society of Competitive
Intelligence Professionals, New York, NY.
Rajaniemi, K. (2007), “Internet-based scanning of the competitive environment”, Benchmarking:
An International Journal, Vol. 14 No. 4, pp. 465-81.
Rajaniemi, K. (2005), Framework, Methods and Tools for Acquiring and Sharing Strategic
Knowledge of the Competitive Environment, Industrial Management, University of Vaasa,
Vaasa.
Reid, E. (2003), “Using web link analysis to detect and analyze hidden web communities”, in
Vriens, D. (Ed.), Information and Communications Technology for Competitive Intelligence,
Idea Group Publishing, Hershey, PA, pp. 57-84.
Rosenkrans, W. (2003), “Pattern recognition”, in Carr, M.M. (Ed.), Super Searchers on Competitive
Intelligence: The Online and Offline Secrets of Top CI Researchers, Information Today,
Medford, NJ, pp. 141-56.
Rothberg, H.R. and Erickson, G.S. (2004), From Knowledge to Intelligence: Creating Competitive
Advantage in the Next Economy, Elsevier, Burlington, MA.
Sawka, K. (2005), “Analytic tradecraft”, Competitive Intelligence Magazine, Vol. 8 No. 4, pp. 43-4.
Sawka, K. (2007), “More information, less intelligence”, paper presented at the 2007 Annual
International Meeting of the Society of Competitive Intelligence Professionals, New York,
NY.
Service, R.W. (2006), “The development of strategic intelligence: a managerial perspective”,
International Journal of Management, Vol. 23 No. 1, pp. 61-77.
EJM Shumadine, J. (2003), “Team-based research”, in Carr, M.M. (Ed.), Super Searchers on Competitive
Intelligence: The Online and Offline Secrets of Top CI Researchers, Information Today,
42,7/8 Medford, NJ, pp. 157-76.
Steele, R.D. (2002), The New Craft of Intelligence: Personal, Public & Political, OSS International
Press, Oakton, VA.
Tan, A.H., Ong, H.L., Pan, H., Ng, J. and li, Q.X. (2004), “Towards personalized web intelligence”,
866 Knowledge and Information Systems, Vol. 6 No. 5, pp. 595-616.
Vibert, C. (2003), Competitive Intelligence: A Framework for Web-based Analysis and Decision
Making, South-Western Publishing Co., Mason, OH.
Vibert, C. (2004), Introduction to Online Competitive Intelligence Research, South-Western
Publishing Co., Mason, OH.
Vriens, D. (2003a), Information and Communication Technology for Competitive Intelligence, Idea
Group Publishing, Hershey, PA.
Vriens, D. (2003b), “The role of information and communication technology in competitive
intelligence”, in Vriens, D. (Ed.), Information and Communications Technology for
Competitive Intelligence, Idea Group Publishing, Hershey, PA, pp. 1-33.
Vriens, D. and Achterbergh, J. (2003), “The source map: a means to support collection activities”,
in Vriens, D. (Ed.), Information and Communications Technology for Competitive
Intelligence, Idea Group Publishing, Hershey, PA, pp. 181-93.
Windle, G. (2003), “How can competitive intelligence practitioners avoid over-relying on the
internet?”, in Fleisher, C.S. and Blenkhorn, D.L. (Eds), Controversies in Competitive
Intelligence: The Enduring Issues, Praeger, Westport, CT, pp. 85-97.
Wright, S., Pickton, D.W. and Callow, J. (2002), “Competitive intelligence in UK firms: a
typology”, Marketing Intelligence & Planning, Vol. 20 No. 6, pp. 349-60.