Abstract
PurposeThe purpose of this survey research is twofold. First, to study and report the process that is commonly used to create and maintain a competitive intelligence (CI) program in organizations. And second, to provide an analysis of several emergent text mining, web mining and visualization‐based CI tools, which are specific to collection and analysis of intelligence.Design/methodology/approachA range of recently published research literature on CI processes, applications, tools and technologies to collect and analyze competitive information within organizations is reviewed to explore their current state, issues and challenges learned from their practice.FindingsThe paper provides executive decision makers and strategic managers a better understanding of what methods are available and appropriate to the decisions they must make and the steps involved in CI undertaking.Originality/valueThe findings of this research provide the managers of CI programs a context for understanding which tools and techniques are better suited to their specific types of problems; and help them develop and evaluate a usable set of tools and best practices to apply to their industry.
Subject
Industrial and Manufacturing Engineering,Strategy and Management,Computer Science Applications,Industrial relations,Management Information Systems
Reference24 articles.
1. Britt, P. (2006), “The new competitive intelligence: raising the confidence quotient”, KMWorld, November/December, pp. 10‐11.
2. Chen, H., Chau, M. and Zeng, D. (2002), “CI spider: a tool for competitive intelligence on the web”, Decision Support Systems, Vol. 34 No. 1, pp. 1‐17.
3. Cobb, P. (2003), “Competitive intelligence through data mining”, Journal of Competitive Intelligence and Management, Vol. 1 No. 3, pp. 80‐9.
4. Fan, W., Gordon, M.D. and Pathak, P. (2006a), “An integrated two‐stage model for intelligent information routing”, Decision Support Systems, Vol. 42 No. 1, pp. 362‐74.
5. Fan, W., Wallace, L., Rich, S. and Zhang, Z. (2006b), “Tapping the power of text mining”, Communications of the ACM, Vol. 49 No. 9, pp. 77‐82.
Cited by
125 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献