| Preface | p. xi |
| Competition | p. 1 |
| Virtual Monopolies | p. 3 |
| Definition of Competition | p. 4 |
| Where Do Companies Compete? | p. 5 |
| Marketing and Competitive Strategies | p. 6 |
| The Competitive Environment | p. 9 |
| Mechanisms By Which Companies Compete | p. 10 |
| Scale | p. 10 |
| Intelligence | p. 12 |
| The Applications for Intelligence | p. 13 |
| Companies to Watch | p. 14 |
| Narrowing the Field | p. 17 |
| Alternative Applications for Intelligence-Gathering Techniques | p. 18 |
| Alternative Routes to Intelligence | p. 21 |
| The Development of Competitive Intelligence | p. 24 |
| The Development of Competitive Intelligence as a Formal Activity | p. 25 |
| Factors Influencing the Growth of Competitive Intelligence | p. 28 |
| Factors Inhibiting the Growth of Competitive Intelligence | p. 31 |
| Framework for Competitive Analysis | p. 33 |
| Mapping the Competitive Landscape | p. 34 |
| Drivers of Behaviour and Change | p. 38 |
| Types of Intelligence | p. 42 |
| Key Intelligence Topics | p. 44 |
| Format for Collecting and Presenting Intelligence | p. 45 |
| The Time Dimension | p. 48 |
| Overview of the Sources of Intelligence | p. 50 |
| Primary and Secondary Sources | p. 50 |
| Determinants of Methods Used | p. 52 |
| Secondary Sources of Intelligence | p. 56 |
| Internal Intelligence Sources | p. 56 |
| External Secondary Sources | p. 59 |
| Locating External Secondary Intelligence | p. 71 |
| Intelligence on the Internet | p. 74 |
| Search Engines and Web Crawlers | p. 75 |
| Intelligence Content of the Web | p. 76 |
| Short Cuts | p. 83 |
| Discussion Forums | p. 83 |
| Newsgroups (or Bulletin Boards) | p. 84 |
| Monitoring the Internet | p. 84 |
| Primary Intelligence Collection Techniques | p. 86 |
| Internal Primary Sources | p. 86 |
| External Primary Intelligence | p. 92 |
| Obtaining Intelligence Directly from Competitors | p. 99 |
| The Demise of Primary Intelligence? | p. 108 |
| Market Research as a Source of Competitive Intelligence | p. 109 |
| Market Research and Competitive Intelligence | p. 109 |
| Customers as a Source of Intelligence | p. 110 |
| Surveying Markets for Intelligence | p. 111 |
| Analysis - Filling the Gaps and Stretching the Data | p. 115 |
| Filling the Gaps in an Incomplete Picture | p. 117 |
| Extending the Level of Understanding | p. 118 |
| Environmental Analysis | p. 121 |
| Verifying Intelligence | p. 123 |
| Verification of Published Intelligence | p. 123 |
| Verification of Primary Intelligence | p. 127 |
| Sanity Checks | p. 129 |
| Competitive Intelligence Resources | p. 130 |
| In-House Resources or External Agencies | p. 130 |
| The Internal Competitive Intelligence Organisation | p. 132 |
| Competitive Intelligence Staff | p. 134 |
| Identifying Potential External Suppliers | p. 135 |
| Assessing the Suitability of Competitive Intelligence Agencies | p. 137 |
| Compiling a Shortlist | p. 141 |
| Approved Research Contractors | p. 142 |
| The Proposal | p. 142 |
| Assessing Alternative Offers | p. 143 |
| Presentation of Proposals | p. 145 |
| Negotiations | p. 145 |
| The Intelligence Briefing | p. 147 |
| The Briefing Document | p. 147 |
| The Briefing Meeting | p. 153 |
| Controlling the Intelligence Collection Process | p. 155 |
| Project Briefing or 'Kick Off' Meeting | p. 156 |
| Review of Discussion Guides | p. 158 |
| Progress Reports | p. 158 |
| Reviews of the Information Yield | p. 158 |
| Final Review of Findings | p. 159 |
| Legal Factors and Ethical Guidelines | p. 160 |
| Criminal Law | p. 161 |
| Copyright Law | p. 162 |
| Competition and Antitrust Legislation | p. 162 |
| The Economic Espionage Act | p. 162 |
| Data Protection Legislation | p. 163 |
| Codes of Ethics | p. 164 |
| Non-Disclosure | p. 165 |
| Conflicts of Interest | p. 166 |
| Market Research and Competitive Intelligence Ethics | p. 166 |
| Deliverables | p. 168 |
| Sanctions | p. 168 |
| Regional Variations | p. 169 |
| Processing and Distributing Intelligence | p. 170 |
| Written Reports | p. 171 |
| Meetings and Other Forums | p. 171 |
| E-mail | p. 172 |
| Corporate Intranets | p. 172 |
| Management Information Systems | p. 173 |
| Knowledge Management Systems | p. 175 |
| Tailored Competitive Intelligence Systems | p. 177 |
| Access to Competitive Intelligence | p. 178 |
| Measuring the Effectiveness of Competitive Intelligence | p. 180 |
| Quality of Intelligence Provided | p. 180 |
| Use Being Made of Competitive Intelligence | p. 181 |
| Development of an Intelligence Culture | p. 182 |
| Event Analysis | p. 182 |
| Market Share | p. 183 |
| Counter-Intelligence | p. 184 |
| The Structure of Counter-Intelligence Activity | p. 186 |
| Assigning Responsibility for Counter-Intelligence Programmes | p. 187 |
| Identifying the Potential Sources of Threat | p. 190 |
| Identifying the Means By Which Intelligence is Being Sought | p. 192 |
| Identifying and Assessing the Vulnerabilities | p. 194 |
| Categorise Information | p. 200 |
| Reducing the Chances of Intelligence Being Obtained | p. 202 |
| Testing the System | p. 211 |
| Monitoring the Threat | p. 211 |
| Publicise Willingness to take Legal Action | p. 212 |
| Implementation | p. 212 |
| Deception and Misinformation | p. 215 |
| Intelligence Held on the Company | p. 216 |
| Channels of Communication | p. 217 |
| Internal Sources of Information | p. 217 |
| Types of Deception | p. 218 |
| Ethical Considerations | p. 220 |
| Propaganda | p. 221 |
| The Competitive Intelligence Checklist | p. 222 |
| Further Reading | p. 229 |
| Index | p. 231 |
| Table of Contents provided by Syndetics. All Rights Reserved. |