You are on page 1of 10

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/224687063

Threat and Opportunity Analysis in Technological Development

Conference Paper · August 2006


DOI: 10.1109/PICMET.2006.296547 · Source: IEEE Xplore

CITATIONS READS
7 14,355

3 authors, including:

Husam Arman Allan Hodgson


Kuwait Institute for Scientific Research Loughborough University
22 PUBLICATIONS   267 CITATIONS    74 PUBLICATIONS   430 CITATIONS   

SEE PROFILE SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Soft Factors Modelling Tool View project

Strategic Technology Alignment Roadmapping Project View project

All content following this page was uploaded by Allan Hodgson on 29 May 2014.

The user has requested enhancement of the downloaded file.


PICMET 2006 Proceedings, 9-13 July, Istanbul, Turkey (c) 2006 PICMET

Threat and Opportunity Analysis in Technological Development


Husam Arman, Allan Hodgson, Nabil Gindy
University of Nottingham, School of M3, Nottingham, UK

Abstract--Globalisation of competition and the accelerating II. CONCEPTS AND DEFINITIONS


rate of technology change set difficult challenges for advanced
technology-based industries in the new millennium. Companies A. Management of technology
in these industries must now continually reduce costs and The term technology refers not only to physical items
develop better products and services in order to sustain a
competitive advantage in an endlessly changing business
(e.g. machines or tools), but also to methods, techniques, or
environment. software that humans require in order to solve a problem or
High research and development (R&D) costs force high gain achievement. It can therefore be categorized as both
technology companies to select more carefully which tech- “hard” and “soft” [3].
nologies to invest in. Technologies are introduced into a The term technology has evolved more so with the
company in order to make a positive contribution to its products managerial concept compared to any other concept. When
and services. Companies need technology planning in order to technology is defined in the literature [4-6] it is described as
make better decisions with regard to strategic corporate applied knowledge focusing on the “know- how” of the
planning, R&D management, product development, production organisation.
and marketing.
In this paper, we describe a technology planning support
Technology management is a process, which includes
function that is used to analyse relevant information from planning, directing, controlling, developing and
various sources in order to optimise the impact of technological implementing technological capabilities to shape and
developments on the business and avoid threats that come from accomplish the strategic and operational objectives of an
both within and outside the sector/industry. This function organization [7].
highlights possible threats and so helps planners and decision Irrespective of what is managed, management involves
makers in making the right decision before the anticipated concerns about the future. In technology management a
problem occurs. decision must be made by managers today that will affect the
organisation’s future [8]. This decision process needs
I. INTRODUCTION accurate inputs to support technology managers in
anticipating the future. This could be using technology
Technology is an important strategic asset for many forecasting, which is further discussed in section B.
companies, and technological considerations must be
included in strategic planning processes [1]. Strategic B. Technology forecasting
technology planning can enable companies to anticipate Technology is responsible for many changes. By
potential technology-based threats and opportunities and so forecasting technology developments, the decision making
react in time to benefit from such developments. process will be improved due to the greater accuracy of the
Technology roadmaps have been developed for many future [9].
industries with the express purpose of capturing expectations A technological forecast includes four elements: the time
or intentions within that industry. For example, the semi- of the forecast or the future date when the forecast is to be
conductor industry’s roadmap [2] provides very detailed, realised, the technology being forecast, the characteristics of
regularly updated forecasts of developments in the the technology or the functional capabilities of the
performances, physical dimensions, etc., of semiconductor technology, and a statement about probability [10].
products, components and processing equipment. However, Bright, a pioneer in this field, define technology
most technologically advanced industries, for example aero- forecasting as “… a quantified prediction of the timing and of
space, draw their technologies from many areas of materials the character of the degree of change in a technical
and processes and therefore do not have such a clear view of parameter” [11]. Vanston [12] shares this view while others,
the future. such as [8;10;13] are willing to accept more qualitative
Several tools are used to support technology planning. analyses and approaches (e.g. expert opinions) in the
The concept that we describe in this paper can support the forecasting exercise.
process of technology forecasting because it enables The greater part of the technological forecasting
technology managers to make better assessments of the literature since the 1960s has been devoted to structured
emerging technologies, and to input alarms for strategic judgmental approaches such as “Delphi” surveys and “cross
planning to defend potential threats or exploit potential impact” matrices [14]. There are few real industrial
opportunities. applications of technology forecasting and most of the tools
are described only in theoretical terms [13]. Therefore there
is a need for a systematic process that can generate dynamic

9
PICMET 2006 Proceedings, 9-13 July, Istanbul, Turkey (c) 2006 PICMET

support for technology planning and can use simple and III. THREAT AND OPPORTUNITY ANALYSIS IN
useful tools. TECHNOLOGICAL DEVELOPMENT

C. Technology Intelligence (TI) Fig. 1 provides an outline of the main inputs, processes
Most strategic managers claim that their companies keep and outputs of technology watch methodology by providing a
up-to-date in their field but they do not have a systematic way step by step presentation on how technology watch is
to capture the important elements of technology changes from implemented, maintained and how it functions.
the general information around them [15]. Traditional
monitoring processes in most organizations are largely A. Identification of company areas of interest and the critical
arbitrary, and are dependent on what individuals or leaders in “established” technologies
the organization are reading, thinking and sharing informally In the beginning, a list of areas and technologies has to
with each other. In today’s world, such an arbitrary process be agreed upon. People from different departments, e.g.
is insufficient. R&D, marketing, and production, are brought together in a
Methods and tools, primarily in the technology workshop with the purpose of identifying the technologies
intelligence field such as those described in [15;16] are that are important now and in the future to the company’s
needed to offer actions to cope with threats that are not business.
necessarily obvious to detect. Such a threat, in the form of an These technologies should be prioritized using the
emerging technology or new technological innovation, analytical hierarchy process (AHP) or another scoring
product or service, may replace the existing dominant method. In the workshop, methods such as brainstorming are
technology in the market, despite the fact that it may initially used to come to an agreement of the areas of interest and the
perform worse in terms of the measures used by the current important technologies.
market leaders; this concept is referred to as disruptive
technology. B. Identification of the competing technologies for each
Christensen proposes that there are two major types of “established” technology
technologies, the usual “sustaining” and the less usual Before we proceed in explaining the process, we need to
“disruptive” [17]. Sustaining technology relies on explain the term ‘competing technology’. Competing
incremental improvements to an already established technologies refers to the technologies that can do the same
technology by making it better and cheaper. Disruptive job or produce the same product or function for the customer,
technology often has performance problems and lacks and could therefore potentially replace the established
refinement because it is new, appeals to a limited audience, technology.
and may not yet have a proven practical application. Kostoff The same people mentioned above in section A, brought
consider the disruptive technology as scientific discoveries together in a workshop, would identify the competing
that break through the usual product/technology capabilities technologies that are important and might pose a threat now
and provide a basis for a new competitive paradigm [18]. or in the future to company’s business.
The activity of collecting and evaluating information on
technology developments has been given several names C. Information collection
including technology intelligence (TI), technology This information can arise from external sources,
monitoring, technology forecasting, technology scouting, including:
competitive technical intelligence and technology watch [19]. • Customers, competitors, suppliers, unions subcontractors
Literature on technology intelligence [15;16;20] and partners
describes many processes. Savioz [20] contribute to the • National government, European Union and international
research by proposing a novel concept called Opportunity organisations (e.g. DTI, OECD, WHO)
Landscape. Peiffer divides the technology intelligence • Trade fairs, conferences, seminars, exhibition
process into two major steps: identification and assessment of • Publications (e.g. newspapers, magazines, trade journals,
proposed technology [16]. However, this method has been academic journals, patents)
criticised because it has a very broad view. Ashton describe a • Unpublished documents (e.g. computerized database,
customer-orientated outlook that utilises a systematic process meeting notes, correspondences)
that starts with planning for the TI activities then data • Job vacancies, requests for tenders, contracts
collection, analysis, dissemination and application[15].
• Industry contacts and friends
TI is an important subject matter in this paper in helping
• Court appearances
to develop technology watch (TW) framework that will work
• The World Wide Web (this will become the dominant
as a tool for monitoring; identifying and assessing the
information source as it transforms (in part) into a
technologies that emerge and could disrupt the business by
semantic web)
affecting or replacing the existing technologies which
comprise the bottom line of the company.

10
PICMET 2006 Proceedings, 9-13 July, Istanbul, Turkey (c) 2006 PICMET

Fig. 1. Outline of the technology watch methodology

Information also arises from internal sources including: Several ontologies are initially developed to describe
• R&D engineers and scientists, designers, manufacturing technology characteristics, related products, and materials.
engineers, shop floor operators, sales personnel We need to build the above ontologies before applying
• Intranets, databases, business drivers, forecasts, company the text mining and Internet search tools. It is important to
roadmaps decide on the key words and concepts that we would use in
• Feedback from technology watch system users. the searching method. Therefore, we need company-specific
“agreed on” concepts that comprise these ontologies.
Currently, the University of Nottingham’s research team These ontologies will act as a filter (see Fig. 2). This
is concentrating on the internet/intranet as a source of filter will pick the issues that concern any of the three layers
technology (watch) information. (product, process, material). Consequently, money is not
wasted in searching and valuable skills can be allocated
D. Analysis elsewhere. A system is needed to seize any information,
check and analyze it, exploit it and use it in the right way or
1. Threat analysis (a periodic process) simply discard it (if it is not important). For example,
material X is being used in field Y and we could use its
a) Build company ontologies functions/properties; let us test it, is it worthy? Does it fit?
Ontologies are needed in order to share common Where?
understandings of the structure of information among people The system should indicate if the information that it
or software agents, and to answer queries from technologists. picks up is important or not. Without such system a company
might lose vital information.

11
PICMET 2006 Proceedings, 9-13 July, Istanbul, Turkey (c) 2006 PICMET

Product Process Material


------- ------- -------
------- ------- -------
------- ------- -------
Information ------- ------- -------
Drop
------- ------- -------
------- ------- -------

Ontologies
Fig. 2. Ontology function
We need to define and decide about the competency threats. Logical relationships between the ontological terms
questions, these questions will serve as the litmus test later: in the brainstorming workshop are used to build the
Does the ontology contain enough information to answer scenarios. Examples of scenarios are showed in the analysis
these types of questions? Do the answers require a particular section of Table 1.
level of detail or representation of a particular area? These Morphological analysis is a useful tool that can help in
competency questions are just a sketch and do not need to be developing opportunity and threat scenarios, since it is used
exhaustive [21]. for exploring all the possible solutions to a particular
A sample of competency questions (for our ontologies): technical problem. By discussing all the dimensions and the
ƒ What are the competing technologies of technology X? functions of each product, alternative technologies can be
ƒ What are the materials that are used in competing explored and chosen for consideration.
technologies of technology X? Although morphological analysis is probably not used
ƒ What are the products that are used in competing widely as technology forecasting tool, it is frequently
technologies of technology X? mentioned in textbooks along with technological forecasting
ƒ What are the functionalities that product Y provides? tools [22]. In our work it will serve as a technique to
ƒ What are the technologies that use material Z? structure a problem or scenario rather than to solve it.

From the technological data stored in the ontologies and c) Analysis of the significant scenarios
the hidden relations between the company’s technological Threats/opportunities should be related to the products,
concepts several scenarios could be formed. materials and processes which compromise the organisation
system (see the Fig. 3). We will use our Technological
b) Development of opportunity & threat scenarios Threat and Opportunity Analysis (TTOA) method, which is
The analysis of opportunities and threats differs from similar to the widely-used Failure Mode and Effect Analysis
organisation to organisation. Several issues are considered in (FMEA) method. It was motivating for University of
a brainstorming workshop which may be included a SWOT Nottingham’s Strategic Technology Acquisition (STA)
analysis. subgroup, that our industrial collaborators showed interest
Scenarios are outlines of an expected sequence of because of the advantage of using similar tool which they are
technology-related events that may result in opportunities and familiar with.

In Out

- Material
-Product
- Technology Processes
- Service
- Method

Fig. 3. Organisational system

12
PICMET 2006 Proceedings, 9-13 July, Istanbul, Turkey (c) 2006 PICMET

TABLE 1. TECHNOLOGICAL THREATS & OPPORTUNITIES ANALYSIS (TTOA) METHOD


No Product Risk
Function Threat & Opportunity scenario
/Part
P S T A
1 Can Hold liquids Glass and plastics as packaging 4 2 1 8
tech will affect the can producers
if they exceeded customer needs
2 Washing Wash clothes and Permanent press fabrics will be 3 3 3 27
machine fabrics used widely in cloth industry and
need special appliance
No Material Function T&O scenario P S T A
1 PC Material for PC will be cheaper than ABS, 4 4 4 64
bottles/containers... which we use in our process
etc (extrusion) now.
No Process Function T&O scenario P S T A
1 Painting/ Painting for cotton Coloured cotton could be obtained 5 5 2 50
dyeing and fabrics from the plants using genetic
concept.
No Market Function T&O scenario P S T A
1 Aircraft Move people Improvement in video- 1 3 1 3
conferencing will affect the airline
companies “business tickets”.
P = probabilities (chance) of threat occurrence
S = severity of the threat
T= likelihood that we will not be able to alleviate the threat.
A = Alarm value
The values of (P,S,T) will be on a scale from 1 to 5 where:
1= very low or none
2 = low or minor
3 = moderate or significant
4 = high
5 = very high or catastrophic

The Alarm value (A) is calculated as follows: The alarm levels are shown in the Figure 3. For example
A=P*S*T if we have scenario that has value 4 (high) for P, 5 (very
high) for S and 3 (moderate) for T, then the alarm value is 60,
so the alarm level is B.

A 64-125
Scenario Alarm value
1 80 B 27-63
2 64 8-26
C
3 50
D 1-7
4 8
Fig. 4 Alarm levels

The alarm value gives an indicator of the threat and achieved at a particular time. The earliest known usage of the
generally, the scenarios with the highest alarm value, which term "state of the art" dates back to 1910 from an engineering
expressed in the alarm level, should be given first manual by H.H. Suplee entitled ‘Gas Turbine’ [23].
consideration. Follow up is important and actions to reduce To define the SOA, a search through information sources
the impact are needed and critical. These actions should work (such as patents, publications and many other sources) is
on decreasing mainly T value by generating actions as form used, then by analysing the information in the literature and
of projects to increase the awareness and develop strategies to from issues related to competitors, a clear image should be
avoid these threats. produced to represent the state of the art.
It is useful in all cases to define the SOA, for example, to
2. Gap analysis (continuous process) a client who is contemplating entry into a particular field, the
state of the art search results can provide evidence of the
a) Define the state of the art for each technology suitability of such a decision. Also, another example is that
The term: the state of the art (SOA) is the highest level of a client who is currently active in a particular field, the
of development, as of a device, technique, or scientific field,

13
PICMET 2006 Proceedings, 9-13 July, Istanbul, Turkey (c) 2006 PICMET

state of the art search results can lay out the path that must be The gap in Fig. 6 is a judgmental value and is measured
followed to design around the current art. on a scale from 1 to 10 where 10 is a very high gap and 0 is
no gap, and all are measured against the state of the art
b) Define the gap between the state of the art and the (SOA). The threshold is a value that should be defined
company’s current capabilities in the established previously for each technology depending on its importance
technologies to the company.

Gap

Alarm

Tech1 Tech2 Tech3 Tech4 SOA


Threshold (acceptable limit)
Fig. 6. The gap between the state of the art and company’s today situation of the established technologies

The threshold is usually updated but less frequently than are considering detailed drivers associated with specific
the gap itself (more to do with strategic planning people). processes it is more to do with technology performance
Therefore this will give an indication and tangible measures parameters. After we identify these drivers for each
of the company’s situation from a technological point of technology, we prioritize them and then the ones given the
view. The alarms will be triggered when the gap exceed the highest priority are analysed in the system.
decided threshold limit. Performance drivers are the critical issues considered by
the customer when he selects process, product, or service.
c) Define the gap between the established technologies and Paap [24] suggested using performance driver concept in
the competing established technologies some cases to understand the nature of technology
Technologies/processes are used to produce components substitution. We use this concept as we mentioned earlier in
or products, for example, we produce a product using comparing between technologies and evaluating their
technology 1, but somebody else produces the same product maturities.
but using technology 2. We consider this competing Fig. 7 below shows how the analysis is done; we use the
technology which is already established. performance driver to assess the technologies. This is done
We need to define technology performance drivers by by comparing the in-house technology and the competing
watching the needs of the market, what functionalities are technology for each driver. The difference between T1
needed and by defining customer buying priorities and (technology 1) and CT1 (competing technology for T1) is the
requirements. For example, product attributes that customer gap, which is evaluated by comparing it to the predefined
value in their purchase decision could be considered ‘acceptable gap’. If the gap exceeds the ‘acceptable gap’,
performance drivers. This may be the same as market drivers then an alarm should be triggered.
if we are concerned with high-level drivers. However, if we

14
PICMET 2006 Proceedings, 9-13 July, Istanbul, Turkey (c) 2006 PICMET

Perf. driver

Alarm
Positive gap
Negative gap

T1 CT1 T2 CT1 Tech’s

Acceptable Gap
Fig. 7. Gap analyses between established technologies and competing technologies

d) Define the gap between the established technologies


and the competing emerging technologies
After identifying the emerging technologies that are
qualified to be competing technologies, a follow up should be
done to make sure that the threats from these technologies are
monitored:
1. Monitor the maturity of the technology using the
technology readiness level (TRL) concept, which was
introduced by NASA, is basically a systematic
metric/measurement system that supports assessments of
the maturity of a particular technology (see Fig. 8). We
observe the TRL for each technology and when it
becomes close to TRL 9, the alarm should work.
2. Monitor performance drivers’ “customer requirements”
for these technologies using performance drivers concept
as well, since the technology becomes a major threat
when it reaches the stage of fulfilling the customer
needs, for example, at a lower cost or higher level of
performance than the established technology.

The alarm should work when the figures show an


Fig. 8. TRL (adapted from NASA)
increase in the performance of the new technology (ECTn)
and it is approaching the performance limit of the established
technology (Tn) (see Fig. 9).

15
PICMET 2006 Proceedings, 9-13 July, Istanbul, Turkey (c) 2006 PICMET

Perf. Driver
Alarm
Perf. Limit (fulfil the needs)

T1 ECT1 T2 ECT2 Tech’s

Fig. 9. Monitoring performance drivers for the competing technologies

E. Disseminate the results company situation comparing to the state of the art and will
Outputs will be targeted to appropriate personnel, based provide a monitor system that can keeps track of the changes.
on the topic area. Many ways are available now with all the The technology watch methodology has been partially
new technologies to disseminate the results, ranging from testing using ontologies based on the requirements of a high
face to face conversation to electronic communication forms technology company. The researchers are currently in
such as emails. The material itself could be presentations, discussion with the research management of this company
summaries, references, reports and documents. Choosing with a view to implementing the technology watch
between the means of communication depends on company’s methodology, initially in the manufacturing processes
situation, urgency, and targeted staff. research and development area.
An issue of importance is the feedback from the users of
the system. It is intended that the assessment by users as to ACKNOWLEDGMENT
the value of warnings issued by the subsystem (and the
associated reasoning), will enable learning or adaptation via The authors gratefully acknowledge support from the UK
the modification of the weightings of various concepts, thus EPSRC.
enabling an increasingly sensitive multi-criteria analysis to be
carried out. However, this feature has not yet been developed REFERENCES
as part of the methodology.
[1] Phaal R, Rick Mitchell, and David Probert, "Technology roadmapping:
Starting-up roadmapping fast," Research Technology Management,
IV. CONCLUSIONS Washington, vol. 46, no. 2 2003.
[2] International Technology Roadmap for Semiconductors, "International
The accelerating rate of technology change is increasing Technology Roadmap for Semiconductors", Retrieved 02/10/2005
World Wild Web, http://public.itrs.net/.
the risks that technology-orientated companies face. There is [3] Phaal R, Clare Farrukh, and David Probert, "Technology roadmapping:
a need for tools to alleviate these risks by providing early Linking technology resources into business planning," International
warnings of potential change. The methodology outlined in Journal of Technology Management;Geneva, vol. 26, no. 1 2003.
this paper is intended to search proactively for information on [4] C. Floyd, Managing technology for corporate success. Aldershot:
Gower, 1997.
potential technology-related developments, and to assess [5] L. Steele, Managing Technology: The Strategic View Mcgraw-Hill
these prior to supplying relevant personnel with information, Engineering and Technology Management Series, 1989.
appropriate ‘alarm levels’, plus the associated reasoning. [6] R. Whipp, "Managing technological changes. Opportunities and
Keeping an eye on the technological developments in the pitfalls," International Journal of Vehicle Design, vol. 12, pp. 469-477,
1991.
same field of industry and outside the sector is a very [7] National Research Council, "Management of Technology: The Hidden
important issue, since opportunities implied by changes in the Competitive Advantage," Washington, DC: National Academy Press,
environment could be exploited for the benefit of the 1987, p. 9.
organisation. By identifying the gaps we defined in this
paper, companies can have an up to date evaluation of their

16
PICMET 2006 Proceedings, 9-13 July, Istanbul, Turkey (c) 2006 PICMET

[8] A. L. Porter, A. T. Roper, T. W. Mason, F. A. Rossini, J. Banks, and B. [18] R. N. Kostoff, R. Boylan, and G. R. Simons, "Disruptive technology
J. Wiederholt, Forecasting and Management of Technology Wiley- roadmaps," Technological Forecasting and Social Change, vol. 71, no.
Interscience, 1991. 1-2, pp. 141-159, 2004.
[9] B. C. Twiss, Managing technological innovation Longman, 1992. [19] P. Bucher, "Integrated Technology Roadmapping: Design and
[10] J. Martino, Technological forecasting for decision making. New York: Implementation for Technology-Based Multinational Enterprises." PhD
Elsevier Science Publishing Company, 1983. Swiss Federal Institute of Technology Zurich, 2003.
[11] J. Bright, Practical technology forecasting. Austin: Technology Futures [20] P. Savioz and M. Blum, "Strategic forecast tool for SMEs: how the
Inc., 1998. opportunity landscape interacts with business strategy to anticipate
[12] J. Vanston, Technology Forecasting: An Aid to Effective Technology technological trends," Technovation, vol. 22, no. 2, pp. 91-100,
Management. Austin: Technology Futures, Inc, 1998. Feb.2002.
[13] B. C. Twiss, Forecasting for Technologists and Engineers: A pratical [21] Natalya F.Noy and Deborah L.McGuinness, "Ontology Development
guide for better decisions Peter Peregrinus Ltd, 1992. 101: A Guide to Creating Your First Ontology'," Stanford Knowledge
[14] R. U. Ayres, "What have we learned?," Technological Forecasting and Systems Laboratory Technical Report KSL-01-05 and Stanford
Social Change, vol. 62, no. 1-2, pp. 9-12, 1999. Medical Informatics Technical Report SMI-2001-0880,Mar.2001.
[15] W. B. Ashton and G. S. Stacey, "Technical Intelligence in Business: [22] J. G. Wissema, "Morphological analysis: Its application to a company
Understanding Technology Threats and Opportunities," International TF investigation," Futures, vol. 8, no. 2, pp. 146-153, Apr.1976.
Journal of TechnologyManagement, vol. 10, no. 1 1995. [23] Wikipedia, "Sate of the art," Retrieved 20/11/2005 World Wild Web,
[16] S. Peiffer, "Technologie-Frühaufklärung: Identifikation und Bewertung http://en.wikipedia.org/wiki/State_of_the_art .
zukünftiger Technologien in der strategischen Unternehmensplanung," [24] J. Paap, "Anticipating Disruptive Innovation," Research Technology
S&W Steuerund Wirtschaftsverlag, 1992. Management, vol. 47, no. 5, pp. 13-22, 2004.
[17] C. Christensen, The Innovator's Dilemma: When New Technologies
Cause Great Firms to Fail Harvard Business School Press, 1997.

17
View publication stats

You might also like