Professional Documents
Culture Documents
net/publication/224687063
CITATIONS READS
7 14,355
3 authors, including:
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Allan Hodgson on 29 May 2014.
9
PICMET 2006 Proceedings, 9-13 July, Istanbul, Turkey (c) 2006 PICMET
support for technology planning and can use simple and III. THREAT AND OPPORTUNITY ANALYSIS IN
useful tools. TECHNOLOGICAL DEVELOPMENT
C. Technology Intelligence (TI) Fig. 1 provides an outline of the main inputs, processes
Most strategic managers claim that their companies keep and outputs of technology watch methodology by providing a
up-to-date in their field but they do not have a systematic way step by step presentation on how technology watch is
to capture the important elements of technology changes from implemented, maintained and how it functions.
the general information around them [15]. Traditional
monitoring processes in most organizations are largely A. Identification of company areas of interest and the critical
arbitrary, and are dependent on what individuals or leaders in “established” technologies
the organization are reading, thinking and sharing informally In the beginning, a list of areas and technologies has to
with each other. In today’s world, such an arbitrary process be agreed upon. People from different departments, e.g.
is insufficient. R&D, marketing, and production, are brought together in a
Methods and tools, primarily in the technology workshop with the purpose of identifying the technologies
intelligence field such as those described in [15;16] are that are important now and in the future to the company’s
needed to offer actions to cope with threats that are not business.
necessarily obvious to detect. Such a threat, in the form of an These technologies should be prioritized using the
emerging technology or new technological innovation, analytical hierarchy process (AHP) or another scoring
product or service, may replace the existing dominant method. In the workshop, methods such as brainstorming are
technology in the market, despite the fact that it may initially used to come to an agreement of the areas of interest and the
perform worse in terms of the measures used by the current important technologies.
market leaders; this concept is referred to as disruptive
technology. B. Identification of the competing technologies for each
Christensen proposes that there are two major types of “established” technology
technologies, the usual “sustaining” and the less usual Before we proceed in explaining the process, we need to
“disruptive” [17]. Sustaining technology relies on explain the term ‘competing technology’. Competing
incremental improvements to an already established technologies refers to the technologies that can do the same
technology by making it better and cheaper. Disruptive job or produce the same product or function for the customer,
technology often has performance problems and lacks and could therefore potentially replace the established
refinement because it is new, appeals to a limited audience, technology.
and may not yet have a proven practical application. Kostoff The same people mentioned above in section A, brought
consider the disruptive technology as scientific discoveries together in a workshop, would identify the competing
that break through the usual product/technology capabilities technologies that are important and might pose a threat now
and provide a basis for a new competitive paradigm [18]. or in the future to company’s business.
The activity of collecting and evaluating information on
technology developments has been given several names C. Information collection
including technology intelligence (TI), technology This information can arise from external sources,
monitoring, technology forecasting, technology scouting, including:
competitive technical intelligence and technology watch [19]. • Customers, competitors, suppliers, unions subcontractors
Literature on technology intelligence [15;16;20] and partners
describes many processes. Savioz [20] contribute to the • National government, European Union and international
research by proposing a novel concept called Opportunity organisations (e.g. DTI, OECD, WHO)
Landscape. Peiffer divides the technology intelligence • Trade fairs, conferences, seminars, exhibition
process into two major steps: identification and assessment of • Publications (e.g. newspapers, magazines, trade journals,
proposed technology [16]. However, this method has been academic journals, patents)
criticised because it has a very broad view. Ashton describe a • Unpublished documents (e.g. computerized database,
customer-orientated outlook that utilises a systematic process meeting notes, correspondences)
that starts with planning for the TI activities then data • Job vacancies, requests for tenders, contracts
collection, analysis, dissemination and application[15].
• Industry contacts and friends
TI is an important subject matter in this paper in helping
• Court appearances
to develop technology watch (TW) framework that will work
• The World Wide Web (this will become the dominant
as a tool for monitoring; identifying and assessing the
information source as it transforms (in part) into a
technologies that emerge and could disrupt the business by
semantic web)
affecting or replacing the existing technologies which
comprise the bottom line of the company.
10
PICMET 2006 Proceedings, 9-13 July, Istanbul, Turkey (c) 2006 PICMET
Information also arises from internal sources including: Several ontologies are initially developed to describe
• R&D engineers and scientists, designers, manufacturing technology characteristics, related products, and materials.
engineers, shop floor operators, sales personnel We need to build the above ontologies before applying
• Intranets, databases, business drivers, forecasts, company the text mining and Internet search tools. It is important to
roadmaps decide on the key words and concepts that we would use in
• Feedback from technology watch system users. the searching method. Therefore, we need company-specific
“agreed on” concepts that comprise these ontologies.
Currently, the University of Nottingham’s research team These ontologies will act as a filter (see Fig. 2). This
is concentrating on the internet/intranet as a source of filter will pick the issues that concern any of the three layers
technology (watch) information. (product, process, material). Consequently, money is not
wasted in searching and valuable skills can be allocated
D. Analysis elsewhere. A system is needed to seize any information,
check and analyze it, exploit it and use it in the right way or
1. Threat analysis (a periodic process) simply discard it (if it is not important). For example,
material X is being used in field Y and we could use its
a) Build company ontologies functions/properties; let us test it, is it worthy? Does it fit?
Ontologies are needed in order to share common Where?
understandings of the structure of information among people The system should indicate if the information that it
or software agents, and to answer queries from technologists. picks up is important or not. Without such system a company
might lose vital information.
11
PICMET 2006 Proceedings, 9-13 July, Istanbul, Turkey (c) 2006 PICMET
Ontologies
Fig. 2. Ontology function
We need to define and decide about the competency threats. Logical relationships between the ontological terms
questions, these questions will serve as the litmus test later: in the brainstorming workshop are used to build the
Does the ontology contain enough information to answer scenarios. Examples of scenarios are showed in the analysis
these types of questions? Do the answers require a particular section of Table 1.
level of detail or representation of a particular area? These Morphological analysis is a useful tool that can help in
competency questions are just a sketch and do not need to be developing opportunity and threat scenarios, since it is used
exhaustive [21]. for exploring all the possible solutions to a particular
A sample of competency questions (for our ontologies): technical problem. By discussing all the dimensions and the
What are the competing technologies of technology X? functions of each product, alternative technologies can be
What are the materials that are used in competing explored and chosen for consideration.
technologies of technology X? Although morphological analysis is probably not used
What are the products that are used in competing widely as technology forecasting tool, it is frequently
technologies of technology X? mentioned in textbooks along with technological forecasting
What are the functionalities that product Y provides? tools [22]. In our work it will serve as a technique to
What are the technologies that use material Z? structure a problem or scenario rather than to solve it.
From the technological data stored in the ontologies and c) Analysis of the significant scenarios
the hidden relations between the company’s technological Threats/opportunities should be related to the products,
concepts several scenarios could be formed. materials and processes which compromise the organisation
system (see the Fig. 3). We will use our Technological
b) Development of opportunity & threat scenarios Threat and Opportunity Analysis (TTOA) method, which is
The analysis of opportunities and threats differs from similar to the widely-used Failure Mode and Effect Analysis
organisation to organisation. Several issues are considered in (FMEA) method. It was motivating for University of
a brainstorming workshop which may be included a SWOT Nottingham’s Strategic Technology Acquisition (STA)
analysis. subgroup, that our industrial collaborators showed interest
Scenarios are outlines of an expected sequence of because of the advantage of using similar tool which they are
technology-related events that may result in opportunities and familiar with.
In Out
- Material
-Product
- Technology Processes
- Service
- Method
12
PICMET 2006 Proceedings, 9-13 July, Istanbul, Turkey (c) 2006 PICMET
The Alarm value (A) is calculated as follows: The alarm levels are shown in the Figure 3. For example
A=P*S*T if we have scenario that has value 4 (high) for P, 5 (very
high) for S and 3 (moderate) for T, then the alarm value is 60,
so the alarm level is B.
A 64-125
Scenario Alarm value
1 80 B 27-63
2 64 8-26
C
3 50
D 1-7
4 8
Fig. 4 Alarm levels
The alarm value gives an indicator of the threat and achieved at a particular time. The earliest known usage of the
generally, the scenarios with the highest alarm value, which term "state of the art" dates back to 1910 from an engineering
expressed in the alarm level, should be given first manual by H.H. Suplee entitled ‘Gas Turbine’ [23].
consideration. Follow up is important and actions to reduce To define the SOA, a search through information sources
the impact are needed and critical. These actions should work (such as patents, publications and many other sources) is
on decreasing mainly T value by generating actions as form used, then by analysing the information in the literature and
of projects to increase the awareness and develop strategies to from issues related to competitors, a clear image should be
avoid these threats. produced to represent the state of the art.
It is useful in all cases to define the SOA, for example, to
2. Gap analysis (continuous process) a client who is contemplating entry into a particular field, the
state of the art search results can provide evidence of the
a) Define the state of the art for each technology suitability of such a decision. Also, another example is that
The term: the state of the art (SOA) is the highest level of a client who is currently active in a particular field, the
of development, as of a device, technique, or scientific field,
13
PICMET 2006 Proceedings, 9-13 July, Istanbul, Turkey (c) 2006 PICMET
state of the art search results can lay out the path that must be The gap in Fig. 6 is a judgmental value and is measured
followed to design around the current art. on a scale from 1 to 10 where 10 is a very high gap and 0 is
no gap, and all are measured against the state of the art
b) Define the gap between the state of the art and the (SOA). The threshold is a value that should be defined
company’s current capabilities in the established previously for each technology depending on its importance
technologies to the company.
Gap
Alarm
The threshold is usually updated but less frequently than are considering detailed drivers associated with specific
the gap itself (more to do with strategic planning people). processes it is more to do with technology performance
Therefore this will give an indication and tangible measures parameters. After we identify these drivers for each
of the company’s situation from a technological point of technology, we prioritize them and then the ones given the
view. The alarms will be triggered when the gap exceed the highest priority are analysed in the system.
decided threshold limit. Performance drivers are the critical issues considered by
the customer when he selects process, product, or service.
c) Define the gap between the established technologies and Paap [24] suggested using performance driver concept in
the competing established technologies some cases to understand the nature of technology
Technologies/processes are used to produce components substitution. We use this concept as we mentioned earlier in
or products, for example, we produce a product using comparing between technologies and evaluating their
technology 1, but somebody else produces the same product maturities.
but using technology 2. We consider this competing Fig. 7 below shows how the analysis is done; we use the
technology which is already established. performance driver to assess the technologies. This is done
We need to define technology performance drivers by by comparing the in-house technology and the competing
watching the needs of the market, what functionalities are technology for each driver. The difference between T1
needed and by defining customer buying priorities and (technology 1) and CT1 (competing technology for T1) is the
requirements. For example, product attributes that customer gap, which is evaluated by comparing it to the predefined
value in their purchase decision could be considered ‘acceptable gap’. If the gap exceeds the ‘acceptable gap’,
performance drivers. This may be the same as market drivers then an alarm should be triggered.
if we are concerned with high-level drivers. However, if we
14
PICMET 2006 Proceedings, 9-13 July, Istanbul, Turkey (c) 2006 PICMET
Perf. driver
Alarm
Positive gap
Negative gap
Acceptable Gap
Fig. 7. Gap analyses between established technologies and competing technologies
15
PICMET 2006 Proceedings, 9-13 July, Istanbul, Turkey (c) 2006 PICMET
Perf. Driver
Alarm
Perf. Limit (fulfil the needs)
E. Disseminate the results company situation comparing to the state of the art and will
Outputs will be targeted to appropriate personnel, based provide a monitor system that can keeps track of the changes.
on the topic area. Many ways are available now with all the The technology watch methodology has been partially
new technologies to disseminate the results, ranging from testing using ontologies based on the requirements of a high
face to face conversation to electronic communication forms technology company. The researchers are currently in
such as emails. The material itself could be presentations, discussion with the research management of this company
summaries, references, reports and documents. Choosing with a view to implementing the technology watch
between the means of communication depends on company’s methodology, initially in the manufacturing processes
situation, urgency, and targeted staff. research and development area.
An issue of importance is the feedback from the users of
the system. It is intended that the assessment by users as to ACKNOWLEDGMENT
the value of warnings issued by the subsystem (and the
associated reasoning), will enable learning or adaptation via The authors gratefully acknowledge support from the UK
the modification of the weightings of various concepts, thus EPSRC.
enabling an increasingly sensitive multi-criteria analysis to be
carried out. However, this feature has not yet been developed REFERENCES
as part of the methodology.
[1] Phaal R, Rick Mitchell, and David Probert, "Technology roadmapping:
Starting-up roadmapping fast," Research Technology Management,
IV. CONCLUSIONS Washington, vol. 46, no. 2 2003.
[2] International Technology Roadmap for Semiconductors, "International
The accelerating rate of technology change is increasing Technology Roadmap for Semiconductors", Retrieved 02/10/2005
World Wild Web, http://public.itrs.net/.
the risks that technology-orientated companies face. There is [3] Phaal R, Clare Farrukh, and David Probert, "Technology roadmapping:
a need for tools to alleviate these risks by providing early Linking technology resources into business planning," International
warnings of potential change. The methodology outlined in Journal of Technology Management;Geneva, vol. 26, no. 1 2003.
this paper is intended to search proactively for information on [4] C. Floyd, Managing technology for corporate success. Aldershot:
Gower, 1997.
potential technology-related developments, and to assess [5] L. Steele, Managing Technology: The Strategic View Mcgraw-Hill
these prior to supplying relevant personnel with information, Engineering and Technology Management Series, 1989.
appropriate ‘alarm levels’, plus the associated reasoning. [6] R. Whipp, "Managing technological changes. Opportunities and
Keeping an eye on the technological developments in the pitfalls," International Journal of Vehicle Design, vol. 12, pp. 469-477,
1991.
same field of industry and outside the sector is a very [7] National Research Council, "Management of Technology: The Hidden
important issue, since opportunities implied by changes in the Competitive Advantage," Washington, DC: National Academy Press,
environment could be exploited for the benefit of the 1987, p. 9.
organisation. By identifying the gaps we defined in this
paper, companies can have an up to date evaluation of their
16
PICMET 2006 Proceedings, 9-13 July, Istanbul, Turkey (c) 2006 PICMET
[8] A. L. Porter, A. T. Roper, T. W. Mason, F. A. Rossini, J. Banks, and B. [18] R. N. Kostoff, R. Boylan, and G. R. Simons, "Disruptive technology
J. Wiederholt, Forecasting and Management of Technology Wiley- roadmaps," Technological Forecasting and Social Change, vol. 71, no.
Interscience, 1991. 1-2, pp. 141-159, 2004.
[9] B. C. Twiss, Managing technological innovation Longman, 1992. [19] P. Bucher, "Integrated Technology Roadmapping: Design and
[10] J. Martino, Technological forecasting for decision making. New York: Implementation for Technology-Based Multinational Enterprises." PhD
Elsevier Science Publishing Company, 1983. Swiss Federal Institute of Technology Zurich, 2003.
[11] J. Bright, Practical technology forecasting. Austin: Technology Futures [20] P. Savioz and M. Blum, "Strategic forecast tool for SMEs: how the
Inc., 1998. opportunity landscape interacts with business strategy to anticipate
[12] J. Vanston, Technology Forecasting: An Aid to Effective Technology technological trends," Technovation, vol. 22, no. 2, pp. 91-100,
Management. Austin: Technology Futures, Inc, 1998. Feb.2002.
[13] B. C. Twiss, Forecasting for Technologists and Engineers: A pratical [21] Natalya F.Noy and Deborah L.McGuinness, "Ontology Development
guide for better decisions Peter Peregrinus Ltd, 1992. 101: A Guide to Creating Your First Ontology'," Stanford Knowledge
[14] R. U. Ayres, "What have we learned?," Technological Forecasting and Systems Laboratory Technical Report KSL-01-05 and Stanford
Social Change, vol. 62, no. 1-2, pp. 9-12, 1999. Medical Informatics Technical Report SMI-2001-0880,Mar.2001.
[15] W. B. Ashton and G. S. Stacey, "Technical Intelligence in Business: [22] J. G. Wissema, "Morphological analysis: Its application to a company
Understanding Technology Threats and Opportunities," International TF investigation," Futures, vol. 8, no. 2, pp. 146-153, Apr.1976.
Journal of TechnologyManagement, vol. 10, no. 1 1995. [23] Wikipedia, "Sate of the art," Retrieved 20/11/2005 World Wild Web,
[16] S. Peiffer, "Technologie-Frühaufklärung: Identifikation und Bewertung http://en.wikipedia.org/wiki/State_of_the_art .
zukünftiger Technologien in der strategischen Unternehmensplanung," [24] J. Paap, "Anticipating Disruptive Innovation," Research Technology
S&W Steuerund Wirtschaftsverlag, 1992. Management, vol. 47, no. 5, pp. 13-22, 2004.
[17] C. Christensen, The Innovator's Dilemma: When New Technologies
Cause Great Firms to Fail Harvard Business School Press, 1997.
17
View publication stats