Free Essay

Competitive Intelligence Shannon

In:

Submitted By malcolmshannon
Words 7080
Pages 29
TABLE OF CONTENTS
I. Abstract
II. Problem Statement
III. Evaluation
IV. Hypothesis
V. Procedure/Design
VI. Introduction
VII. Definition and Examples
a. Case I
b. Case II
c. Case III
VIII. Origin of Competitive Intelligence
IX. Why Collect Intelligence?
X. What is Ethical?
XI. Methods of Intelligence Collection
XII. What Resources Are Used to Collect Information
XIII. How Companies Utilized Collected Information
XIV. Keeping Companies Secrets Secret
a. Buildings
b. Communication Systems
c. Administrative
XV. Conclusion

I. ABSTRACT
Intelligence gathering is considered commonplace in corporate America. Companies struggle to maintain the high ground within a competitive marketplace. One source for maintaining an elevated position is through information gathering on competitors, better known as Competitive Intelligence (CI). Collection of this information can be accomplished through numerous means. History has shown that the collection of CI is not a new practice, only that the methods used to collect the information have evolved over the past century. Intense pressure for turning profits, winning contracts, and avoiding expensive research and development costs drive the methods used in CI collection. With an increase in CI collection, companies are required to protect themselves from inside and outside intruders.

II. PROBLEM STATEMENT
Corporate America has become oblivious to the information being divulged concerning company trade secrets. Corporate intelligence or company espionage has become an all to commonplace art form. Due to increase pressure to meet production quotas, new product markets, and an increase in stockholder wealth, corporations have changed into a “win at all costs” approach towards business. This organizational behavioral change has created misleading CEO’s, storytelling CFO’s, and cut throat high and mid-tier managers. Companies use boarder line practices to collect information on their competitors to get and stay ahead in the market environment. The ill effects of this intelligence gathering cost companies monetarily at the rate of 1 billion a year. Companies struggle to maintain the high ground within a competitive marketplace. One source for maintaining an elevated position is through information gathering on competitors, better known as Competitive Intelligence (CI). Collection of this information can be accomplished through ethical or unethical means. History has shown that the collection of CI is not a new practice, only that the methods used to collect the information have evolved over the past century. Intense pressure for turning profits, winning contracts, and avoiding expensive research and development costs drive the methods used in CI collection. With an increase in CI collection, companies are required to protect themselves from inside and outside intruders.

III. EVALUATION
Evaluation of Literature: Review scholarly articles over the past century identifying trends in competitive intelligence collection and identify possible ethical allegations posed by competitors. Articles on Ex-Boeing employees charged with corporate espionage over Lockheed documents. Steven Fink’s book, published in 2002, “Sticky Finger, managing the Global Risk of Economic Espionage.” Ira Winkler’s 1997 book, “Corporate Espionage.” The Information Management Journal’s article, “Competitive Intelligence in Action.” Business Week’s review of “Espionage in Corporate America.” Information collected from on-line resources, books, periodicals, or articles that pertain to the subject matter.

IV. HYPOTHESIS

Intense pressure for turning profits, winning contracts, and avoiding expensive research and development costs are driving the methods used in the collection of competitive intelligence.
a. Independent Variables
1. Innovation
2. Market leverage
3. Emerging strategies
4. Products
5. Collection Method
6. Resources
b. Dependent Variable: Collection of information

V. PROCEDURE/DESIGN

This will be a chronological review of competitive intelligence gathering to determine methodology used to collect information on competitors. Identify what drives companies to conduct information gathering and provide reasoning behind legal, moral and ethical collection compared to unethical collection means.

VI. INTRODUCTION
Companies ever increasing competitive bottom line has made the collection of information on competitors an almost everyday occurrence. Keep predators at bay is a continual job for most security professionals. Corporate practices have changed the behavior of executives to a “win at all costs” approach to business. Some practices range from performing minimal researcher within periodicals and newspapers to boarder-line illegal competitor information collection; which seems to be a 20th century practice. Many companies are targets of corporate intelligence gathering without even suspecting such an attack. Companies in the technology and pharmaceutical research industry and those companies in competitive biding for government contracts are more likely to be targeted, not to exclude other types of companies, by competitors in a desire to gain their company secrets. This paper will delineate how the company’s organizational behavior towards information collection has changed over the past century. It will define competitive intelligence and provide some real case samples. It will also show how both technology and human resourcefulness has evolved in this age-old art form of intelligence gathering. Lastly, the paper will explain some affects caused from corporate espionage and how it has changed the corporate environment. First, lets define competitive intelligence and review some real case examples.

VII. DEFINTIONS AND EXAMPLES
In most cases, Competitive Intelligence (CI) is defined in terms of the ethical standards. This means that an intelligence analyst “will not” use bribery or deception in the gathering of information. Intelligence, as defined by Mr. Roberts, author of Look at Big Business of Corporate Espionage, “Involves bribery, espionage, illicit acquisition of information, legitimate information gathering, analysis, and the presentation of intelligence information.” With this understanding, it is appropriate to hazard a definition by Mr. Underwood, author of Competitive Intelligence; “Competitive intelligence is the identification of strategically important corporate intelligence (knowledge) needs and the process of resolving those needs through ethical information, gathering, analysis, and the presentation of such analysis to clients (internal or external).” (Underwood, 2002) It should be understood that CI gathering is not a new concept; it has been around for centuries. One of the first recorded events of CI gathering was between two electric industry founders, General Electric and Westinghouse Electric in 1893.

a. CASE I
Both companies poised allegations of thievery against one another while biding for a power project. “In general, the competition between the two was intense and nasty,” said Mark Essig, author of Edison & the Electric Chair, a book on the early days of the electric industry. (Essig, 1999) General Electric was accused of paying a Westinghouse employee to steal blueprints and other documents, including details on a new light bulb design. Essig stated, “The case went to trial, but ended with a deadlock jury.” (Essig) According to General Electric, their methods of collection did not violate any ethical intelligence gathering practices. This case identified that companies may be willing to comprise ethics to increase their bottom line while identifying that ethical and unethical standards are undefined in the industry. This too may be a possible factor in the next case.

b. CASE II
In the mid-1990s, the auto-giant General Motors went after Volkswagen A.G. with accusations that a former GM executive took thousands of documents with him after he went to work for the German automaker. The documents detailed GM’s relationship with parts suppliers, including the prices it paid; a closely guarded topic within the industry. The Buffalo news reported, “After several years of legal maneuvers, Volkswagen settled the case in 1997 for $100 million and a pledge to buy $1 billion worth of GM parts.” (Buffalo News, 2004) Should the collection of intelligence from former employees of competitors be considered unethical? The company receiving the intelligence would probably suggest that this practice is not unethical, while the company losing their information would consider it unethical and underhanded not within a good business practice. Wayne Black, with Miami-based Riley Black Kiraly, a private security firm that helps victims of information theft states, “Companies that operate in highly demanded areas generally fall into to two categories. There are those who have been attacked and those who don’t know it yet.” (Knight Rider, 2003) Security experts state, “That it is very difficult to estimate how often these misdeeds occur and most incidents are never discovered.” (Bob Rosner, 2001) It is estimated that the impact of these indiscretions are at more than $100 billion a year for U.S. companies. The latest high expense case of CI gathering occurred in Jul 1998.

c. CASE III
This case dealt with two former employees of Lockheed Martin who were currently being employed by Boeing Aerospace Industry. It was alleged that these individuals took Lockheed Martin documents to help Boeing win an Air Force contract. Boeing in fact did turn over more than 37,000 pages of Lockheed documents that were taken by the two individuals. The documents included sensitive cost and technical information and Air Force critiques of Lockheed’s proposal. The two individuals were charged with conspiracy, theft of trade secrets and violating the Procurement Integrity Act. The charges were based on the four-year fight between Lockheed Martin and Boeing for a multibillion-dollar contract to build the next generation rocket launcher known as the Evolved Expendable Launch Vehicle. Boeing acknowledges that some employees “behaved unethically” during the competition, but never admitted any fault on the company’s part. “By covertly using a competitor’s secret information, they caused harm not only to Lockheed Martin, but also to the Air Force and taxpayers who finance government operations,” U.S. Attorney Debra W. Yang stated in a public statement. (Washington Post, 2003) A company’s lust for monetary value and a strong position within the marketplace drives management to practice both ethical and unethical means. This has only been a brief and general understanding of competitive intelligence. Let dig a little deeper and identify the origin of CI.

VIII. ORIGIN OF COMPETITIVE INTELLIGENCE
People have been gathering information on one other to gain a competitive edge over the other since the beginning of time. This was originally referred to as espionage and was predominantly used in a militaristic fashion to overcome ones enemies. However, there has not been a more appropriate term for competitive intelligence until the 15th century. The term “competitive intelligence (CI)” refers to collecting information of rival corporations in order to gain an edge within the market. Origins of competitive intelligence span across centuries with its first noted beginnings in Germany back in the 15th century, “when the House of Fugger Bank collected, and disseminated intelligence for its’ sales force.” (Multiquest, 2001) By doing so, the Fugger bank was able to gain an edge over local and international competitors. The information was gathered and printed in a newsletter printed by Jacob Fugger, one of the three sons controlling the business.

The first commercial application of competitive intelligence was credited by, “Lloyds of London and specifically Edward Lloyd which recognized the value of customer chatter in the coffeehouses of London.” (Basch, 2003) One of the largest issues faced by gathering information is to understand a way as to make use of it later, weeding out what is important to the firm and what is not.

IX. WHY COLLECT INTELLIGENCE?
Intense pressure for turning profits, winning contracts and avoiding expensive research and development costs play a vital role in a company’s intelligence collection policy. The weight placed on these criteria will define whether or not the company is willing to conduct ethical or borderline unethical intelligence gathering procedures. Companies can gain leverage quickly by taking a peek at what a competitor is doing. Gaining access to this information will provide them with early warnings of competitor’s new product introductions and marketing initiatives as well as changes in the way products come to market. The information also identifies key competitors emerging strategies that will directly impact the company’s sales and market tactics. But regardless of what it is called or how it is done, competitive intelligence is extremely important if a company is to stay ahead of its competition.

The importance of a corporation engaging in the art of CI can be presented in many forms. Probably Robert Flynn best describes the easiest and most hard-hitting explanation in this analogy:
“Usually it is a lot of hard work, combined with some imagination and expertise. Assume you have a box containing the jigsaw puzzles, a water scene, a landscape and an ‘old master’ painting, all mixed up. That is all you know about the contents. You are tasked with providing artist and title of the ‘old master’ painting. Initially jigsaw pieces with blue might be assumed to be the water scene, and leaves to be landscape. Pieces showing evidence of brushstrokes are probably part of the old master.
By concentrating on brushstrokes you can ignore the rest of the pieces, (information) and soon begin to assemble the picture. Long before it is complete, you can bring in an art expert who will be able to name the artist and painting. You get a copy from the library, add a few more pieces to verify the hypothesis, and you have your answer. You do not even have any knowledge art to provide the correct answer. Nor was the trail of what you were following (brushstrokes) really connected with the subject of the picture. It was a unique filter to pass the information through to get your answer. Often, the relationships between the data are more significant than the data itself.” (Multiquest, 2001)

Competitive intelligence is, simply put, opening up ones eyes, ears, and mind to the surroundings in order to gain a competitive edge. The observance of competitors movements and actions that will aid in decisions made by executives in choosing the correct courses of action to remain one step ahead.

Companies, like many nations of the world, are driven to out maneuver their competition in order to gain market share and increase profits. It’s to this end that corporations resort to the seemingly questionable practices of competitive intelligence gathering. CI is merely the systematic collecting, selecting and analysis of data used to gain an advantage within the market place. Companies continually strive to control their environments and the most effective means of doing this is to know what their competitors are going to do first.

“Corporate espionage is big business. In the US alone, around $2 billion a year is spent by companies spying on each other, according to the Society of Competitive Intelligence Professionals.” (Louth, 2004) These business practices further innovation and advancement within the technological field. It is also in these practices that companies get themselves into enormous legal troubles, as in the case of Gillette and the Schick Quatro:
“When spying is successful, it can save companies millions or even billions in lost sales and make them look smart and sharp. In August 2003, Schick-Wilkinson Sword revealed to the world a four bladed razor, the Quattro, designed to trump the market edge gained by Gillette through its Mach3 Turbo treble bladed device. The trouble was that within hours of the launch, Gillette had responded with its own press release saying Schick’s razor violated one of its own patents. Gillette had secretly obtained ten prototypes, but never revealed how it had managed to break the veil of secrecy around the product” (Louth, 2004).

Companies practice the art of competitive intelligence as a means of staying ahead of the competition. Most of the information gathering is legal, but some is not. The key to CI is not getting caught while retaining the competitive edge. In today’s market place there are companies that help other companies set-up and operate CI programs. These companies work with a firm’s management to identify where the intelligence function should reside, and what type of function should exist. They normally communicate how the intelligence process works, how to optimize each part of the process, what resources it will take to staff an effective start-up program, and the yearly training required. The company Truth Consulting Inc is such a company and they provide/conduct many types of competitive Intelligence research for companies:

• International business development (identification of best-partners / distributors)
• "Best-strategic-partner / investor" analysis
• Patent analysis (technological strength, the speed at which a technology is changing, emerging competitors, potential synergistic partners, core competencies of competitors, gaps in patent portfolios, in-licensing or out-licensing candidates, M&A candidates, identification of key inventors/people at potential acquisition target, ID of new areas or technologies or industries to exploit.)
• Merger and acquisition due diligence support
• Expert witness identification
• Provision of "indications and warning" about your competition's next moves / products / strategies.
• Ad-hoc projects where you need answers that only "human source collection" (phone interviews / trade show intelligence) can provide.
(Truth Consulting Inc, 2004)

The Truth Consulting Inc trains management on how to identify where the intelligence function should reside and what type of function should exist. They also explain and managers should know how the intelligence process works, how to optimize each part of the process, what resources it will take to staff an effective start-up program, and the yearly training required. Some of the factors covered from the Truth Consulting firm are:

• Techniques for defining and prioritizing intelligence requirements
• How to generate good "Indications and Warning" -- setting up a "Strategic Early Warning System" (SEWS)
• Competitive Intelligence software and knowledge management tools - and which ones are right for your company
• Client feedback techniques
• Techniques to prove "return on investment"
• Whether the function should be strategic in nature, tactical in nature - or both.
(Truth Consulting Inc, 2004)

After the program is set up, the firm will be able to track competition, any emerging competition, product trends, industry trends, and mega-trends on an ongoing basis. The main goal is to show firms how to foster a company culture where everyone realizes the importance of information and intelligence also explain how it is a valuable contributor. Lets now briefly explain a few driving factors that would propel a company to flirt with unethical intelligence collection practice.

X. WHAT IS CONSIDERED ETHICAL?
Competitive intelligence takes many forms that cover the breadth of the ethical spectrum. At one end is outright illegal activity, such as theft of trade secrets. At the other is simple digging into public information, obscure government records, research papers, and the like. The vast middle is murkier, where identities are often cloaked and unsuspecting sources are duped into giving up valuable information. In short, the tactics don’t always pass the Penenberg and Barry, authors of Espionage in Corporate America, the “Throw-up test.” What they stated was, “If you had to testify in court about what you did, would the jury get sick?” (Penenberg & Barry, 2001) Some competitors will do almost anything to get competitors company secrets. As companies get more aggressive and speed to market is of essence, getting any information on a competitor is key. What one company considers unethical, another may consider it good intelligence gathering. Competitive intelligence is very subjective in nature, so what prevents unethical practices? Corporate laws help guide intelligence gathering by protect companies from illegal trespasses and trade secret collection. One problem with this ideology is if your company does not know that it has been trespassed against how is it getting protected? In corporate law the prosecution requires evidence, without it there is only hearsay. Since companies can no longer guarantee proprietary information protection they are required to develop ways to keep their secrets secret keeping intruders at bay.

In the wake of scandals with Enron and Tyco business ethics have become a growing topic of interest. Corporate espionage is just another breakdown of the ethics within business. Often overshadowed by other events in the media corporate espionage not only happens, it is being refined to meet today’s needs. If there is someone that does not think the practice of gathering business intelligence is alive and well, just ask companies such as Gillette, Eastman Kodak, and Pratt & Whitney. Corporate espionage has cost them millions in research costs and potential revenue. Despite warnings from the government and various private sector firms, company executives have done little to protect themselves. In 1996 the United States Congress passed the Economic Espionage Act of 1996, “which imposes prison terms up to 15 years and fines up to $10 million for stealing trade secrets.” (Luong, 2003) Despite this, the United States continues to see corporate espionage increase at an alarming rate. Companies today cannot just go into a competitors business and poke around looking for information. Instead there are numerous collection methods used and companies expend vast resources to conduct corporate espionage.

XI. METHODS OF INTELLIGENCE COLLECTION
The first and most utilized collection method today is computer piracy. Companies are paying substantial amounts of money to hackers to gain access to competitor’s computer systems and retrieve information. Companies are being forced to expend revenue to beef up their computer security systems. However, with technology involving at incredible rates methods are always being devised to break passwords and encryption programs. Additionally, individuals will be hired to introduce viruses into company’s production lines utilizing computers as the labor force. Often these viruses will produce work stoppages or flaws in the manufacturing process that will result in defects with the product. The overall goals associated with computer piracy are to extract valuable information or force the company to expend funds to correct defects or manufacturing timelines.

The second most popular method of collection is the use of former employees. Some competitors will hire employees that were laid off or employees that may be seeking revenge against their previous employer. Companies that fail to have employees sign disclosure statements or to retrieve all property used while employed are especially at risk. This type of collection method is not confined to large companies or specific manufacturers. Company’s ranging from Subway to Pratt & Whitney Aircraft Engines and Dell Computers to Starbuck’s coffee has all been victims of previous employee information release. While it will never be eliminated previous employees and companies that solicit the information can be prosecuted. It is management’s responsibility to take the necessary precautions to avoid this type of corporate espionage.

One of the newest forms of corporate espionage is cell phone tracking and bugging. Companies are using hackers to track and bug phones. "This is a new form of hacking known as bluesnarfing. Hackers can download text messages, phone lines, and even remotely tamper with the handsets to enable them to be used as a listening device." (McDougall, 2004) To combat this form of espionage, companies are purchasing cell phone scramblers. However, to be effective both parties must have the scrambler and currently it is limited to certain manufacturers of cell phones.

The oldest form of espionage is the use of spies. Companies will higher individuals to break into competitor's offices and retrieve information. Some will get a spy hired into a competitor's company and then have them feed the information back. This process can take years to develop but will pay big dividends with a vast amount of information as the spy moves up through the company. Additionally, after the employee has been established within the company the chances of being caught diminish and the information gathering becomes easier as the spy and company will establish a trust. Let's now look at the resources company's use to gather information and the money expended both to gather and stop corporate espionage.

XII. WHAT RESOURCES ARE USED TO COLLECT INFORMATION
It is estimated that, "the combined costs of foreign and domestic economic espionage, including the theft of intellectual property, are as high as $300 million per year and rising." (Luong, 2003) When companies use spy's to collect information there is no shortage of qualified applicant's to select from. The most popular is ex-intelligence officers from the military. The government spends millions of dollars training these individuals on the art of intelligence gathering and when they leave military service they become wanted men by companies wanting to embark on corporate espionage. The amount of pay is determined by the type of information wanted. Figures ranging from thousands of dollars into the millions have been cited in previous espionage cases. Other sources are ex-agents of the CIA and FBI. While not as common, they are a valued source because they understand the efforts being used by the government to thwart espionage. Additionally, they still have numerous contacts within the various agencies and can solicit information through that route as well.

When companies need the services of a hacker, they usually don't have to look too far past their local college campus. Students are a good source because they can be easily manipulated and have the access to super computers used on campuses. Typically with the allure of large amounts of money students are often easily swayed to perform the tasks. Additionally, they are convinced that the action of hacking is not wrong and the information will be used for good reasons. Because of the easy access to sophisticated computers and the pool of applicants to select from a good number of companies utilize this technique when conducting corporate espionage.

When we discuss the costs associated with corporate espionage the figures can be staggering. Costs on either side have been escalating over recent years in a consumer market that has become extremely competitive. To combat corporate espionage it is estimated that "the combined costs of foreign and domestic economic espionage, including the theft of intellectual property, are as high as $300 million per year and rising." (Luong, 2003) In a recent court case against an individual hired by a competitor of Pratt & Whitney Aircraft Engines, the individual was paid $5,000 to provide blueprints of a specific tooling process used in the repair of aircraft engines. In contrast an individual in Britain was paid $1.5 million to provide documents and design drawings of various items used in BMW automobiles.

Technology is the biggest enemy of companies trying to protect themselves against corporate espionage. As software and components are created to provide security for these companies, new technology is being created almost on a daily basis that is able to circumvent the present securities. While this is not necessarily the fault of the manufacturers, a level of corporate responsibility must be assumed when introducing these items into the market. The costs incurred by companies in developing appropriate levels of security are mind-boggling and are attributing to rising costs to consumers. In a cutthroat market place companies are going to extreme ends to gain the upper hand on their competition.

Perhaps the most disturbing part of corporate espionage is large portions of businesses don’t feel it is an ethical violation. They see it as competitive behavior and necessary to survive it today's business world. Large companies even acknowledge the development and existence of departments that conduct legal aspects of corporate espionage. While they are confining their actions within the written laws, the ethical dilemmas raised by these actions are still unanswered. Once the information is collected the company needs to analyze, interpret, and incorporate it into their business strategies.

XIII. UTILIZATION OF COLLECTED INFORMATION
“Developing winning business strategies relies on making informed choices, which requires the availability of reliable, relevant and timely information.” (Farrell, 2003) Dominating the competitive market on any type of industry takes time and expertise on knowing how to collect, analyze and develop marketing strategies. The mission is to gather and assess reliable competitive information, about the environment, competitors and the market, without comprising the organizational ethical codes.

What are the methods used by CI professionals on gathering and assessing reliable competitive information? According to the Society of Competitive Intelligence (SCIP), the definition of competitive intelligence is “The process of monitoring the competitive environment. CI enables senior managers in companies of all sizes to make informed decisions about everything from marketing, R & D, and investing tactics to long-term business strategies. Effective CI is a continuous process involving the legal and ethical collection of information, analysis that doesn’t avoid unwelcome conclusions, and controlled dissemination of actionable intelligence to decision makers.” (Hemphill, 2002) “Competitive Intelligence is the purposeful and coordinated monitoring of your competitor(s), whenever or whoever they may be, within a specific marketplace.” (Johnson, 2000) This process that collects and transforms information into valuable data that is use in tactical and strategic business is one way to maintain and gain the competitive edge.

According to Johnson, “The goal of a competitor analysis is to develop a profile of the nature of strategy changes each competitor’s possible response to the range of likely strategic moves other firms could make, and each competitor’s likely reaction to industry changes and environmental shifts that might take place.” (Johnson, 2000) Competitive Intelligence is the core to having a competitive strategy. Doing the right thing is better than getting ahead. Competitive intelligence is only but one way to penetrate the market and gather the information needed to develop the strategies and tactics.

Intelligence is precious. The hottest tool on the market today is still the Web. The Internet is just one-way to get the job done…indeed not always the best way. Its phenomenal growth helped organization, such as Society of Competitive Intelligence Professional agencies, sought out ways to exploit the technology’s research potential. It is the easiest access to unlimited data storage capacity and the ability to quickly connect to far-flung resources. All this data by itself is useless, it takes knowledgeable personnel to pick and sort out the information, that may be stale, tainted, or of questionable origin; sorting out the data that would be useful to the organization and its needs to be more competitive in their markets.

“A competitive intelligence program entails a continuously evolving integration of both formalized and informal processes by which organizational members assess key trends, emerging discontinuities, the evolution of industry structure, and the capabilities and behaviors of current and potential competitors to assist in maintaining or gaining competitive advantage” (Dishman, 1998). What methods and/or methodologies do CI professionals to gather and assess reliable competitive information use?
• Evaluation: The information and data collected needs to be evaluated to ensure its integrity.
• Synthesis: Key intelligence topic, (KIT), usually includes relationship of those pieces of information gather that is not obvious to the market. This will enable the CI practitioner to get a handle on what is being examined and how to read the information and data.
• Analysis: Analyzing the information and data collected is the most important part of CI. Too much time is used on collecting or research that lacks accuracy and that is not reliable. CI is the process of gathering data using legal, ethical means and turning it into valuable intelligence through careful analysis.
• Ethics: Society of Competitive Intelligence Professionals Code of Ethics (SCIP) has “developed a strict Code of Ethic, which forbids breaching an employer’s guidelines, breaking the law, or misrepresenting oneself” (Hemphill, 2002). Shown below.
Society of Competitive Intelligence Professionals Code of Ethics:
• To continually strive to increase the recognition and respect of the profession.
• To comply with all applicable laws, domestic and international.
• To accurately disclose all relevant information, including ones identity and organization, prior to all interviews.
• To fully respect all requests for confidentially of information.
• To avoid conflicts of interest in fulfilling one’s duties.
• To promote honest and realistic recommendations and conclusions in the execution of one’s duties.
• To promote this code of ethics within one’s company, with third-party contractors, and within the entire profession.
• To faithfully adhere to and abide by one’s company policies, objectives, and guidelines.
(Source: Society of Competitive Intelligence Professionals, 2000)

The Measurement Process defines, “Measurement as the process that links theoretical constructs with empirical research and is therefore the means by which such constructs are rendered researchable. Therefore, the ‘correctness’ of measurement process is dependent upon several factors, such as accurate assessment of the relationship of the construct under observation with its related constructs, accurate decoding of the data gathered through the instrument, and correct analysis and evaluation of the data. The selected instrument must satisfy the criteria of validity and reliability” (Malhotra, 1993).

Validity is the gathering relevant information that is valid and accurate, basically the measure of real traits. According to Malhorta, “validity of the instrument ensures that the instrument is actually measuring the construct under observation and not some other construct; and that the construct is being measured accurately. Reliability implies consistency of the measuring instrument (1993).

Reliability encompasses two separate concepts, stability and homogeneity (Loevinger, 1967). “Stability of the measure is its ability to maintain its consistency over time under varying test conditions. Homogeneity of the items in the instrument that tap the same construct is representative of the internal consistency of the items-the items should be capable of independently measuring the same construct” (Malhotra, 1993). In organizational measurement research, validity is defined as the extent to which an instrument and the rules for its use in fact measure what they purport to measure (Cannell & Kahn, 1968). An instrument can’t be valid and still be reliable (consistently inaccurate), but the opposite is not true” (1993). By definition, if a measure is valid it will be accurate every time, and thus must be reliable also” (Bailey, 1987). Based on its past performance the reliability of data implies the ‘believability’ of the source of data. The correlation between the organizational researches, reliability of the measuring instrument simply means the consistency of the measurement. This instrument need not be valid and still be reliable (consistency inaccurate), but the opposite is not true.

Ethics and ethical behavior should be a concern to every organization. Projecting the right positive attitude of the organizations’ reputation and competitiveness should not be compromised. The firm should take into consideration their ethical value and “the cost of stepping over the line—into the black are far too severe, and unnecessary. “ (Johnson, 2000) Taking all of the above information and now understanding that information needs to be protected, lets look how to keep company secrets secret.

XIV. KEEPING COMPANY SECRETS SECRET
First, “Officials should write down the company’s proprietary information”, suggested Milton Ferrell, a Miami-based attorney who represented companies who have victims of corporate spying. This information includes what products and employee resources are considered classified. Officials should require all employees sign a written policy that makes clear what they should not talk about. The policy should also state a lists of clients jobs that are not allowed to be taken should an employee quit or be fired. “You don’t want to start by spending a lot of money, you want to start with your employees,” Farrell said. Company officials should also make it clear to employees that any information on business computers is not confidential. “Companies need to communicate to the employees that the system is owned by the company and there is no expectation of privacy”, stated local investigator Wayne Black, who investigates corporate spying claims. (McGonagle & Vella, 2004) Ferrell also advises companies to, “conduct background inspections, including credit and criminal checks and drug screenings, before hiring an employee and throughout his/her tenure.” References also should be checked. After officials secure their work force, the next step is to safeguard their buildings, including the actual office and the information installed on computers.

a. BUILDINGS
Black, the local investigator, said, “Many times companies think their buildings are secure, when in fact they’re not.” When a business hires Black, he will try to gain access to the building.” He will walk into the office unannounced and say he’s there to back up the computer system. “Nine times out of ten,” he said, “The receptionist will send him back to the computer area. If questioned in the computer area, he will state something about misreading the companies’ address and that he apologizes for any inconveniencies he might have caused. He’ll pop out the disk he was using to copy data files off the main server and walk out. Usually, he’s not stopped or questioned. It is recommended that companies should use identification cards programmed to allow employees access only to areas where they need to be. Not all employees require access to classified information, only those who need to know. Also, all visitors should be logged in and out of buildings. As more information is being kept on computer hard drives, companies need to be watchful of hackers entering their buildings through communications cable.

b. COMMUNICATION SYSTEMS
Those in the industry suggest companies should install firewalls and anti-virus software, as well as anti-hacking software. But others say that while those protections are needed, a spy hacking into a computer system is not much a threat. “That’s really not as big an issue as a lot of people believe it is,” said Steve Ackerman, director of research and analysis at CTC International Group, a West Palm Beach based firm that tries to obtain secrets for companies. (Finder, 2004) “The real problem is an employee inside the company that has access and downloads that information and is willing to forward that information to someone else for money,” he said. (Finder) Companies also need to watch what is being thrown in their trash bins.

c. ADMINISTRATIVE
Once trash lands in the dumpster, it is consider abandoned. “If you want something to be secret you better treat it like a secret,” said William Richey, a Miami attorney who also works with clients who have been victims of corporate spying. (Fink, 2002) While many companies shred their documents, it is usually only done in strips that can be easily pieced together. If companies shred their documents, which they should, getting a shredder that crosscuts is the best option. With strip shredders it is very easy to piece documents back together. A crosscut shredder turns documents into confetti and it is very difficult to piece back together. If a company does not want to purchase these machines, they can hire a business to pick up and shred their documents on site. The cost is feasible, estimated at $32 for 1000 pounds of paper. In today’s society, people are becoming more aware of their vulnerability. There’s a heightened awareness because of things that have happened in the business community. Companies are beginning to understand that they need to dedicate more resources towards protecting their secrets while keeping an eye on their competitor.

XV. CONCULSION
Most information managers and company owners do not believe their organizations will be targeted. If a company is not in the defense industry or if an organization is relatively small, the thinking goes, no one will come after us. That all-too-common attitude is a spy’s best weapon. No company is immune to being a target for attack. Competitive intelligence is alive and well in today’s marketplace, as the above examples showed. The practice of intelligence gathering is not new and many companies, large and small, are involved. The question is, does a company collect its information ethically or do they walk that ultra thin line between ethical and unethical? Remember what is considered ethical to one company may not be perceived as such to its competitor. There are numerous ways to infiltrate a company’s security system. Ideal targets are dumpsters, human espionage and technology penetration. Corporate spies would rather collect information covertly, via the trashcan or personnel interception, rather than the use an elaborate method such as computer hacking. If you return back to the beginning scenario, now that you armed with more knowledge, what should Mr. Clancy do? He should contact his security manager and report the incident. Even if Mr. Norris intent was not malicious, it is better to be safe than sorry. Look internally within your own organizations and ensure that your company is not the next target of competitive intelligence.

References
Bob Rosner (2001, Apr). HR Should Get a Clue: Corporate Spying is Real. Perspectives on the Workplace, 72-75. 2004, http://books.infotoday.com/books/SsCompIntel/toc.pdf

Buffalo News (2004, Jan 19). Businesses Implement Policies to Ban Cell Phone Cameras. Retrieved Apr 15, 2004, http://www.orlandosentinel.com

Cannell, C.F. & Kahn R.L. (1968). Experimentation in social psychology. In G. Lindzey and E. Aronson (Eds.). Handbook of Social Psychology, Vol. 2, Reading MA: Addison Wesley.

Carr, Barbara Metcalf (2003), Super Searchers on Competitive Intelligence, Retrieved
July 6, 2004, from http://books.infotoday.com/books/SsCompIntel/toc.pdf

Dishman, Paul. (Fall, 1998). Competitive Intelligence. [On-line]. http://www.cov.isu.edu/dishpaul/isu_pages/Competitive%20Intelligence/competit.htm

Essig, M. (1999). Edison & the Electric Chair (1st ed.). New York, N. Y.: McGraw Publishers.

Farrell, Adrian. (2003). Competitive Intelligence Basics-Competitor Analysis, Market Intelligence. Woodlawn Marketing Services. Marketing Wisdom based on Information, Knowledge and Understanding. [On-line]. www.worksys.com/cil101.htm

Finder, J. (2004, Jan 29). Corporate Competition Builds to Backstabbing in 'Paranoia'. Retrieved Apr 15, 2004, http://www.usatoday.com

Fink, S. (2002). Sticky Fingers, Managing the Global Risk of Economic Espionage (First ed.). Chicago, Ill: Dearborn Trade Publishing.

Hemphill, Thomas A., Oracle vs. Microsoft: Corporate Espionage or Competitive Intelligence? Business and Society Review. Vol. 107:4 pg. 501-511.

Ira Winkler (1997). Corporate Espionage (First ed.). Rocklin, Calif: Prima Publishing.

Johnson, Arik R (2000). What is Competitive Intelligence? How does competitive intelligence fit into the strategic planning process? [On-line]. www.aurorawdc.com/whatissci.htm

Knight Rider (2003, Jun 14). Espionage Takes its Toll on Corporations. Retrieved Apr 15, 2004, http://www.OrlandoSentinel.com

Louth, Nick, (2004). Corporate Espionage. Retrieved July 7th 2004 from http://money.msn.co.uk Luong, M. Espionage: A Real Threat, Optimize Magazine, October 2003, Issue 22

Malhotra, Yogesh. (1993). Competitive Intelligence and Measurement in Organizational Research. Originally published under the title: ‘An Analogy to a Competitive Intelligence Program: Role of Measurement in Organizational Research’ [On-line]. www.kbook.com/comprint.htm

Bailey, K.D. (1987). Methods of Social Research, 3rd ed. New York: The Free Press.

Loevinger, J. (1967). Objective Tests as Instruments of Psychological Theory. In D.N. Jackson, & S. Messick (Eds.), Problems in Human Assessment. New York: McGraw Hill.

McDougall, Dan, Firms Scramble to Beat the Rising Tide of Corporate Espionage, Jul 2004, The Scotsman. Edinburgh (UK)

McGonagle, J. J., & Vella, C. M. (2004, Mar/Apr). Competitive Intelligence in Action. The Information Management Journal, , pp. 64-68.

Multiquest Consultants. (2001). Other cultures breed other standards. Retrieved July 6, 2004 http://www.mqcinc.com/Countries.htm

Penenberg, A. L., & Barry, M. (2001, Jan 29). Espionage in Corporate America. Business Week, (Jan 29), pp. 20-26.

Truth Consulting Inc, (2004, 2004). Truth Consulting Inc.. Retrieved Jul 23, 2004, www.truthconsult.com Underwood, J. (2002). Competitive Intelligence (First ed.). Oxford, United Kingdom: Capstone Publishing.

Washington Post (2003, Jun 26). Ex-Boeing Workers Charged Over Lockheed Documents. Retrieved Apr 15, 2004, http://www.washingtonpost.com

Similar Documents

Free Essay

Club It

...community that meets regularly at Club IT.” The club focuses on all music genres, which includes Hip- Hop, Techno, Electronica, MP3, and live bands. With these genres, the music caters to all people from young adults to older adults and single to married couples. Although the club is striving, Ruben and Lisa want their company analyzed for a more competitive advantage. As their intern, I will take a look at the company’s intranet resources, which is an internal network that only the owner’s and employees’ can access. The current intranet is a good resource of information, but it lack security. The access to the intranet needs to be accessible individually. The owners need to have their own login credentials with access to the information related to all the company’s information and employees’ information. The employees need to have their own login credentials as well, so they can access the necessary information related to their job title and personal information. One way to become more competitive is to take advantage of its information base to help a build a community with the support of IT. Several kinds of competitive information and strategies that Club IT can be gain by providing this service, for...

Words: 371 - Pages: 2

Premium Essay

Bizintel

...Evaluate a Business Intelligence initiative that has been undertaken within your organization or one potential application of Business Intelligence within your organization? I work in the cruise industry. I never really knew how much Business Intelligence was a science. Granted, I knew we have analysts and copious amounts of data, but I never truly gave it much thought. After studying BI, I have come to realize BI is an essential aspect of my organization’s success. From measuring productivity of different departments (such as revenue, event planning, individual & groups reservations, cruising power, our company website, shipboard management, etc…) to understanding travel partner and guests needs and staying ahead of the competition, we wouldn’t survive without BI metrics and applications. Because I work in the event planning division of my company, I am not familiar with the names or metrics used to evaluate important data, but I do know from experience and part of my job function, reports and data gathered are used to make judgments and decisions about new products and constant improvements for existing services we currently provide. Surveys are completed by our travel partners and guests, and even employees. We compile reports and present them to management electronically. Our research, experience, and use of different applications, along with our IT departments, helps management and executives determine which direction to move forward. Feedback from our travel...

Words: 526 - Pages: 3

Premium Essay

Kudler Fine Foods

...premiere gourmet grocery store that offers shoppers the finest baked goods, meats, cheese and dairy, produce items and an assortment of domestic and imported wines. Kudler Fine Foods offers all customers a wonderful shopping experience and the finest quality of foods and wines. Leaving room to expand its current services and opening new locations. The company’s growth span is leading to an increased customer base. Kudler Fine Foods is increasing and looking to drive revenue upward while leaving the current prices as set. Kudler Fine Foods is ready to develop changes to increase their revenue . I will discuss in this paper the important elements needed in Kudler Fine Foods goal towards advancement in marketing and the role of using the competitive intelligence tactics. This could include other ways to successfully achieve goals of growth. Marketing Research “Although marketing research isn’t perfect, it seeks to reduce risk and uncertainty to improve decisions made by marketing managers” (Armstrong, , 2011) . Marketing research can help develop new product ideas and offer a fine tuning in slimming down products and services. Businesses use market research t o help determine who will be interested in purchasing their products and services. Marketing research will reach out to a target group of people based on certain feelings, needs, income and age. Mrs. Kudler conducted surveys to reach out to customer and receive feedback in areas of potential improvements. Pointing them in the...

Words: 963 - Pages: 4

Free Essay

Mkt 421 Week 3

...Competitive Landscape When it comes to this type of argument it is very compelling to understand what needs to be done here. It is very important for a company to be able to understand what their competitive landscape market is and how they are going to use it. Within the Jackson Hewitt Company, they have many different competitors that offer similar to the same type of services they do. So the question here really is how Jackson Hewitt markets themselves and the new service of financial services that makes them more appealing to the customer. Marketing is the key, the whole purpose of why a company has marketing teams. Here are some examples of Jackson Hewitt’s competitive landscape. So let’s start out with the most obvious question, what is competitive landscape. “A competitive landscape (also known as “competitive intelligence”) provides cohesive, detailed information on what your competitors are doing including” (Koch, 2009). So when doing the research on Jackson Hewitt, I had come to a conclusion that they do not offer financial advisory to their customer such as some of their competitors do like H and R Block. So when a company wants to start up a new service, they need to research their competitor s to find out exactly what they are offering and the pricing of those services. A company needs to offer more for less in order to be competitive in a field that is already crowded. “In gathering competitive intelligence and creating your competitive landscape, you will...

Words: 449 - Pages: 2

Premium Essay

Mgm Phase 2

...to in regards to weaknesses and strengths to determine if it is moving in the right direction (Internal Organizational Analysis, n.d.). When internal analyses are not completed honestly and accurately it will affect various portions of the business. Generally, the finances are affected. Finances determine the sustainability of many organizations because of the overhead. When credit is maxed out and there are no funds available to pay employees, vendors, or produce then the company could potentially go out of business. Upon researching, surveying, and reviewing cost I would ensure that the information received is valid. I think that S.W.O.T. (Strength, weakness, opportunities, and threats) internal analysis could increase a level of competitive advantage. Many organizations tend to...

Words: 433 - Pages: 2

Free Essay

A Study on the Effects of Economic War on Organizations from a Leadership and Organizational Behaviour Perspective.

...THE EFFECTS OF ECONOMIC WAR ON ORGANIZATIONS FROM A LEADERSHIP AND ORGANIZATIONAL BEHAVIOUR PERSPECTIVE. Individual Term Paper Table of Contents I. A. 1. 2. B. 1. 2. II. A. 1. 2. B. 1. 2. C. 1. 2. III. A. B. Background of the topic ............................................................................................................... 3 What is Economic War and what are its practices? .............................................................. 3 Pre-technological Era ........................................................................................................... 3 Technological Era ................................................................................................................. 3 How Competitive Intelligence translates into companies’ life? ............................................ 6 As a tool of Corporate Strategy ........................................................................................... 6 As a part of the Corporate Culture ..................................................................................... 6 Economic War and Corporate Culture .................................................................................. 7 Organizational Leadership....................................................................................................... 7 Where Economic War becomes a problem: advocating ethical behaviour ..................... 7 Where Economic War benefits: crisis leadership ......................

Words: 3585 - Pages: 15

Premium Essay

Kudler

...Kudler Fine Foods After searching for opportunities for a different lifestyle, Kathy Kudler had a vision of opening her own gourmet food department. On June 18, 1998, Kathy Kudler’s first store front of Kudler fine foods opened their doors, in La Jolla, California (Kudler Fine Foods.) Within two years later she open an additional establishment in Del Mar, California, which is within 30 minute distance from the La Jolla Store. Five years later she open a third store located in Encinitas, California. Kudler fine foods’ businesses have been doing great with the exception of one of the stores making enough money to break even. Kathy wanted her store to sell the finer items of the international cultures. Kudler Fine Foods consist of freshly bake breads, the finer meats, freshly organic produce, gourmet cheese, and superior selection of wine. Importance of Marketing Research Kudler Fine Foods is an upscale food supplier that will attract customers who are of a median to upper income. Marketing research is of importance when dealing with this any organization, especially when the products exceed the average price the same items. Kathy would need to know the target market of her customers. The target market consists of the characteristics and dimensions of their present and potential clients. Kathy needs to be aware of the average income of individuals in the area of the store, their lifestyle, population, sex, marital status, and the commute from Kudler fine foods to their home...

Words: 1027 - Pages: 5

Premium Essay

Analyziing Your Competition-a Ghanian Case

...Analyzing Your Competition Overview Almost everyone in business understands the principle of trying to offer something better than what their competitors are offering. Gaining an advantage is the key to success and even survival. But many of the so-called advantages that businesses rely on are not sustainable. They can be easily copied, stolen or negated. Real competitive advantages — things like brand name recognition, patented manufacturing processes or exclusive rights to a scarce resource — cannot be easily copied. Every company has a unique set of strengths, and it's critical that you determine yours, as well as your competitors'. Hold a brainstorming session with your staff and advisors to perform a formal SWOT (Strengths, Weaknesses, Opportunities and Threats) analysis. This analysis helps you to see how your strengths stack up against your competitors' weaknesses and suggests ways to take  advantage of marketplace opportunities. After you have performed the analysis, there are four basic competitive strategies to consider. 1. Become the low-cost supplier. By under-pricing the competition, you can achieve greater volume, which can drive your costs down even further by realizing economies of scale. Of course, it's important to still maintain a healthy profit margin so the key here is to lower costs, not just prices. 2. Achieve product or service quality differentiation. Think about the hundreds of companies that have achieved such differentiation for themselves...

Words: 10912 - Pages: 44

Premium Essay

Competitive Intelligence

...load results from the next page… and the next (into infinity.)  When using sites like Google you can see 10 to 10,000 results to search for specific items hidden well beyond page one of the results. Fireshot Allows you to take screenshots and has dozens of very useful features.When used for competitive intelligence it allows you to quickly gather visual records and note them. Firebug A development tool that allows you to see the code structure for any web page. Very useful for finding software vendors who provide different platform capabilities to your competitors. Scrapbook Add visual bookmarks into a catalog that can be tagged and categorized. Competitive Intelligence professionals can quickly sort reference sites and create visual archives for team collaboration. List Open URLs https://addons.mozilla.org/En-us/firefox/addon/list-open-urls/ When you have multiple tabs open on your browser this saves all the URLs to a text file. Very useful for opening 5 to 25 tabs on a research project and documenting the list of source sites for later reference. HR ORIENTED TOOLS LinkedIn http://linkedin.com If you don’t use Linkedin for competitive and market intelligence you are really missing something. Linkedin provides all sorts of data about employees, relationships, company data, new hires, people that left, press...

Words: 714 - Pages: 3

Premium Essay

Ukautomotive Industry

...researchandmarkets.com/reports/657511/ UK Automotive Industry: Sector Report Description: This industry profile is an essential tool to help your company gain an in-depth knowledge and competitive advantage in the industry. The profile is an assimilation of insider knowledge, market characteristics and economic indicators. It analyzes the critical success factors in the industry – how the industry has evolved and how competitive dynamics have impacted market behavior. Sectional Highlights -- Structure of the industry, market size, and growth rates have been analyzed -- Value chain analysis categorizes the value-adding activities to develop low-cost differentiation strategies -- Trend analysis detects historical patterns that could help in forecasting future demand periods -- Critical issues are reviewed that may become a threat to the industry -- PEST analysis uses a framework of external factors for macro-environmental scanning of the industry to help in taking advantage of opportunities and making contingency plans for threats -- Competitive positioning of the industry leaders has been evaluated in terms of sales, profitability, stock trend and other performance indicators Key Benefits -- Provides input for strategic business planning -- Targets business opportunities & risks -- Exploits competitive intelligence Target Audience -- Investment Managers -- Venture Capitalists -- Management Consultants -- Research Companies -- Other Industry Professionals Contents: 1. Industry Overview...

Words: 718 - Pages: 3

Premium Essay

Strategy

...[pic]Porter's Four Corners Model Porter’s four corners model is a predictive tool designed by Michael Porter that helps in determining a competitor’s course of action. Unlike other predictive models which predominantly rely on a firm’s current strategy and capabilities to determine future strategy, Porter’s model additionally calls for an understanding of what motivates the competitor. This added dimension of understanding a competitor's internal culture, value system, mindset and assumptions help in determining a much more accurate and realistic reading of a competitor’s possible reactions in a given situation. The Four Corners Motivation – drivers This helps in determining competitor's action by understanding their goals (both strategic and tactical) and their current position vis-à-vis their goals. A wide gap between the two could mean the competitor is highly likely to react to any external threat that comes in its way, whereas a narrower gap is likely to produce a defensive strategy. Question to be answered here is: What is it that drives the competitor? These drivers can be at various levels and dimensions and can provide insights into future goals. Motivation – Management Assumptions The perceptions and assumptions the competitor has about itself and its industry would shape strategy. This corner includes determining the competitor's perception of its strengths and weaknesses, organization culture and their beliefs about competitor's goals. If the competitor thinks...

Words: 890 - Pages: 4

Premium Essay

Business

...business STRATEGIC AND COMPETITIVE ANALYSIS: Methods and Techniques for Analyzing Business Competition 1 © The MindShifts Group Pty Ltd Page 1 of 5 www.mindshifts.com.au STRATEGIC AND COMPETITIVE ANALYSIS: Methods and Techniques for Analyzing Business Competition By Craig Fleisher and Babette Bensoussan (Prentice Hall, 2002) Book Description Given the priority of competitiveness in modern companies, practitioners of competitive or strategic corporate intelligence (CI) need to come to terms with what business and competitive analysis is and how it works. More importantly, they need to be able to convert the wealth of available data and information into a valuable form for decision-making and action. Collected data must be converted into intelligence. This is accomplished through analysis. Strategic and Competitive Analysis comprehensively examines the wide spectrum of techniques involved in analyzing business and competitive data and information including environmental analysis, industry analysis, competitor analysis, and temporal analysis models. It helps business analysts and decision-makers to draw effective conclusions from limited data and to put together information that does not often fit together at first glance. The Analysis Iceberg Strategic management involves all aspects of a business and requires a knowledge and understanding of the environmental impacts on an organization to ensure that correct decisions are made and taken. It is not just about looking at best fit...

Words: 319 - Pages: 2

Premium Essay

Benchmarking in Todays Business Environment

...everywhere for process improvements and re-engineering of companies (Beretta, Dossi and Grove, 1998). My aim for this essay is to explain the concept of benchmarking using a range of sources. I will also critically analyze how and why organizations use benchmarking as a weapon to persist in today’s competitive business environment to see if it really is that effective. Benchmarking is the continuous analysis of processes, functions, strategies, performances and many other aspects of a business compared with or between the “best-in-class” organizations by gathering information by using appropriate methods of collection, with the intention of evaluating an organizations current standards and then carrying out self-improvement by applying changes to match or exceed the standards (Anand and Kodali, 2008). Benchmarking is a technique used for continuous improvement of something within a business. It is a way of measuring a firm’s product; services or activities against top other organizations either internal or external to the firm (Drury, 2012). This could be close competition for example; customer service on telephone calls from mobile network providers such as EE and Vodafone, to non-competitive firms using the same example customer service on telephone calls with different firms such as British Gas and EE. These firms could all potentially look at each other’s process’ to gain ideas on how to improve their own standards or processes they undertake when providing their service. By doing...

Words: 3114 - Pages: 13

Premium Essay

Kudler Fine Foods

...fine bakery products, meats and seafood, produce, cheese and dairy, and wines. The company wants to expand with a new location. With the expansion, Kudler needs to focus on the marketing strategy and incorporate additional marketing research. Competitive intelligence and analysis helps Kudler redefine the marketing strategy. Importance of Marketing Research According Kerin, et. al. (2009), “Marketing research is the process of defining a marketing problem and opportunity, systemically collecting and analyzing information and recommending actions” (Marketing, 2009, p. 199). Marketing research helps create long-term business plans, launch new products or services, and expand into new markets. Market research determines what the consumer desires in the store and the ranking against competitors. Kudler identifies the market share through research. Marketing research involves five steps. The five steps are defining the problem, develop the research plan, collect relevant information by specifying, develop findings, and take marketing actions (Longmeyer, 2011). Using the five steps of market research identifies the weaknesses and strengths in the expansion development. Additional Market Research For Kudler to remain competitive, they need additional market research in business trend research. Business trend research shows the growth rate and trends in the food industry. Although surveys help determine satisfied customers with the store, customers are not satisfied with...

Words: 701 - Pages: 3

Premium Essay

Cover Letter

...2013 ------------------------------------------------- Dear Hiring Manager, I am applying for the Competitive Intelligence Analyst position at Google. Working at Google has always been a dream for me and this position excites me further because it involves my passion for research and keeping abreast of the technology industry. I do understand that my career path so far isn’t that of a typical intelligence analyst. However, I believe that many of the skills I gained during my five years as a business analyst are transferrable to this position. In addition, my MBA specialization in competitive intelligence (called ‘business intelligence’ in Thunderbird) and my project at BillingTree has taught me the latest techniques in information gathering. Studying at Thunderbird, which is the #1 in Global MBA, has also helped me appreciate the nuances of working with other cultures, which I am sure will help me in intelligence gathering. Listed below is a comparison of your job requirements and my qualifications: Your Requirements | My Qualifications | * MBA / BA / BS Finance, Economics, Marketing or Liberal Arts, or equivalent practical experience. | * MBA degree with a Competitive Intelligence concentration, BS degree in engineering and five years of business analysis experience. | * 4 years of analytical experience with an understanding of competitive industry dynamics. * Experience analyzing and synthesizing qualitative and quantitative information, identifying...

Words: 592 - Pages: 3